/ Most Viewed

3 DNSSEC Sessions Happening At ICANN 50 Next Week in London

As I mentioned in a post to the Deploy360 blog today, there are three excellent sessions relating to DNSSEC happening at ICANN 50 in London next week: DNSSEC For Everybody: A Beginner's Guide; DNSSEC Implementers Gathering; DNSSEC Workshop. Find out more. more

Google Discloses Rising Number of Government Requests

In the spirit of shining more light on how government actions could affect users, Google Inc. in early 2010, began periodically sharing number of government requests received in what it calls the "Transparency Report." more

CAICT Holds ICANN 59 China Internet Community Readout Session

In afternoon of 14th July, the China Academy of Information and Communication Technology (CAICT) and ICANN Beijing Engagement Center jointly held the ICANN 59 China Internet Community Readout Session. Mr. Zhang Ya, Deputy Director of Information and Communication Authority under the Ministry of Industry and Information Technology (MIIT), made his presence and gave opening remarks on the meeting. Over 40 representatives from the Cyberspace Administration, the Ministry of Foreign Affairs, domain name registries and registrars, industrial organizations, institutes and universities participated in the seminar. more

Youth Aren’t Just the Internet’s Future, Youth Shape the Internet’s Future

For the past 27 years, or at least as long as I can remember, I have heard one phrase on an endless loop: "youth are the future." It is a statement that always caused me to feel mild confusion. I thought, "How can I, for instance, be the future if I'm here now?" As I "grew up" and the term "youth" seem to expand in both meaning and breadth of inclusion, I quickly realized that when this statement is used by many it is platitudinous at best and disingenuous rhetoric at worst. What should actually be clarified is that, as no one is immune from the natural progression of the life course (at least not yet anyway), youth will one day constitute the key decision-makers in political, economic and social institutions. more

The Meanings of Network Neutrality

Ed Felten has posted a nice taxonomy of the several meanings people take when they use the term Network Neutrality, briefly: End-to-End Design; Nonexclusionary Business Practice; Content Nondiscrimination ... I've been developing a taxonomy of issues that interact with and are bound with Network Neutrality. So far there are six items... more

Internet and the Telecommunication Acts of 1900

On his blog Bruce Schneier recently published a post called "Power and the Internet". An article that most people in the western world will agree with. Internet freedom against Internet safety and security, the powerful have a lot of power to wield and the rest is at best ad hoc organised or fairly powerless lobby organisations. So who is likely to win? Vested interests, he warns. more

DDI Integration: We Need IPAM

I am a big fan of DDI (DNS, DHCP and IPAM) as magical trio to manage all transactions on network infrastructures... Or to say the least: make it possible. Basically it makes these "Core Network Services" concise, manageable and integrated. It basically makes the network infrastructures of today and the future possible. There is however one thing that continuously seems to irritate when talking about integrating these services on networks. more

Network Outages Go Global

On August 30, CenturyLink experienced a major network outage that lasted for over five hours and disrupted CenturyLink customers nationwide as well as many other networks. What was unique about the outage was the scope of the disruptions as the outage affected video streaming services, game platforms, and even webcasts of European soccer. more

The Role of FttH in the Development of 5G

As the roll out of FttH remains a slow process, it is no wonder that more and more people are looking towards mobile as a potential alternative. Obviously, mobile communication has improved over recent years in providing excellent access to broadband; and it has also become more affordable. At the same time, there is the fabulous hype about 5G, and the PR and media machines of the vendors involved make you believe that this will become a real competitor to the slow moving FttH developments. more

Exploiting the Firewall Beachhead: A History of Backdoors Into Critical Infrastructure

There is no network security technology more ubiquitous than the firewall. With nearly three decades of deployment history and a growing myriad of corporate and industrial compliance policies mandating its use, no matter how irrelevant you may think a firewall is in preventing today's spectrum of cyber threats, any breached corporation found without the technology can expect to be hung, drawn, and quartered by both shareholders and industry experts alike. more

The Death of Millimeter-Wave Cellular?

Apple recently announced that it is not building millimeter-wave spectrum antennas into the next generation SE iPhone. Interestingly, this is a phone sold by Verizon, which spent a year advertising on TV and showing us speed tests on cellphones that were receiving gigabit speeds. more

Domain Name Registrations Reach 209.8 Million, 2.2 Percent Increase over 2010 Q4

The latest Domain Name Industry Brief published by Verisign reports 4.5 million domain names were added to the Internet in the first three months of 2011. According to the report, the first quarter of 2011 closed with a base of more than 209.8 million domain name registrations across all Top Level Domains (TLDs), or a 2.2 percent increase over the fourth quarter of 2010. Registrations grew by 15.3 million, or 7.9 percent year over year. more

What Google Sees While Processing 2 Billion Enterprise Emails Per Day

While the news will not be terribly surprising to CircleID readers, Google's latest report on the status of spam and 2009 predictions posted today, might be of particular interest due to the company's shear email processing volume at 2 billion enterprise email connections per day (drawn from company owned Postini Message Security network)... more

Malware Reach Is Expanding, Ransomware on the Rise

We live in an online age, one where malware infections have become commonplace. Some might say this is the price of doing business online. News headlines report damaging attacks on well-known brands with depressing regularity. Consumer confidence suffers as customers look to organizations to sort out the issue, secure their transactions and fix the problem. more

Who Pays When .Org Prices Rise?

When .org prices rise, who suffers – nonprofits or speculators? Will Ethos Capital raise prices more aggressively than ISOC would? Vint Cerf attributed concerns about higher prices to speculators: "Of course, companies that hold domain names in the tens of thousands for speculative purposes might find such increases more troubling, but I don't have much sympathy for that business model in the context of the organizations the .org brand is intended to serve." more