/ Most Commented

Google’s Spending Spree: 2.4 Million Servers, and Counting

Google just published its Q3 financial results. So, what is Google spending on IT, and how much servers would that buy? This is one of their best kept secrets. In this post I give ballpark estimates based on back-of-the-envelop calculations, similar to the 'guestimates' I made 5 years ago. more

Q3 Saw Massive Virus Volumes While Spam Remained Steady

Spam and virus trends in Q3'10 confirm that spammers are still hard at work distributing malicious content in new and creative ways, according to the latest reports. The latest spam and virus trends report is produced by Postini, Google's email security and archiving service that, according to the company, processes more than 3 billion email messages per day and more than 50,000 businesses. more

U.S. Now Leading Source of Attack Traffic, Followed by China and Russia

The U.S. became the top attack traffic source in the second quarter of 2010, accounting for 11% of observed attack traffic in total, reports Akamai in its State of the Internet Report released today. According to the report, China and Russia held the second and third place spots, accounting for just over 20% of observed attack traffic. Attack traffic from known mobile networks has been reported to be significantly more concentrated than overall observed attack traffic, with half of the observed mobile attacks coming from just three countries: Italy (25%), Brazil (18%) and Chile (7.5%). more

ARIN Recognizes Interop for Returning IPv4 Address Space

ARIN today recognizes Interop, an organization with a long-standing presence in the Internet industry, for returning its unneeded Internet Protocol version 4 (IPv4) address space. Interop was originally allocated a /8 before ARIN's existence and the availability of smaller-sized address blocks. The organization recently realized it was only using a small portion of its address block and that returning the remainder to ARIN would be for the greater good of the Internet community. more

Is the UN Assailing Internet Governance?

The coven of UN bodies with a hand in internet governance keeps getting bigger: not only is the General Assembly intending soon to decide the fate of the Internet Governance Forum (IGF), but if the decision coming out of New York does not give them enough of a role, the UN has a back-up plan. In May of 2011, no less than four specialized UN agencies, UNESCO, UNCTAD, UNDP and (perhaps most legitimately) the ITU, are planning a Conference what will allow them to insert themselves still further into the matter. more

IPv4 Address Space Now Below 5%, Says NRO

The Number Resource Organization (NRO) announced today that less than five percent of the world's IPv4 addresses remain unallocated. APNIC, the Regional Internet Registry for the Asia Pacific region, has been assigned two blocks of IPv4 addresses by the Internet Assigned Numbers Authority (IANA). This latest allocation means that the IPv4 free pool dipped below 10% in January, just nine months ago. Since then, over 200 million IPv4 addresses have been allocated from IANA to the Regional Internet Registries (RIRs). more

The Worm and the Wiretap

According to recent news reports, the administration wants new laws to require that all communications systems contain "back doors" in their cryptosystems, ways for law enforcement and intelligence agencies to be able to read messages even though they're encrypted. By chance, there have also been articles on the Stuxnet computer worm, a very sophisticated piece of malware that many people are attributing to an arm of some government. The latter story shows why cryptographic back doors, known generically as "key escrow", are a bad idea. more

URL Shorteners, Domain Hacks and Quasi-gTLDs: What are ccTLDs Really About?

The Twitterverse is awash with catchy URL shortening services, which allow what would otherwise be long URLs to fit within the strict character limit of individual Tweets. Before the Twitter phenomenon really took hold, tinyurl.com was one of the more popular services; now much shorter options are available, using various Country Code Top-Level Domains (ccTLDs) which have the significant advantage of being only two characters after the last dot. more

IPv6 Momentum?

Last month, the Obama administration sponsored one of the first high-level government workshops on IPv6. At the meeting, the administration's Chief Information Officer, Vivek Kundra, announced a remarkable 2012 deadline for federal agencies to support IPv6. So with a high-level US government mandate and a recent spade of vendor and carrier IPv6 announcements (e.g. VeriSign, Hurricane Electric), is the 15 year old IPv6 migration effort finally gaining momentum? more

The Submarine Cable Conundrum

The boom and bust cycle of submarine cable deployment can be traced back to the 19th century. However it doesn't look as though we have learned a lot in those 150 years. One of the problems is that it generally takes two years to plan these international projects and two years to deploy the system. And even before the process commences there are often an initial two years when the potential builders are contemplating their plans. This means that new cables need to be planned at times when there is little demand for new capacity. more

Richard Clarke: Defend Against Cyberwar by Re-Architecting Networks, Not Buying More Technology

In his keynote yesterday at the RSA Security Conference, former U.S. top chief counter-terrorism adviser, Richard A. Clarke, said cyberwar defence efforts need to focus on re-architecting networks not buying more technology. more

Poland Launches Eastern Europe’s First Commercial LTE Network

Paul Budde writes: "Two relatively new mobile market entrants, Mobyland and Centernet, have launched Poland and Eastern Europe's first commercial LTE network. Vendor Huawei provided the equipment for the network, which operates in the 1800MHz frequency band. Both Mobyland and Centernet previously offered GSM services in the frequency band before refarming the spectrum to offer LTE. The operators aim to expand coverage to 20% of the population by 2011 by deploying 700 base stations." more

IPv6 and the Fear of Brokenness

Brokenness refers to the situation whereby a website is made accessible in dual stack, meaning both IPv4 and IP6, using records referred to as A's for IPv4 and quad A's for IPv6. Some end-users can experience slower access to the website or in some rarer instances no access at all. Brokenness is mostly attributable to older versions of the Mac Os operating system... The brokenness issue has been very well described by Eric Vyncke... more

ICANN Close to Final DAG for Top-Level Domains: Will Policy Concerns by New Applicants Be Resolved?

ICANN's plan to increase competition and bring innovation in the domain space by launching top-level domains (TLD) seems to be in full swing following the resolutions at the last ICANN Board retreat in Norway. However one area that seems unclear is who will take responsibility in determining the TLD winners. After years of continuous additions, retractions and amendments, the Draft Applicant Guidebook (DAG) is not yet finalized. However, the word in the ICANN community is that the TLD program launch will be in effect immediately after the ICANN San Francisco meeting held in March 2011. more

Finding the Holes in Your Application Security Blanket

Last month, application security provider Veracode came out with a study that stated that more than half of all enterprise applications aren't secure. The company tested approximately 2,900 applications over an 18-month period, and 57 percent failed to meet Veracode's "acceptable levels" of security. While this study gained a tremendous amount of traction in the media... it does not focus on the bigger issue... more