/ Most Viewed

Deadline of Oct 31 to Register for IAB Workshop on Stack Evolution in a Middlebox Internet

Can we develop better transport protocols for communication across the Internet? In a world where the "end-to-end" principle is no longer certain and middleboxes are common, which paths through the Internet are actually available to applications? Which transports can be used over these paths? How can applications cooperate with network elements to improve path establishment and discovery? ... These are all questions posed for the Internet Architecture Board's (IAB) Workshop on Stack Evolution in a Middlebox Internet (SEMI). Taking place in Zürich, Switzerland from 26-27 January, 2015. more

DDoS Attacks Getting More Powerful, ISPs Report Concern Over New Threats and Budget Pressures

Massive distributed denial of service (DDoS) attacks against ISPs and their customers have almost doubled over the past year, according to a new security report. Attacks on networks making them unavailable to intended users -- also known as distributed denial of service (DDoS) attacks -- exceeded 40 gigabits in the last year according to Arbor Networks' annual survey of ISPs from North America, South America, Europe and Asia. more

Best Practices: A Meaningless Term

Chad White wrote an article for MediaPost about best practices which parallels a lot of thinking I've been doing about how the email marketing industry treats best practices. After several conversations recently about "best practices," I'm convinced that the term is now meaningless. It's been bastardized in the same way that the definition of "spam" has shifted to the point that it has very different meanings to different groups of people. more

Help Us Answer: What Will the Internet Look Like in 10 Years?

What will the Internet look like in the next seven to 10 years? How will things like marketplace consolidation, changes to regulation, increases in cybercrime or the widespread deployment of the Internet of Things impact the Internet, its users and society? At the Internet Society, we are always thinking about what's next for the Internet. And now we want your help! more

The Jaynes Case is Finally Over

Last September the Virginia Supreme Court issued a surprise ruling that reversed its previous decision and threw out the state’s anti-spam law on First Amendment grounds. The Commonwealth made a last ditch appeal to the US Supreme Court, which I predicted they’d be unlikely to accept. I guessed right... more

The Future of Internet Governance? Comments on IGF 2018 Speech by French President Emmanuel Macron

Macron has declared the Internet to be under threat. Without stepping back to question and explore the underlying causes of those threats, he uses them as a justification to propose a different approach to, albeit limited, current Internet Governance processes. Here we explore his proposals and some of the issues they generate. He acknowledges that Civil Society and the private sector have been core drivers in the creation of the Internet. He argues that its benefits and existence are endangered by predatory practices. more

Governments Increasingly Trying to Control the Internet, Warns New U.S. Report

The U.S. Sate Department annual human rights report released on Friday has expressed concerns over the increasing trend among governments spending more time, money and attention in efforts to control their citizens access to the Internet and other communication means. To aid people seeking to speak out, the U.S. government is helping to finance circumvention technologies to avoid firewalls, reports the Associated Press. "To deal with governments hacking computers or intimidating dissenters, the U.S. government has trained 5,000 people from around the world on how to leave less of a trace on the Internet." more

FCC Updates Broadband Speed Standard, Aims for Nationwide High-Speed Internet Acces

The U.S. Federal Communications Commission (FCC) has updated the national broadband speed standard to at least 100Mbps download and 20Mbps upload speeds, marking the first adjustment since January 2015. more

Experience ‘a Walk in the Shoes of a Registry Operator’ at ICANN 61

One of the ever-present questions in the domain name community is "have new TLDs been a success in the marketplace?" As many within the industry will appreciate, it's a difficult question to answer using traditional metrics (such as domain registration volumes), and it is important to remember that the new TLD expansion in 2012 was all about diversity, competition and choice. more

The Latter is Coded to Criticize the New - Lessons from Depew

This month, we are seeing a very busy global ecosystem with the ICANN 51, UN General Assembly meeting to discuss ICT for Development in New York and now the 19th ITU Plenipotentiary in Busan. Pinktober, Oktoberfest has also become saturated with ICTober so it makes me more reflective. First I would like to make a massive shout out to all those battling cancer, survivors and families who wage war against cancer. May you all walk on and walk strong! more

The Early History of Usenet, Part VI: The Public Announcement

Our goal was to announce Usenet at the January, 1980 Usenix meeting. In those days, Usenix met at universities; it was a small, comaparatively informal organization, and didn't require hotel meeting rooms and the like. (I don't know just when Usenix started being a formal academic-style conference; I do know that it was no later than 1984, since I was on the program committee that year for what would later be called the Annual Technical Conference.) more

FCC Chair Releases Draft to Abandon Net Neutrality, Says Gov’t Must Stop Micromanaging the Internet

Federal Communications Commission Chairman Ajit Pai today released a statement on his draft "Restoring Internet Freedom Order", circulated to Commissioners this morning and will be voted on at the FCC's Open Meeting on December 14 more

Microsoft is Abandoning SHA-1 Hashes for Updates - But Why?

Microsoft is shipping a patch to eliminate SHA-1 hashes from its update process. There's nothing wrong with eliminating SHA-1 - but their reasoning may be very interesting. SHA-1 is a "cryptographic hash function". That is, it takes an input file of any size and outputs 20 bytes. An essential property of cryptographic hash functions is that in practice (though obviously not in theory), no two files should have the same hash value unless the files are identical. more

Embracing On-Chain Domains for a Safer Internet

From the humble beginnings of ARPANET to the birth of the internet as we know it today, domain registrars have been the silent architects of our online activity. Now, as we stand on the cusp of the Web3 revolution, domains are set to undergo yet another profound transformation. Internet innovations have given us a remarkable ability to connect, but now we are bouncing against the limits of this paradigm. more

Software-Defined Networking: What’s New, and What’s New for Tech Policy?

The Silicon Flatirons Conference on Regulating Computing and Code is taking place in Boulder. The annual conference addresses a range of issues at the intersection of technology and policy and provides an excellent look ahead to the tech policy issues on the horizon, particularly in telecommunications. I was looking forward to yesterday's panel on "The Triumph of Software and Software-Defined Networks", which had some good discussion on the ongoing problem surrounding security and privacy of the Internet of Things (IoT)... more