ARIN today recognizes Interop, an organization with a long-standing presence in the Internet industry, for returning its unneeded Internet Protocol version 4 (IPv4) address space. Interop was originally allocated a /8 before ARIN's existence and the availability of smaller-sized address blocks. The organization recently realized it was only using a small portion of its address block and that returning the remainder to ARIN would be for the greater good of the Internet community. more
The coven of UN bodies with a hand in internet governance keeps getting bigger: not only is the General Assembly intending soon to decide the fate of the Internet Governance Forum (IGF), but if the decision coming out of New York does not give them enough of a role, the UN has a back-up plan. In May of 2011, no less than four specialized UN agencies, UNESCO, UNCTAD, UNDP and (perhaps most legitimately) the ITU, are planning a Conference what will allow them to insert themselves still further into the matter. more
The Number Resource Organization (NRO) announced today that less than five percent of the world's IPv4 addresses remain unallocated. APNIC, the Regional Internet Registry for the Asia Pacific region, has been assigned two blocks of IPv4 addresses by the Internet Assigned Numbers Authority (IANA). This latest allocation means that the IPv4 free pool dipped below 10% in January, just nine months ago. Since then, over 200 million IPv4 addresses have been allocated from IANA to the Regional Internet Registries (RIRs). more
According to recent news reports, the administration wants new laws to require that all communications systems contain "back doors" in their cryptosystems, ways for law enforcement and intelligence agencies to be able to read messages even though they're encrypted. By chance, there have also been articles on the Stuxnet computer worm, a very sophisticated piece of malware that many people are attributing to an arm of some government. The latter story shows why cryptographic back doors, known generically as "key escrow", are a bad idea. more
The Twitterverse is awash with catchy URL shortening services, which allow what would otherwise be long URLs to fit within the strict character limit of individual Tweets. Before the Twitter phenomenon really took hold, tinyurl.com was one of the more popular services; now much shorter options are available, using various Country Code Top-Level Domains (ccTLDs) which have the significant advantage of being only two characters after the last dot. more
Last month, the Obama administration sponsored one of the first high-level government workshops on IPv6. At the meeting, the administration's Chief Information Officer, Vivek Kundra, announced a remarkable 2012 deadline for federal agencies to support IPv6. So with a high-level US government mandate and a recent spade of vendor and carrier IPv6 announcements (e.g. VeriSign, Hurricane Electric), is the 15 year old IPv6 migration effort finally gaining momentum? more
The boom and bust cycle of submarine cable deployment can be traced back to the 19th century. However it doesn't look as though we have learned a lot in those 150 years. One of the problems is that it generally takes two years to plan these international projects and two years to deploy the system. And even before the process commences there are often an initial two years when the potential builders are contemplating their plans. This means that new cables need to be planned at times when there is little demand for new capacity. more
In his keynote yesterday at the RSA Security Conference, former U.S. top chief counter-terrorism adviser, Richard A. Clarke, said cyberwar defence efforts need to focus on re-architecting networks not buying more technology. more
Paul Budde writes: "Two relatively new mobile market entrants, Mobyland and Centernet, have launched Poland and Eastern Europe's first commercial LTE network. Vendor Huawei provided the equipment for the network, which operates in the 1800MHz frequency band. Both Mobyland and Centernet previously offered GSM services in the frequency band before refarming the spectrum to offer LTE. The operators aim to expand coverage to 20% of the population by 2011 by deploying 700 base stations." more
Brokenness refers to the situation whereby a website is made accessible in dual stack, meaning both IPv4 and IP6, using records referred to as A's for IPv4 and quad A's for IPv6. Some end-users can experience slower access to the website or in some rarer instances no access at all. Brokenness is mostly attributable to older versions of the Mac Os operating system... The brokenness issue has been very well described by Eric Vyncke... more
ICANN's plan to increase competition and bring innovation in the domain space by launching top-level domains (TLD) seems to be in full swing following the resolutions at the last ICANN Board retreat in Norway. However one area that seems unclear is who will take responsibility in determining the TLD winners. After years of continuous additions, retractions and amendments, the Draft Applicant Guidebook (DAG) is not yet finalized. However, the word in the ICANN community is that the TLD program launch will be in effect immediately after the ICANN San Francisco meeting held in March 2011. more
Last month, application security provider Veracode came out with a study that stated that more than half of all enterprise applications aren't secure. The company tested approximately 2,900 applications over an 18-month period, and 57 percent failed to meet Veracode's "acceptable levels" of security. While this study gained a tremendous amount of traction in the media... it does not focus on the bigger issue... more
A recent study released today suggests 53 percent of critical infrastructure providers have experienced what they perceived as politically motivated cyber attacks. According to Symantec's 2010 Critical Information Infrastructure Protection (CIP) Survey, participants claimed to have experienced such an attack on an average of 10 times in the past five years, incurring an average cost of $850,000 during a period of five years to their businesses. more
In late September Google introduced Google Instant, an auto-complete algorithm that assists users in searching with greater speed. Google's new service predicts search queries in real time, can catch a mistake if the user mistyped and guides users to previously performed searches. This new service greatly benefits top brands on the Internet and those that have purchased key words and ad words; while it might not be as beneficial for companies with low website traffic or those that are not well known. more
On Saturday, you were probably enjoying a quiet morning, sipping your coffee as you consumed headlines about news from New York to New Delhi. The headlines related to Internet business were probably much different than what you would have seen 10 years ago. Then, there were just 20 million domain names in use, ten percent of what is now our domain universe. But ten years ago, many of us in the industry weren't enjoying an easy morning with our coffee; we were harried from a sleepless night of poring over hundreds of pages that would constitute the first new Top-Level Domain (TLD) bids submitted to ICANN, ever. more