/ Recently Commented

“Do’s and Don’ts”: Commenting on New gTLD Applications

regarding the new gTLD applications and, unfortunately, I have been largely disappointed with the substance of most of them. Too many of the earliest comments express concern over the possibility of having more adult-related extensions. Okay, we hear you... Also, with all due respect to the supporters of Dadotart's application, I appreciate the display of loyalty to this particular applicant but if I have to read another comment from an "impassioned supporter" of the .ART application, I will bang my head on my desk. more

IPv6 Subnetting - The Paradigm Shift

Almost every conversation I have with folks just learning about IPv6 goes about the same way; once I'm finally able to convince them that IPv6 is not going away and is needed in their network, the questions start. One of the most practical and essential early questions that needs to be asked (but often isn't) is "how do I lay out my IPv6 subnets?" The reason this is such an important question is that it's very easy to get IPv6 subnetting wrong by doing it like you do in IPv4. more

Google Fiber: Technology Innovation Or Revenue Assurance?

Google's announcement of its 'Fiberhoods' throughout Kansas City is yet another example of the thought leadership and innovation being brought forward by the popular advertising company. But what does this move say about the state of Internet access in America? more

ITU’s Landmark Decisions

The ITU, through its Council acting as the executive body of the Member States, made a "landmark decision" to make available to the public "the main [WCIT] conference preparatory document" and to establish a publicly accessible page "where all stakeholders can express their opinions" on the preparatory document or other WCIT-related matters. more

IPv6: Don’t Forget About Your Switches!

When preparing a network for IPv6, I often hear network administrators say that their switches are agnostic and that there is no need to worry about them. Not so fast. Yes, LAN switches function mainly at layer 2 by forwarding Ethernet frames regardless of whether the packet inside is IPv4 or IPv6 (or even something else!) However, there are some functions on a switch that operate at layer 3 or higher. more

IPv6 Transitional Uncertainties

The telecommunications industry has been around for quite some time. Whether you take it as a starting date the first efforts with the wired telegraph in the 1830's, or the telephone in the 1870's, this industry has been around for quite a long time. During this periods it has made huge achievements, and there is no doubt that the impacts of this industry have changed our lives in many ways... It is literally amazing that this industry has managed to preserve dial tone on telephone handsets while completely changing the underlying network and switching fabric of the telephone system numerous times. more

The RIRs in a Post-IPv4 world: Is the End of IP Address Policy Making Nigh?

IANA's IPv4 pool was officially exhausted in early 2011; Regional Internet Registries (RIRs) are gradually eating through their remaining IPv4 reserves and, although there will always be a trickle of recycled IPv4 addresses coming through as businesses go bust or ISPs move entirely to IPv6, the bulk of RIR IPv4 activity in future will be maintenance of existing allocation records... While IPv6 is definitely the way of the future for the Internet, the sheer size of the IPv6 address pool, combined with simplified allocation policies that have deliberately reduced barriers to entry, means there are very few organizations that can't get IPv6 directly from the RIRs these days. more

Cyber Criminals Infiltrate Even Small Businesses

I read an interesting article in the Wall Street Journal today entitled Cyber Criminals Sniff out Vulnerable Firms. It's a story of a small business owner in New York whose company was broken into by cyber criminals and stole $1.2 million from its bank accounts, although the owner was able to later recover about $800,000 of that. The moral of the story is that small businesses feel like they are not a major target for online thefts like these. more

Silly Bing

Bing is Microsoft's newish search engine, whose name I am reliably informed stands for Bing Is Not Google. A couple of months ago, as an experiment, I put up a one page link farm at wild.web.sp.am. As should be apparent after about three seconds of clicking on the links there, each page has links to 12 other pages, with the page's host name made of three names, like http://aaron.louise.celia.web.sp.am. The pages are generated by a small perl script and a database of a thousand first names. more

Google’s Secret Strategy With the Kansas City Fiber Project

I have long been perplexed at how Google plans to make a profit with their Kansas City Fiber project. Originally the project was touted as an altruistic move by Google to really understand the underlying costs of deploying fiber in a large municipality. But as anyone who has been in the trenches can tell you, it is not the technology that determines the cost of a fiber deployment, but the tyranny of the take-up. more

ICANN Shows Safe Decisions Aren’t Always the Right Decisions

When ICANN selected Deloitte and IBM to provide technical database administration services for a key part of its new gTLD program, it became quickly clear that the choice was not made on whose proposals scored highest, but rather it was based on which partner presented the least perceived business risk but at a much higher than necessary cost. I know this because I wrote a response to the original RFP and as a result am pretty familiar with what the original specification required. more

The GAC Strikes Back

Last week in Prague, the GAC (Government Advisory Committee) relentlessly hammered ICANN over a range of issues relating to the new gTLD program. And while their criticisms were legitimate, one has to wonder to what extent governments were punishing ICANN for past offenses. At the same time, the ICANN board and management seem to have finally - much belatedly - figured out how important it is to maintain a constructive and positive relationship with governments. more

Cloud Redundancy: How Amazon Should Repair Credibility

I'm curiously puzzled, but not entirely surprised, how a company such as Amazon (NASDAQ: GS) allowed its servers to be interrupted for any length of time due to severe storm damage in northern Virginia this past weekend. Companies using cloud servers are both expectant and dependent on being able to pull information from cloud sources to operate their businesses without interruption. After all, IT professionals have been preaching the security and reliability of the cloud for quite some time to manage large data off-site. Steps for Amazon to repair credibility should be transparent and swift. more

Is IPv6 a Boon to Criminals and Foe to the FBI?

Declan McCullagh recently opined that the "FBI [and the] DEA warn [that] IPv6 could shield criminals from police." His post was picked-up relatively widely in the past few days, with the headlines adding more hyperbole along the way. So just how real is this threat? Let's take a look. more

Is the Future of the Internet at Risk?

The debate about the control of the internet is intensifying, with interesting discussions expected later on this year in Dubai at the WCIT conference organised by the ITU. Over the last 25 years the industry has moved from being mainly telephony-based to being mainly IP-based, and many say that what is now at stake is the future of the internet as we know it at this point in time... The reality now is that the political stakes of the internet have risen significantly. more