Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Squirrels Are the Number One Culprit for Animal Damage to Aerial Fiber

These cute rodents are the number one culprit for animal damage to aerial fiber. To a lesser degree, fiber owners report similar damage by rats and mice. Squirrels mainly chew on cables as a way to sharpen their teeth. Squirrel teeth grow up to 8 inches per year and if squirrels aren't wearing their teeth down from their diet, they look for other things to chew. more

Network Protocols and Their Use

In June, I participated in a workshop, organized by the Internet Architecture Board, on the topic of protocol design and effect, looking at the differences between initial design expectations and deployment realities. These are my impressions of the discussions that took place at this workshop. ... In this first part of my report, I'll report on the case studies of two protocol efforts and their expectations and deployment experience. more

Digging Into IPv6 Traffic to Google: Is 28% Deployment Really the Limit?

After some years of accelerating IPv6 deployment, we are now into a period of slower growth and it's not clear where we are heading. It is therefore interesting to try to predict the future of IPv6 over the coming years. At Ericsson Research, we have been working on this topic since 2013, but just recently created a forecast model that seems to be quite accurate. However, it gives a disappointing message of a very low final level of IPv6 deployment at less than 30%! more

A Quick Look at the 4 Most Prevalent Types of Threat Intelligence

You won't go far with your cybersecurity when you're relying on the wrong intelligence. This is simply because not all types of threat intelligence are equal. You might have experienced this yourself; investing time and resources into just one only to receive meagre results in the end. Sadly, many organizations fail to realize that depending on just a single source of information is a big mistake. more

Happy Birthday BGP

The first RFC describing Border Gateway Protocol (BGP), RFC 1105, was published in June 1989, thirty years ago. By any metric that makes BGP a venerable protocol in the Internet context and considering that it holds the Internet together, it's still a central piece of the Internet's infrastructure. How has this critically important routing protocol fared over these thirty years, and what are its prospects? Is BGP approaching its dotage or will it be a feature of the Internet for decades to come? more

As a Service?

I'm happy to have the option of buying services. It's easier to eat at a restaurant than to do my own cooking, and I'm happy to pay for a ride rather than fighting traffic on my own. However, I'm not happy if I don't have the option of cooking for myself or of taking a stroll. I used to be willing to pay for all of my phone calls but today I know that, thanks to VoIP, there is no need to. But the phone companies are attempting to wrest back control with their wider 5G agenda. more

Hongyun Project – China's Low-Earth Orbit Broadband Internet Project

Last December, State-owned China Aerospace Science and Industry Corporation (CASIC) launched the first experimental Hongyun (rainbow cloud) Project satellite, and they began testing it in March. The 247 kg test satellite is in orbit at an altitude of around 1,100 km, and they plan to launch four more test satellites this year and begin operating with a 156-satellite constellation in 2022. more

The UN Panel on Digital Cooperation: An Agenda for the 2020s

The UN Panel on Digital Cooperation presented last week in New York its final report, and an old question is back on the international agenda: Could the global Internet be ordered by a reasonable arrangement among stakeholders which would maximize the digital opportunities and minimize the cyber risks by keeping the network free, open and safe? more

All Domain Name Professionals – Now Is the Time for a Portfolio Review

As we move further into the summer months and the demands made upon domain professionals typically ease, now is the ideal time to review domain name portfolios. And technology solutions can greatly automate this process. Ensuring that portfolios are pared, appropriate levels of security are implemented, and domains point to relevant content are all key areas upon which to focus. more

ICANN and Voodoo Economics in Wonderland

The exposed areas needing improvement by ICANN - both the organization as well as its global community of stakeholders - provide a target-rich environment. In the nearly three years since the completion of the transition of the Internet Assigned Names Authority (IANA), ICANN has persistently sought to drive top-down dictatorial policymaking; to shroud its activities and decision-making from public view; and, to evade accountability -- in some cases even doubling down on its efforts. more

Can ICANN Survive Today’s Global Geo-Political Challenges Under Its Existing Narrow Mandate?

Recently, the Presidents of four Latin American countries slammed ICANN over its .amazon domain name decision. This added to a long list of geo-politically infused challenges which ICANN needed to render final decisions on after all delay tactics or deferments had already been fully exhausted. It is clear that ICANN is facing unprecedented challenges as it tackles issues that go beyond its current narrow mandate. more

What Does It Mean to Deploy DMARC?

The IETF's DMARC working group is thinking about a maintenance update to the DMARC spec, fixing bits that are unclear and perhaps changing it where what mail servers do doesn't exactly agree with what it says. Someone noted that a lot of mailers claim to have "deployed DMARC," and it's not at all clear what that really means. ... I've suggested that we could write a DMARC deployment guide that describes the parts of DMARC, the ways they interact and in what sequence it's useful to deploy them. If you'd find that useful, leave a comment. more

Afnic Reveals the Results of Its Study of the World’s Domain Name Market in 2018

A new publication of Afnic deals with the overall trends of the Domain Name market in 2018. The publication of ICANN statistics as at the end of last year allows a quantified assessment of 2018, a period of moderate upswing after the "set-down" of 2017. The data on which this study is based come from ICANN reports from information provided by registries in certain frameworks. more

Does China’s Digital Silk Road to Latin America and the Caribbean Run Through Cuba?

China's Belt and Road Initiative (BRI) is an ambitious, long-term, global investment and development program. It was launched in 2013 with a focus on infrastructure -- roads, railroads, pipelines, undersea cables and ports. Since then China has invested $80 billion and signed 173 BRI agreements with 125 countries and 29 international organizations. more

A Report on DNS Operations, Analysis, and Research Center (DNS-OARC) 30th Meeting

DNS Operations, Analysis, and Research Center (DNS-OARC) held its 30th meeting in Bangkok on the 12th and 13th May. Here's what attracted my interest from two full days of DNS presentations and conversations, together with a summary of the other material that was presented at this workshop. Some Bad News for DANE (and DNSSEC): For many years the Domain Name X509 certification system, or WebPKI, has been the weak point of Internet security... more

Topics

DNS Security

Sponsored byAfilias

Cybersecurity

Sponsored byVerisign

IP Addressing

Sponsored byAvenue4 LLC

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byAfilias

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days