There is no such thing as a 25/3 Mbps broadband connection, or a 100/20 Mbps broadband connection, or even a symmetrical gigabit broadband connection on fiber. For a long list of reasons, the broadband speeds that make it to customers vary widely by the day, the hour, and the minute. And yet, we've developed an entire regulatory system built around the concept that broadband connections can be neatly categorized by speed. more
Mozilla and the National Science Foundation have announced a $2 million prize for ideas that decentralize the web; prizes will be available for both early-stage design concepts and fully-working prototypes. more
Now that ICANN has stuck to its guns and only placed 4 new gTLD's strings that look confusingly similar into contention sets, rather than those that sound identical, such as .inc and .ink or those that have the same meaning like .Law and .Lawyer or those that are singular and plurals of the same word, like .deal and .deals, we now that many new gTLD's are going to have a very a tough marketing road and face a lot of consumer confusion. more
DomainKeys Identified Mail (DKIM) is the leading email authentication technology, supported by major ISPs including Google, AOL, and Yahoo! (who invented its predecessor), popular mail server software like Sendmail, and many of the best minds in email technology. But if you peruse the archives of the IETF DKIM mailing list, or start up a conversation at MAAWG, it might appear that there's still a lot of disagreement about what a DKIM signature actually means. more
There is some good news about the decision by Verizon Wireless to offer shared monthly data plans. But there could be a lot more if the FCC applied its Carterfone policy. That policy gave consumers the power to decide what and how many devices to attach to a network connection. If Carterfone applied, consumers could use multiple devices to access a network subscription, albeit perhaps not at the same time. more
The Internet as we know it and use it today -- is broken, badly broken. Yes broken so much so that we are really crazy to have any expectations of privacy or security. Yes, really. The Internet was conceived as somewhat of a utopian environment, one where we all keep our doors, windows and cars unlocked and we trust all the people and machines out there to "do the right thing...". more
As a follow-up to our previous CircleID article "Strong Support for IDNs, GEOs and/or Communities to Go First" we have developed a flow chart which visualizes how the applications may be processed in a fair and transparent manner. The chart also shows that at the end of the day only about 1,200 new gTLDs may go online, that means that we will likely see about 730 drop outs. more
When the U.S. Digital Television Transition (DTV) transition happens in Feb. 2009, channels 2 through 51 will remain allocated for television transmission. Few of the nation's television markets actually use 49 channels. Indeed, most use less than half of that number... Today, with Congress in recess, leaving less room for last-minute-Lucy-with-the-football lobbying gambits, the Federal Communications Commission (FCC) appears to be poised to release a report saying the white spaces can be used without necessarily causing interference to existing broadcasts. There are still many questions to be answered... more
A few months ago I published a blog post about Verisign's plans to increase the strength of the Zone Signing Key (ZSK) for the root zone. I'm pleased to provide this update that we have started the process to pre-publish a 2048-bit ZSK in the root zone for the first time on Sept. 20. Following that, we will publish root zones with the larger key on Oct. 1, 2016. more
Two ccTLD signals should get more attention when we're talking about the domains' benefits. Companies in emerging markets can signal their brands to expats and/or westerners. This ability to take the companies' appeal beyond their immediate, national markets deserves a look and some appreciation. Traditionally, Western companies have been the ones who registered ccTLDs to signal target="_blank" operations in overseas markets, while companies in emerging markets use them to signal their local brands to the local market. more
The most effective early email-borne viruses didn't need botnets. They didn't change your computer settings, or steal your login credentials. And they somehow convinced regular users to help them spread. The first warnings about the Good Times virus began to appear in November of 1994, and by December the warnings were seen all over as people did what the warning said, and forwarded it to all their friends. There was another outbreak the following March... more
ICANN and the Swiss-based Universal Postal Union (UPU) have signed an agreement giving the UPU managing authority over .post as a top-level domain (TLD). At the highest conceptual level, the agreement represents linking the TLD with the real-world physical networks of the postal system, with 600,000 global physical offices and proximity to most humans. To enable its customers to take advantage of the services the UPU envisions for .post, the UPU is already installing the first computers in many villages in their local post offices to provide those services, says the announcement. more
The NTIA has published a Notice of Inquiry, Assessment of the Transition of the Technical Coordination and Management of the Internet's Domain Name and Addressing System, in advance of the expiration of the Joint Project Agreement in September 2009. The document outlines the history and evolution of the Memorandum of Understanding (MOU) between the Department of Commerce (DoC) and ICANN, and the questions posed cover fairly standard territory. However, the following might be worth paying attention to... more
As AI accelerates global data demand, tech giants are investing heavily in subsea cables. These critical networks face rising geopolitical scrutiny and security risks, reshaping the future of digital infrastructure and global connectivity. more
I read, with some small amount of discomfort, an article by Bill Brenner on CSO Online, wherein he interviewed several other CSOs and other "Security Execs" on their opinions on the firing of Pennsylvania CISO Robert Maley. For those who haven't heard about this, Mr. Maley was fired for talking about a security incident during the recent RSA conference without approval from his bosses. more