Featured Blogs

Latest

VIPR: New Developments in the VoIP Market

This is a new development in the VoIP market. This is how one of my colleagues, Cullen Jennings explained it to me. Today we have two widely deployed global identifiers for reaching people. One is delegated address out of DNS and the other is phone numbers. So I consider an address like email: carol@johnson.com or xmpp:john@gmail.com to roughly be out of the DNS namespace and phone number to be out of the E.164 name space. Phone numbers have lots of parts that are not cool, but they also have some cool parts... more»

Driver's License for Web Users… Bad Idea

Maybe you saw the stories recently about comments that were made at a recent World Economic Forum debate on cyberwarfare. As one of them notes, Hamadoun Toure, Secretary General of the International Telecommunications Union, proposed a treaty in which countries would pledge not to attack each other without having been attacked. This post isn't about Mr. Toure's proposal. It's about a comment the story attributes to Craig Mundie, Chief Research and Strategy Officer for Microsoft. According to The Raw Story, Mundie "called for a `driver's license' for internet users." more»

Swiss Among World Leaders in Enabling DNSSEC

SWITCH, the registry for .CH and .LI domain names, enabled DNSSEC on day two of the annual Domain Pulse conference in Luzern yesterday. SWITCH became the third ccTLD registry to enable DNSSEC giving registrants of .CH domain names added security following .SE (Sweden) and .CZ (Czech Republic). more»

Domain Name Security Gains Prominence in German-Speaking World

The 2010 Domain Pulse, hosted by SWITCH (the .CH registry) was held in the snowy Swiss city of Luzern. Domain Name Security (DNS) was of particular importance in this year's meeting with DNSSEC being implemented in the root zone in 2010 by ICANN, and by many registries in the next few years. ICANN plan to have all root servers signed with DNSSEC by mid-2010 Kim Davies, Manager, Root Zone Services at ICANN told the meeting, starting with the L root server, then A root server with the last being the J root server as all are gradually signed. more»

Sharing: The First Step to Structural Change in Mobile

The arrival of the iPhone, Android and iPad will raise the stakes higher in the mobile broadband market. The fact that iPhone alone has over 140,000 Apps over sort of open networks, not portals, shows the demand for mobile applications. This will put an enormous strain on the infrastructure of the mobile operators and will require them to build fibre networks to all mobile stations, as well as invest in more spectrum and new technologies such as LTE. At the same time the mobile subscriber markets are becoming saturated and competition is driving margins down. more»

Domain Name Registry and Registrar Separation Now Probably Going to Be a Policy Debate

Again on the subject of new Top-Level Domains (TLDs) ... One of the "issues" that concerned a number of people is the concept of "vertical separation". The basic idea is that domain name registries and registrars should be kept separate. While that is a wonderful Utopian ideal, the reality is that in the real world companies own other companies, people trade in stocks and shares etc., etc. So it's far from being a simple "cut and dried" situation. more»

DNSSEC: Will Microsoft Have Enough Time?

I have previously pointed out the shortcomings of good and user friendly support for DNSSEC in Microsoft's Server 2008 R2. During the period just after I wrote the post, I had a dialogue with Microsoft, but during the last months there has been no word at all. The reason I bring this up again is that more and more Top Level Domains (TLDs) now enable DNSSEC and also the fact that within six months the root will be signed. more»

The Greatest Free Riders of Our Time

Former Southwestern Bell CEO, now General Motors CEO Ed Whitacre famously accused Google of free-riding his network, despite the obvious truth that Google pays for traffic delivery to peering points and ISPs gladly enter into reciprocal peering agreements in lieu of cash transactions that would likely result in a near zero payment as roughly equivalent traffic balances out. Mr. Whitacre did raise a legitimate question whether there are free riders and I'm seeing one darling and one unexpected group flying below the radar. more»

Australia Booting Infected Computers Off Their Networks

The Australian has a good article describing the efforts some of their ISPs are making in an attempt to clean up their act: the government is encouraging ISPs to detect computers on their network that are infected and part of botnets, and to communicate to the customer that their system is compromised... Unless the customer feels a little bit of pain they will not change their ways. more»

Why is ICANN Traveling Without Moving and Thwarting Innovation in the Domain Space?

While I was giving my .music presentation at ICANN Studenkreis in Barcelona, Spain last week, it dawned upon me. There was not one single ICANN staff member sitting in the room taking notes on any of the presentations given by TLD applicants. I was convinced that it would be beneficial to ICANN staff to observe our presentations and perhaps receive useful feedback from TLD applicants that could be used to better draft the Expressions of Interest recommendation. more»

Telecoms Leadership and the State of the Union

Before, during and after his inaugural speech (January 2009) President Obama spoke of the national benefits of broadband, and the changes which have been set in motion in the US telecoms market that were unheard of even a year ago. During the previous administration the incumbent telcos and cable companies had been given more freedom. As a consequence, innovation and competition dwindled and the US was no longer a leader in telecoms... However, since that time, the White House has lost some of its initial leadership. more»

Protecting Customer Data

There have been a number of reports recently about customer lists leaking out through Email Service Providers (ESPs). In one case, the ESP attributed the leak to an outside hack. In other cases, the ESPs and companies involved have kept the information very quiet and not told anyone that data was leaked. People do notice, though, when they use single use addresses or tagged addresses and know to whom each address was submitted. Data security is not something that can be glossed over and ignored. more»

Should a Domain Name Registrar Run from a PO Box?

In 2008 KnujOn published a report indicating that 70 ICANN accredited Registrars had no publicly disclosed business location. The fundamental problem was one of community trust and consumer faith. Registrars extend their legitimacy to their domain customers who then transact and communicate with the public. more»

Big Brands Shooting Themselves In The Foot?

One of the topics that keeps coming up in ICANN policy discussions and as part of the new TLD application process is "transparency". ICANN, and the internet community in general, has had plenty of issues in the past with "bad actors" who have caused a lot of issues for everyone (think of many of the registrars who have lost accreditation in the last couple of years for example). On more than one conference call or policy discussion the issue of a company or a person's track record has come up. more»

IPv6 or IPv4? What Will We See in the First Wave of LTE Networks?

All the talk early this year seems to be about LTE deployment to alleviate chronic Apple and other smartphones induced indigestion on the AT&T and other major Mobile Networks swamped by data traffic. The telluric shift albeit the user will not care or should not notice is that when he or she will power on that smartphone or whatever the communicating Swiss Knife will be called, it will request an IP address to complete an IP based call. more»

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days

Sponsored Topics