/ Recently Commented

Creating, Protecting and Defending Brand Equity - Part 1

Trademark laws exist around the world to facilitate the use, registration and protection of your brand. With the incredible growth of the internet and the surge in global commerce it has helped produce, the importance of having a recognizable name has grown. In tandem, the risk of infringement, the threat of someone else trading on or benefiting from someone else's brand equity, has also grown. While it is easier than ever to create a global brand, the challenges involved in protecting the equity it creates have increased. more

ICANN Hires Black Hat Founder as New CSO

ICANN has apparently hired Jeff Moss (aka Dark Tangent) as CSO. Moss is a well known figure in the internet security community and was founder of Black Hat and the Def Con conferences. However isn't Moss a bit conflicted? Isn't he on one of the review teams? more

Average Connection Speeds on Mobile Networks Fastest in Greece, Says Akamai

In the fourth quarter of 2010, a mobile provider in Greece (GR-1) had the highest average connection speed, at just over 4.5 Mbps, according to Akamai's latest State of the Internet Report. "The mobile providers in Slovakia and Russia that had previously been reported as having the highest average connection speeds were removed from consideration in the fourth quarter, as further research determined that their autonomous systems carried a mix of traffic from fixed and mobile connections." more

US House Subcommittee to Hold Hearing for ICANN’s New TLD Rollout

Kevin Murphy reporting in DomainIncite: "The House Subcommittee on Intellectual Property, Competition and the Internet will hold an 'ICANN Generic Top-Level Domains (gTLD) Oversight Hearing' on Wednesday May 4 at 10am local time. The hearing has been called at the direction of the committee's chairman, Rep. Bob Goodlatte." more

Study Reports on Baseline of Global IPv6 Adoption

A new research on native IPv6 traffic across six large providers in North America and Europe suggest that despite fifteen years of IPv6 standards development, vendor releases and advocacy, only a small fraction of the Internet has adopted IPv6. "The slow rate of IPv6 adoption stems from equal parts of technical/design hurdles, lack of economic incentives and general dearth of IPv6 content." more

Microsoft Direct Access: Is it Heaven or Hell for IPv6?

I must confess, during the past couple of years I have highlighted the VPN-solution Direct Access (DA) from Microsoft as a killer application for IPv6. I still have hope for this solution, but as I now have had the chance to study the UAG/DA-solution more closely and in practical implementation, I must also highlight some issues for Microsoft to handle. My conclusion is that using DA today brings difficulties when it comes to an organization that already has, or wants to, deploy native IPv6 internally. more

Bringing a Responsible Closure to the gTLD Implement Process

Last Friday ICANN released an updated new generic Top-Level Domain (gTLD) Applicant Guidebook that appears to have taken a number of positive steps toward closing the divide between the ICANN Board and the Governmental Advisory Committee (GAC). One of the more important changes to the Applicant Guidebook was the following text... more

The Distribution of Botnets Since Rustock Went Down

I pulled together some statistics on my collection of botnet statistics for the period of time between Rustock being shut down and Wednesday, April 6. I wanted to see the distribution of botnets per country - now that Rustock is down, which country has the most botnet infections (as measured by unique IP addresses that send us spam)? more

Asia Pacific IPv4 Exhausted, Becomes First Region Unable to Meet IPv4 Demand

Asia Pacific Network Information Center (APNIC) today announced it has reached the last block of its available pool of IPv4 addresses. The day is marked as key turning point which initiates a major change in regional delegation policy. more

A Closer Look at the ‘Level 3 + Global Crossing’ Union

On Monday, 11 April 2011, Level 3 announced they had entered a definitive agreement to acquire Global Crossing. According to the Renesys Market Intelligence rankings, this merger would bring together the world's #1 and #2 global providers, with over half the Internet market on earth dependent on the combined entity. If the deal gained regulatory approval in the US and elsewhere today, how would the Internet provider landscape change? We'll answer that question in this blog, giving the proposed union a fictional name of Level Crossing for the purposes of our discussion. more

TelChina, China Mobile Building Mobile Payment Solution With .tel

Telnic Limited, the registry operator for the .tel top level domain (TLD), today announced that its regional partner TelChina and China Mobile, a leading mobile phone company, have entered into a strategic relationship to develop Mobile-Pay services on the .tel platform. ... On this platform, users will not have to log on to various websites for payment, but accomplish it through the clicking of a Mobile-Pay link on a .tel page. more

Major International Botnet Disabled Says U.S. Department of Justice

The U.S. Department of Justice and the FBI announced on Wednesday that they have taken actions to disable an international botnet of more than two million infected computers responsible for stealing corporate data including user names, passwords and financial information. more

Beyond the Top Level: DNSSEC Deployment at ICANN 40

I recently wrote about the encouraging level of DNSSEC adoption among top-level domain name registries, and noted that adoption at the second level and in applications is an important next step for adding more security to the DNS. The root and approximately 20 percent of the top level domains are now signed; it is time for registrars and recursive DNS servers operated by the ISPs to occupy center stage. more

Unlimited Bandwidth is Disrupting Infrastructure Models

Over the last ten years we have heard a lot about edge-based services. These were needed to enable the operation of applications at the edge of the network, as the lack of available bandwidth capacity made it difficult to do so over the core network. However, with the prospect of limitless bandwidth the design of the network is changing again. more

Facts & Tips for Consumers About the Epsilon Breach

There has been a lot of talk, blogging, tweeting and press reportage about the Epsilon breach, but little in the way of concrete information to consumers as to where they stand, if their personal information (PII) such as their name and email address has been lost to criminals. The CAUCE Board of Directors have developed the following FAQ that provides facts and guidance for those affected by the breach. more