/ Recently Commented

The Worm and the Wiretap

According to recent news reports, the administration wants new laws to require that all communications systems contain "back doors" in their cryptosystems, ways for law enforcement and intelligence agencies to be able to read messages even though they're encrypted. By chance, there have also been articles on the Stuxnet computer worm, a very sophisticated piece of malware that many people are attributing to an arm of some government. The latter story shows why cryptographic back doors, known generically as "key escrow", are a bad idea. more

URL Shorteners, Domain Hacks and Quasi-gTLDs: What are ccTLDs Really About?

The Twitterverse is awash with catchy URL shortening services, which allow what would otherwise be long URLs to fit within the strict character limit of individual Tweets. Before the Twitter phenomenon really took hold, tinyurl.com was one of the more popular services; now much shorter options are available, using various Country Code Top-Level Domains (ccTLDs) which have the significant advantage of being only two characters after the last dot. more

IPv6 Momentum?

Last month, the Obama administration sponsored one of the first high-level government workshops on IPv6. At the meeting, the administration's Chief Information Officer, Vivek Kundra, announced a remarkable 2012 deadline for federal agencies to support IPv6. So with a high-level US government mandate and a recent spade of vendor and carrier IPv6 announcements (e.g. VeriSign, Hurricane Electric), is the 15 year old IPv6 migration effort finally gaining momentum? more

The Submarine Cable Conundrum

The boom and bust cycle of submarine cable deployment can be traced back to the 19th century. However it doesn't look as though we have learned a lot in those 150 years. One of the problems is that it generally takes two years to plan these international projects and two years to deploy the system. And even before the process commences there are often an initial two years when the potential builders are contemplating their plans. This means that new cables need to be planned at times when there is little demand for new capacity. more

Richard Clarke: Defend Against Cyberwar by Re-Architecting Networks, Not Buying More Technology

In his keynote yesterday at the RSA Security Conference, former U.S. top chief counter-terrorism adviser, Richard A. Clarke, said cyberwar defence efforts need to focus on re-architecting networks not buying more technology. more

Poland Launches Eastern Europe’s First Commercial LTE Network

Paul Budde writes: "Two relatively new mobile market entrants, Mobyland and Centernet, have launched Poland and Eastern Europe's first commercial LTE network. Vendor Huawei provided the equipment for the network, which operates in the 1800MHz frequency band. Both Mobyland and Centernet previously offered GSM services in the frequency band before refarming the spectrum to offer LTE. The operators aim to expand coverage to 20% of the population by 2011 by deploying 700 base stations." more

IPv6 and the Fear of Brokenness

Brokenness refers to the situation whereby a website is made accessible in dual stack, meaning both IPv4 and IP6, using records referred to as A's for IPv4 and quad A's for IPv6. Some end-users can experience slower access to the website or in some rarer instances no access at all. Brokenness is mostly attributable to older versions of the Mac Os operating system... The brokenness issue has been very well described by Eric Vyncke... more

ICANN Close to Final DAG for Top-Level Domains: Will Policy Concerns by New Applicants Be Resolved?

ICANN's plan to increase competition and bring innovation in the domain space by launching top-level domains (TLD) seems to be in full swing following the resolutions at the last ICANN Board retreat in Norway. However one area that seems unclear is who will take responsibility in determining the TLD winners. After years of continuous additions, retractions and amendments, the Draft Applicant Guidebook (DAG) is not yet finalized. However, the word in the ICANN community is that the TLD program launch will be in effect immediately after the ICANN San Francisco meeting held in March 2011. more

Finding the Holes in Your Application Security Blanket

Last month, application security provider Veracode came out with a study that stated that more than half of all enterprise applications aren't secure. The company tested approximately 2,900 applications over an 18-month period, and 57 percent failed to meet Veracode's "acceptable levels" of security. While this study gained a tremendous amount of traction in the media... it does not focus on the bigger issue... more

Over Half of Critical Infrastructure Providers Report Politically Motivated Cyber Attacks

A recent study released today suggests 53 percent of critical infrastructure providers have experienced what they perceived as politically motivated cyber attacks. According to Symantec's 2010 Critical Information Infrastructure Protection (CIP) Survey, participants claimed to have experienced such an attack on an average of 10 times in the past five years, incurring an average cost of $850,000 during a period of five years to their businesses. more

Google Instant - Great for Top Internet Brands

In late September Google introduced Google Instant, an auto-complete algorithm that assists users in searching with greater speed. Google's new service predicts search queries in real time, can catch a mistake if the user mistyped and guides users to previously performed searches. This new service greatly benefits top brands on the Internet and those that have purchased key words and ad words; while it might not be as beneficial for companies with low website traffic or those that are not well known. more

10 Years Since the Internet Was Changed Forever

On Saturday, you were probably enjoying a quiet morning, sipping your coffee as you consumed headlines about news from New York to New Delhi. The headlines related to Internet business were probably much different than what you would have seen 10 years ago. Then, there were just 20 million domain names in use, ten percent of what is now our domain universe. But ten years ago, many of us in the industry weren't enjoying an easy morning with our coffee; we were harried from a sleepless night of poring over hundreds of pages that would constitute the first new Top-Level Domain (TLD) bids submitted to ICANN, ever. more

Google Cracks Down on Illegal Online Pharmacies

Announced on the Google Blog last week, the search engine giant has filed a federal lawsuit against a group of rogue pharmacies in an effort to stop them from advertising on its search engine and websites. Michael Zwibelman, the company's litigation counsel, notes that the advertisers have deliberately "violated policies and circumvented technological measures" by using Adwords to promote pharmacy and prescription-drug operations without verification from the National Association of Boards of Pharmacy. more

Are New TLDs Truly About Competition and Innovation or Is It to Make ICANN Rich and Powerful?

The ICANN Board resolutions adopted during the retreat in Trondheim, Norway on the 25th of September, 2010, painted yet another question mark for new Top-Level Domains (TLDs), despite its positive outlook. While the Board seems dedicated to resolve all the outstanding issues, applicants were still left in the dark in regards to some key issues that affect the economics of launching new TLDs. more

Net Neutrality - The Phoney War?

The current battles being fought over net-neutrality were over before they began. Whether you regard it as a good thing or a bad thing the world already has a multi-tiered internet and it's likely to become even more stratified in the coming years. Most markets, or perhaps countries is a better grouping, depend on commercial organisations to deploy broadband access and to serve the consumers that sign-up. The internet service providers that governments and customers depend on to reach more and more consumers and in increasingly difficult locations (read 'less likely to generate revenue') are there to make money. more