A recent session of the Australian Computer Society (ACS) and the Australian Smart Communities Association (ASCA) masterclass on 5G, featured Dr. Ian Oppenheimer, the NSW Government's Chief Data Scientist and one of the country's most respected experts in radio technology. Ian is also the Chair of the scientific advisory board of the 6G Flagship organization, a global research organization based in Finland. This organization has just published a range of fascinating research papers on 6G. more
The Domain Name System (DNS) has become the fundamental building block for navigating from names to resources on the internet. DNS has been employed continuously ever since its introduction in 1983, by essentially every internet-connected application and device that wants to interact online. Emerging from an era where interconnection rather than information security was the primary motivation, DNS has gradually improved its security features. more
Verisign is deeply committed to protecting our critical internet infrastructure from potential cybersecurity threats, and to keeping up to date on the changing cyber landscape. Over the years, cybercriminals have grown more sophisticated, adapting to changing business practices and diversifying their approaches in non-traditional ways. We have seen security threats continue to evolve in 2020, as many businesses have shifted to a work from home posture due to the COVID-19 pandemic. more
In 1905, philosopher George Santayana famously noted, "Those who cannot remember the past are condemned to repeat it." When past attempts to resolve a challenge have failed, it makes sense to consider different approaches even if they seem controversial or otherwise at odds with maintaining the status quo. Such is the case with the opportunity to make real progress in addressing the many functional issues associated with WHOIS. We need to think differently. more
Both the Internet and North American cellphones are choking under a 32 bit limitation and reactions from protagonists involved in both cases offer striking similarities. 1983 saw the debut of IPv4 and North American mobile telephony started in earnest with Bell's analog AMPS (Advanced Mobile Phone Service). Responding to the need to uniquely identify the growing number of mobile devices in order to bill their owner, the FCC ordered that handsets be equipped with a unique identification number embedded on a chip. This became the 32 bit ESN... more
There is increasingly heated rhetoric in DC over whether or not the government should begin to "regulate the internet." Such language is neither accurate nor new. This language implies that the government does not currently involve itself in governing the internet -- an implication which is clearly untrue given a myriad of laws like CFAA, ECPA, DMCA, and CALEA (not to mention existing regulation of consumer phone lines used for dialup and "special access" lines used for high speed interconnection). more
ICANN has proposed a major change to its bylaws that would require the organization to adopt all policy "advice" issued by the Governmental Advisory Committee (GAC) unless 2/3 of ICANN's non-conflicted board members vote to oppose the adoption of that governmental rule. This draconian proposal to change ICANN's bylaws would fundamentally transform ICANN away from being a "bottom-up" and "private-sector-led" organization and into a governmental regulatory agency... more
Network neutrality is important in the context of assuring the opportunity to innovate in how we communicate and connect. We can't define it in terms of specific outcomes but rather in terms of what we enable. The Internet is just one example of what we can do when given the opportunity to use software to fashion our own solutions... I thought about this more when I found myself in my hospital room (after knee surgery) unable to open and close the shades by myself. But yet I could control the lights in my house! more
Domain blocking mechanisms are an important element of an organization's defensive domain strategy. With the introduction of the New Generic Top-Level Domain (gTLD) Program by the Internet Corporation for Assigned Names and Numbers (ICANN) in 2013, brand owners were faced with a new challenge -- protecting their marks without overburdening their budgets. Defensive domain registrations were and still are an effective way in which a brand can protect itself in domain namespaces. more
A portion of me sympathizes with Richard Hill. He argues passionately in his recent article, "The True Stakes of Internet Governance" for a statist position on Internet governance. It is hard to be an unheeded prophet; difficult to take positions that are not in the comfortable mainstream of what, as you perceive, are lemmings heading for the cliff. I know the feeling. more
According to Google native IPv6 penetration has structurally crossed the 0.2% mark as a percentage of total traffic on the Internet in early 2011. This may not seem much, but it has doubled in a year, in an Internet that is still growing exponentially. more
I tend to chuckle at every new proclamation that email is dead. Google Wave won't kill it. Twitter and Facebook aren't killing it; they're using it. RSS didn't kill it. Instant messaging didn't kill it. "Push media" (remember that?) didn't kill it. AOL and Compuserve and Prodigy didn't kill it; they joined it. And before that, usenet and email lived happily side-by-side. more
EuroDNS, the Luxembourg registrar, used its well attended New Year party last Wednesday to invite the Minister of Telecoms, Jean-louis Schiltz to talk about a law voted at the end of December 2007. According to the Finance and Budget Commission Report on Draft Law 5801, Revenues generated from use of, or license to use, a Domain Name are exempted from Luxembourg corporate taxes up to 80%. more
What began as an emergency response evolved into critical wartime infrastructure. Ukraine's experience with Starlink reveals the strategic risks and benefits of relying on privately operated networks for national resilience and defence. more
Last year I wrote about big disruptive outages on the T-Mobile and the CenturyLink networks. Those outages demonstrate how a single circuit failure on a transport route or a single software error in a data center can spread quickly and cause big outages. I join a lot of the industry in blaming the spread of these outages on the concentration and centralization of networks where the nationwide routing of big networks is now controlled by only a handful of technicians in a few locations. In early October, we saw the granddaddy of all network outages... more