/ Most Viewed

Rodney Joffe Wins a Well-Deserved Mary Litynski Award

Every year M3AAWG gives an award for lifetime work in fighting abuse and making the Internet a better place. Yesterday at its Dublin meeting they awarded it to Rodney Joffe, who has been quietly working for over 20 years. I can't imagine anyone who deserves it more. more

Network Dis-Aggregation and SDN: Different, But Related

Two of the hottest trends in networking today are network dis-aggregation and SDN. This is great for many reasons. It's also confusing. The marketing hype makes it hard to understand either topic. SDN has become so vague that if you ask 10 experts what it means, you are likely to get 12 different answers. Network dis-aggregation seems straightforward enough until it gets confused with SDN. We need to take a step back. In a recent Packet Pushers blog post; I start with a simple explanation of each of these trends and then map how they interact. more

Choose a gTLD for Love or for Added Value?

The decision to bid for a new gTLD can be driven by reason or by love. Either the applicant practices strategic and financial valuation, or the applicant falls for an idea implicit in the gTLD. The second group had better be very lucky or have some motivation besides profit. They enjoy little chance of economic viability. Worse, they follow up their poor initial selection with similar bad calls about their marketing message. more

Bringing a Responsible Closure to the gTLD Implement Process

Last Friday ICANN released an updated new generic Top-Level Domain (gTLD) Applicant Guidebook that appears to have taken a number of positive steps toward closing the divide between the ICANN Board and the Governmental Advisory Committee (GAC). One of the more important changes to the Applicant Guidebook was the following text... more

What’s Abusive in Registering Domain Names, and the Reverse?

The two major providers of arbitration services for adjudicating cybersquatting complaints under the Uniform Domain Name Dispute Resolution Policy (UDRP), the World Intellectual Property Organization (WIPO) and Forum, issue daily lists of decisions. In approximately 90% of those disputes, the registrations cannot be described as anything less than mischievous in acquiring second level domains incorporating well-known or famous marks. more

OpenFlow - The Programmable Network Revolution

Over the past few months I have made regular references to OpenFlow. This is an exciting new development that fits in very well with several of the next generation technology developments that we have discussed in some detail over the past few years -- new developments such smart cities and smart societies, the internet of things. Such networks need to operate more on a horizontal level, rather than the usual vertical connection between a computing device and the users. more

Spam Now Over 90% of All Email, Increasing Volumes Involve Social Networking Sites

Spam levels have increased by 5.1% since last month, reaching heights of 90.4%, according to latest report from Symantec's MessageLabs Intelligence... The majority of this increase in spam in May was comprised of messages with very little content other than a subject line and valid hyperlink, says the report. "Each hyperlink pointed to a different active profile on one of a number of major social networking environments. The profiles were likely created using random names and automated CAPTCHA-breaking tools. Moreover, the emails were sent from valid webmail hosting providers, which means they were not spoofed, as has been the case in the past for these types of domains." more

Today’s Internet: More BRICS Than Westerners

Something over 55% of landline broadband users are in the "Global South," about 500M. The South is about 65% if you include "wireless-only" many of which are 4G LTE at ten megabits or more. The gap is widening rapidly and will increase by well over 70M in 2018. Six large developing countries are growing 5% or more in the last year, compared to only one in the developed world. China is adding ~30M more each year. Most developed countries are between 75% and 95% connected. That leaves little room for growth. more

Don’t Make the Internet Safe for Monopolies

This week I'm going to Washington to argue against regulating Internet access as if it were phone service. Twenty years ago I was there for the same reason. My concern now as it was then is that such regulation will damage the economy and reduce opportunity by stifling innovation and protecting the current dominant players from the startups which would otherwise threaten them. more

How Diverse Is ICANN? New Study Explores Organisation’s Makeup

ICANN is a strange beast. Even the term "ICANN", which is itself an acronym, has more than one meaning. There are at least two "ICANNs", one is the "community", which is made up of everyone who engages with the ICANN "circus" and then there is ICANN the organisation itself -- a California not-for-profit. While people outside the internet industry probably have never heard of ICANN or had any direct dealings with it, the policies that get decided at ICANN have a tangible impact on how the internet operates. more

Why Passwords Have Never Been Weaker and Crackers Have Never Been Stronger

The past few weeks, I've been on this security kick particularly when it comes to encryption. I'm developing my own app in my spare time. So I'm trying a whole bunch of things, no doubt making plenty of mistakes in the process. Luckily, the data I am protecting is only quasi-valuable so I can afford to take a hit due to my own conscious incompetence. Anyhow, I ran across this article on Ars Technica yesterday entitled "Why Passwords have never been weaker - and crackers have never been stronger." It's a long article and it will take you a while to read it, but here is my summary. more

Who Makes the Any Apps Any Handset Call?

The Wall Street Journal today reported that FCC Chairman Kevin Martin wants to reject a Petition for Declaratory Ruling filed by Skype that would establish a wireless Carterfone policy, i.e., that wireless carriers must allow subscribers to use any compatible handset to access any application, content or software. Chairman Martin has confidence that the marketplace solutions obviate any necessary FCC intervention. Such optimism must derive in part from the apparently newfound willingness of one major wireless carrier, Verizon, to support aspects of open access. Perhaps Chairman Martin has confidence in the marketplace based on the magnanimous offer of most wireless carriers to pro-rate their early termination penalties by $5 a month. But here's the rub... more

Hyperconvergence, Disaggregation, and Cloud: The Foggy Future of Network Engineering

The world of networking tends to be bistable: we either centralize everything, or we decentralize everything. We started with mainframes, passed through Lotus 123 hidden in corners, then to mini's and middleware, then to laptops, and now to the cloud, to be followed by fog. This particular cycle of centralization/decentralization, however, has produced a series of overlapping changes that are difficult to decipher. You can somehow hear someone arguing about disaggregation and hyperconvergence through the fog -- but just barely. more

Beyond Domains: What Did We Really Learn in 2009?

The beginning of every year is a time for introspection, an appraisal of the year that was, and planning for the year to come. It is also a time to follow tradition and to recap the biggest news of the year. But by now, I am guessing that we have all read our fair share about the people and events who have impacted the last 12 months... if we take a larger vantage point (than our own relatively small domain name industry), these lessons from 2009 -- in my view -- could teach us all and most importantly, really shape the year ahead. more

April 8 2014: A World Less Secure

Not long after the message that Microsoft will stop updating Windows XP from 8 April onwards, after extending it beyond the regular life cycle for over a year already, came the soothing message that malware will be monitored for another year. That may be good news to some, but the fact remains that this is not the same as patching. Remaining on XP leads to a vulnerable state of the desktop, lap top and any other machine running on XP; vulnerable to potential hacks, cyber crimes, becoming part of a botnet, etc. more