/ Most Viewed

The 25/3 Mbps Broadband Connection Myth

There is no such thing as a 25/3 Mbps broadband connection, or a 100/20 Mbps broadband connection, or even a symmetrical gigabit broadband connection on fiber. For a long list of reasons, the broadband speeds that make it to customers vary widely by the day, the hour, and the minute. And yet, we've developed an entire regulatory system built around the concept that broadband connections can be neatly categorized by speed. more

Mozilla, National Science Foundation Offer $2M Prize for a Decentralized Web

Mozilla and the National Science Foundation have announced a $2 million prize for ideas that decentralize the web; prizes will be available for both early-stage design concepts and fully-working prototypes. more

Can Plural and Singular New gTLDs Both Be Successful?

Now that ICANN has stuck to its guns and only placed 4 new gTLD's strings that look confusingly similar into contention sets, rather than those that sound identical, such as .inc and .ink or those that have the same meaning like .Law and .Lawyer or those that are singular and plurals of the same word, like .deal and .deals, we now that many new gTLD's are going to have a very a tough marketing road and face a lot of consumer confusion. more

Searching for Truth in DKIM: Part 1 of 5

DomainKeys Identified Mail (DKIM) is the leading email authentication technology, supported by major ISPs including Google, AOL, and Yahoo! (who invented its predecessor), popular mail server software like Sendmail, and many of the best minds in email technology. But if you peruse the archives of the IETF DKIM mailing list, or start up a conversation at MAAWG, it might appear that there's still a lot of disagreement about what a DKIM signature actually means. more

About That Second, Third and Fourth Wireless “Attachment”

There is some good news about the decision by Verizon Wireless to offer shared monthly data plans. But there could be a lot more if the FCC applied its Carterfone policy. That policy gave consumers the power to decide what and how many devices to attach to a network connection. If Carterfone applied, consumers could use multiple devices to access a network subscription, albeit perhaps not at the same time. more

DNS Insecurity

The Internet as we know it and use it today -- is broken, badly broken. Yes broken so much so that we are really crazy to have any expectations of privacy or security. Yes, really. The Internet was conceived as somewhat of a utopian environment, one where we all keep our doors, windows and cars unlocked and we trust all the people and machines out there to "do the right thing...". more

A Visualized gTLd Sequencing Proposal

As a follow-up to our previous CircleID article "Strong Support for IDNs, GEOs and/or Communities to Go First" we have developed a flow chart which visualizes how the applications may be processed in a fair and transparent manner. The chart also shows that at the end of the day only about 1,200 new gTLDs may go online, that means that we will likely see about 730 drop outs. more

White Spaces News… Interesting First Step

When the U.S. Digital Television Transition (DTV) transition happens in Feb. 2009, channels 2 through 51 will remain allocated for television transmission. Few of the nation's television markets actually use 49 channels. Indeed, most use less than half of that number... Today, with Congress in recess, leaving less room for last-minute-Lucy-with-the-football lobbying gambits, the Federal Communications Commission (FCC) appears to be poised to release a report saying the white spaces can be used without necessarily causing interference to existing broadcasts. There are still many questions to be answered... more

Increasing the Strength of the Zone Signing Key for the Root Zone, Part 2

A few months ago I published a blog post about Verisign's plans to increase the strength of the Zone Signing Key (ZSK) for the root zone. I'm pleased to provide this update that we have started the process to pre-publish a 2048-bit ZSK in the root zone for the first time on Sept. 20. Following that, we will publish root zones with the larger key on Oct. 1, 2016. more

The Overlooked Signals of ccTLDs

Two ccTLD signals should get more attention when we're talking about the domains' benefits. Companies in emerging markets can signal their brands to expats and/or westerners. This ability to take the companies' appeal beyond their immediate, national markets deserves a look and some appreciation. Traditionally, Western companies have been the ones who registered ccTLDs to signal target="_blank" operations in overseas markets, while companies in emerging markets use them to signal their local brands to the local market. more

Remembering the Good Times

The most effective early email-borne viruses didn't need botnets. They didn't change your computer settings, or steal your login credentials. And they somehow convinced regular users to help them spread. The first warnings about the Good Times virus began to appear in November of 1994, and by December the warnings were seen all over as people did what the warning said, and forwarded it to all their friends. There was another outbreak the following March... more

ICANN Signs Agreement Giving UPU Managing Authority Over .Post Domain

ICANN and the Swiss-based Universal Postal Union (UPU) have signed an agreement giving the UPU managing authority over .post as a top-level domain (TLD). At the highest conceptual level, the agreement represents linking the TLD with the real-world physical networks of the postal system, with 600,000 global physical offices and proximity to most humans. To enable its customers to take advantage of the services the UPU envisions for .post, the UPU is already installing the first computers in many villages in their local post offices to provide those services, says the announcement. more

Commerce Department: Headed Toward ICANN 3.0?

The NTIA has published a Notice of Inquiry, Assessment of the Transition of the Technical Coordination and Management of the Internet's Domain Name and Addressing System, in advance of the expiration of the Joint Project Agreement in September 2009. The document outlines the history and evolution of the Memorandum of Understanding (MOU) between the Department of Commerce (DoC) and ICANN, and the questions posed cover fairly standard territory. However, the following might be worth paying attention to... more

AI Boom Spurs Record Investment in Undersea Cables Amid Geopolitical and Security Concerns

As AI accelerates global data demand, tech giants are investing heavily in subsea cables. These critical networks face rising geopolitical scrutiny and security risks, reshaping the future of digital infrastructure and global connectivity. more

More Provocative Reasons for a Mandatory National Breach Disclosure

I read, with some small amount of discomfort, an article by Bill Brenner on CSO Online, wherein he interviewed several other CSOs and other "Security Execs" on their opinions on the firing of Pennsylvania CISO Robert Maley. For those who haven't heard about this, Mr. Maley was fired for talking about a security incident during the recent RSA conference without approval from his bosses. more