/ Most Viewed

Users Don’t Like Forwarded Spam

A message on Dave Farber's Interesting People list complained that Comcast was blocking mail forwarded by DynDNS, a popular provider of DNS and related services for small-scale users... Actually, they're blocking it because a lot of it is spam. This is a problem that every mail forwarder and every mail system encounters; the only unusual thing here is that DynDNS is whining about it. It's yet another way that spammers have broken the mail for the rest of us. more

Medical Body Area Networks

The Federal Communications Commission (FCC) in Washington has advanced its wireless health care agenda by adopting rules that will enable Medical Body Area Networks (MBANs), low-power wideband networks consisting of multiple body-worn sensors that transmit a variety of patient data to a control device. MBANs provide a cost effective way to monitor every patient in a healthcare institution, so clinicians can provide real-time and accurate data which allows them to intervene if necessary. more

ISOC-NY Panel: The Future of WHOIS Policy (Webcast)

The Metropolitan NY Chapter of the Internet Society continued its popular series of public events at the Jefferson Market library in Greenwich Village with a panel discussion on WHOIS policy, moderated by Danny Younger. This is a contentious issue, involving tradeoffs between privacy, anonymity, and accountability. more

Amazon Announces IPv6 Support for Amazon CloudFront, AWS WAF, and Amazon S3 Transfer Acceleration

Amazon has made an announcement that CloudFront, AWS WAF, and Amazon S3 Transfer Acceleration have all been updated to support IPv6. more

Triple Challenge of Network Transformation

Following my comments about the iPhone VoLTE announcement I had an interesting conversation with Andy Huckridge from Gigamon, a company that provides intelligent traffic visibility networking solutions for enterprises, datacentres and service providers around the globe. An interesting concept that we discussed was the 'triple challenge of network transformation'. The three elements of this challenge are... more

Internet Evolution: Another 10 Years Later

Ten years ago, I wrote an article that looked back on the developments within the Internet over the period from 1998 to 2008. Well, another ten years have gone by, and it's a good opportunity to take a little time once more to muse over what's new, what's old and what's been forgotten in another decade of the Internet's evolution... The evolutionary path of any technology can often take strange and unanticipated turns and twists. more

Domain Registrars File Lawsuit Against ICANN

Members of the Domain Justice Coalition filed a lawsuit today requesting a temporary restraining order and other relief against ICANN to block the implementation of a domain name Wait Listing Service (WLS). The WLS was proposed by VeriSign, Inc. (pdf) and approved by ICANN in federal court in Los Angeles. The suit challenges ICANN's failure to comply with its internal decision-making process requirements when it approved implementation of the WLS in the face of opposition from domain name registrars, resellers and consumers. more

Instead of a New gTLD, Maybe There Ought to be an App for That

The conflicting yet co-existing anxiety and enthusiasm in support of expanded Internet territory -- those new generic Top-Level Domains (gTLDs) we have heard so much about -- may be misplaced. If the economic reports commissioned by ICANN are to be believed (non, nod, wink, wink), top level domains fall flat because they are either too tightly defined (.museum?) or lightly marketed (.aero?). Building a business plan to give a new gTLD the market and marketing reach it will need to succeed is a heavy lift. more

China’s Censorship Arms Race Escalates

Last week the China Digital Times reported that a photo (shown in the post) has been making the rounds in Chinese blogs and chatrooms. It is an image of a "computer science float" for Thursday's National Day parade, onto which somebody has photoshopped a screenshot of the Internet Explorer error message familiar to anybody who has ever tried to access a blocked website in China: "This page cannot be displayed." more

IPv6 and the Fear of Brokenness

Brokenness refers to the situation whereby a website is made accessible in dual stack, meaning both IPv4 and IP6, using records referred to as A's for IPv4 and quad A's for IPv6. Some end-users can experience slower access to the website or in some rarer instances no access at all. Brokenness is mostly attributable to older versions of the Mac Os operating system... The brokenness issue has been very well described by Eric Vyncke... more

South Korean Banks Receive DDoS Threat from Hacker Group, Record Ransomware Payment Demanded

Various sources including South Korea's news agency Yonhap are reporting that a hacker group has threatened to launch a DDoS attack against seven South Korean banks unless they pay about 360 million won (US$315,000) in bitcoin. more

Tracking Internet Piracy: Harder Than You Think

Wired Magazine recently published an article called "The Shadow Internet", where it says: "Anathema is a so-called topsite, one of 30 or so underground, highly secretive servers where nearly all of the unlicensed music, movies, and videogames available on the Internet originate. Outside of a pirate elite and the Feds who track them, few know that topsites exist. Even fewer can log in." But what are the difficulties in tracking and identifying these so-called topsites? Joel Snyder, a senior network consultant responds. more

UDRP Good for Trademark Protection, Not So Good for Political Process

Social Science Research Network has published a paper examining "the large gaps and inconsistencies in current domain name law and policy" as compared with domain name use in the political context. The paper suggests that the current domain name policy is focused on protecting trademark uses of domain names against bad faith commercial 'cybersquatters' but does not deal with protecting use of domain names as part of the political process. more

The FTC Authentication Summit

The Federal Trade Commission and NIST had a two-day Authentication Summit on Nov 9-10 in Washington DC. When they published their report explaining their decision not to create a National Do Not Email Registry, the FTC identified lack of e-mail authentication as one of the reasons that it wouldn't work, and the authentication summit was part of their process to get some sort of authentication going. At the time the summit was scheduled, the IETF MARID group was still active and most people expected it to endorse Microsoft's Sender-ID in some form, so the summit would have been mostly about Sender-ID. Since MARID didn't do that, the summit had a broader and more interesting agenda. more

Prof. Dave Farber on Where the Internet is Headed

"Internet protocols simply aren't adequate for the changes in hardware and network use that will come up in a decade or so," says Professor Dave Farber who was recently interviewed by Andy Oram. "Dave predicts that computers will be equipped with optical connections instead of pins for networking, and the volume of data transmitted will overwhelm routers, which at best have mixed optical/electrical switching," writes Oram.  more