/ Most Viewed

OpenFlow - The Programmable Network Revolution

Over the past few months I have made regular references to OpenFlow. This is an exciting new development that fits in very well with several of the next generation technology developments that we have discussed in some detail over the past few years -- new developments such smart cities and smart societies, the internet of things. Such networks need to operate more on a horizontal level, rather than the usual vertical connection between a computing device and the users. more

Unfamiliarity and Unpreparedness in Proceedings Under the UDRP

There is a difference, of course, between asserting a claim that cannot possibly succeed in an administrative proceeding under the Uniform Domain Name Dispute Resolution Policy (UDRP) and being unprepared to prove a claim that may have merit with the right evidence. Still, there is also an overlapping similarity in that complainants are either shockingly unfamiliar with UDRP procedures and jurisprudence... more

At the Start of the NL IGF

At the annual Dutch "delegation" dinner at the Internet Governance Forum (IGF) in Vilnius, Lithuania, I voiced that it may be a good idea to start a Dutch IGF. This followed a discussion in which we discussed the possibilities of involving more people and organisations from the Netherlands in Internet governance. The, now, Ministry of Economic Affairs, Agriculture and Innovation followed this thought and made it possible for the ECP/EPN foundation to start the NL IGF. more

Cuba’s New WiFi Regulations – Good, Bad or Meh?

Soon after ETECSA began rolling out WiFi hotspots for Internet access, people began linking to them from homes and community street nets. These connections and importing the WiFi equipment they used were illegal, but generally tolerated as long as they remained apolitical and avoided pornography. Regulations passed last month legalized some of this activity in a bid to boost connectivity by allowing Internet access from homes and small private businesses like restaurants and vacation rentals that are located close enough to a hotspot to establish a WiFi connection. more

Beyond Domains: What Did We Really Learn in 2009?

The beginning of every year is a time for introspection, an appraisal of the year that was, and planning for the year to come. It is also a time to follow tradition and to recap the biggest news of the year. But by now, I am guessing that we have all read our fair share about the people and events who have impacted the last 12 months... if we take a larger vantage point (than our own relatively small domain name industry), these lessons from 2009 -- in my view -- could teach us all and most importantly, really shape the year ahead. more

Indonesia’s Largest Telecom Provider Leaks Large Portions of the Global Routing Table

Earl Zmijewski from Renesys reports: Yesterday, Indosat, one of Indonesia’s largest telecommunications providers, leaked large portions of the global routing table multiple times over a two-hour period. This means that, in effect, Indosat claimed that it “owned” many of the world’s networks. Once someone makes such an assertion, typically via an honest mistake in their routing policy, the only question remaining is how much of the world ends up believing them and hence, what will be the scale of the damage they inflict? more

Nov 25th Deadline To Nominate Technical Community Reps for IGF Multistakeholder Advisory Group (MAG)

Would you (or someone you know) be interested in representing the "technical community" on the Multistakeholder Advisory Group (MAG) of the Internet Governance Forum (IGF)? If so, the deadline to nominate someone (including yourself) is Monday, November 25, 2013. Under-Secretary-General Wu Hongbo of UNDESA has issued a statement on the Internet Governance Forum (IGF) Multistakeholder Advisory Group (MAG) renewal process for 2014 with the stated aim of rotating one third of the MAG members. more

Building a Secure Global Network

Recently, the DNS has come under an extensive attack. The so-called "DNSpionage" campaigns have brought to light the myriad methods used to infiltrate networks. These attacks employed phishing, system hopping via key exfiltration, and software zero day exploits, illustrating that many secure networks may not be fully protected. more

The Internet Portal Strategy, Circa 2011

Ev Ehrlich over at High Tech Forum wrote an excellent piece yesterday about some recent comments by Google's Eric Schmidt. According to Schmidt there are four megafirms right now executing well on what he calls "platform strategies" - Google (search), Apple (gadgets/ecosystem), Amazon (online retailing) and Facebook (social connectivity). more

Unintended Benefits of Trump’s Twitter Tantrum

Four years ago, progressive intergovernmental organizations like the European Union became increasingly concerned about the proliferation of hate speech on social media. They adopted legal mechanisms for removing Twitter accounts like Donald Trump's. The provisions were directed at Facebook, Twitter, and YouTube. In June of 2016, a "deconstruction" of these mechanisms was presented to one of the principal global industry standards bodies with a proposal to develop new protocols to rapidly remove such accounts. more

Long-held Domain Names Transferred to Complainants

There has lately been a number of long-held investor registered domain names transferred to complainants under the Uniform Domain Name Dispute Resolution Policy (UDRP). Two of the domain names were registered 23 years ago. This has provoked several commentators to complain that the UDRP is tilted in favor of mark owners and trademark-friendly panelists expressing hostility to the domain industry. I think we have to dig deeper than this. more

Ignorance of History

An international institutional battle of sorts has been playing out in a segment of the trade press over the past couple of weeks over the venue of the Oct 2027 World Radiocommunication Conference (WRC-27). The treaty conference held under the auspices of the International Telecommunication Union (ITU) Radiocommunication Sector is part of a continuum of intergovernmental activities that began in Berlin in 1903. more

Why Passwords Have Never Been Weaker and Crackers Have Never Been Stronger

The past few weeks, I've been on this security kick particularly when it comes to encryption. I'm developing my own app in my spare time. So I'm trying a whole bunch of things, no doubt making plenty of mistakes in the process. Luckily, the data I am protecting is only quasi-valuable so I can afford to take a hit due to my own conscious incompetence. Anyhow, I ran across this article on Ars Technica yesterday entitled "Why Passwords have never been weaker - and crackers have never been stronger." It's a long article and it will take you a while to read it, but here is my summary. more

The Business Of Domains: Shifting The Paradigm

For a business that started with few competitors and unlimited markets, the domain name registration trade has certainly become quite difficult and price sensitive. As the owner or manager of your firm, you have a basic choice to make: You can pull back and ride out this difficult period, or you can use this disruption to your advantage. Can a savvy owner or manager bring profitable growth to his or her company? One positive answer may not be in familiar spaces, but in new markets. more

Widespread Network Outages Disrupt AT&T Services Across the US

In a significant service disruption early Thursday, AT&T's network experienced widespread outages, affecting cellular service and internet connectivity for users across the United States. According to the tracking site Downdetector, the issues began around 4 a.m. ET, with over 32,000 reports of outages, which surged to more than 71,000 by 8 a.m. ET. more