Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Squirrels Are the Number One Culprit for Animal Damage to Aerial Fiber

These cute rodents are the number one culprit for animal damage to aerial fiber. To a lesser degree, fiber owners report similar damage by rats and mice. Squirrels mainly chew on cables as a way to sharpen their teeth. Squirrel teeth grow up to 8 inches per year and if squirrels aren't wearing their teeth down from their diet, they look for other things to chew. more

Digging Into IPv6 Traffic to Google: Is 28% Deployment Really the Limit?

After some years of accelerating IPv6 deployment, we are now into a period of slower growth and it's not clear where we are heading. It is therefore interesting to try to predict the future of IPv6 over the coming years. At Ericsson Research, we have been working on this topic since 2013, but just recently created a forecast model that seems to be quite accurate. However, it gives a disappointing message of a very low final level of IPv6 deployment at less than 30%! more

Network Protocols and Their Use

In June, I participated in a workshop, organized by the Internet Architecture Board, on the topic of protocol design and effect, looking at the differences between initial design expectations and deployment realities. These are my impressions of the discussions that took place at this workshop. ... In this first part of my report, I'll report on the case studies of two protocol efforts and their expectations and deployment experience. more

A Quick Look at the 4 Most Prevalent Types of Threat Intelligence

You won't go far with your cybersecurity when you're relying on the wrong intelligence. This is simply because not all types of threat intelligence are equal. You might have experienced this yourself; investing time and resources into just one only to receive meagre results in the end. Sadly, many organizations fail to realize that depending on just a single source of information is a big mistake. more

Making Voting Easy is Scaring the Life Out of Security Experts

Apollo 11 was the spaceflight which landed the first two humans on the Moon. Commander Neil Armstrong and lunar module pilot Buzz Aldrin landed the Apollo Lunar Module, Eagle, on July 20, 1969. Armstrong became the first person to step onto the lunar surface six hours later, and Aldrin joined him 19 minutes later. The two astronauts spent about two and a quarter hours outside the spacecraft, and they collected 47.5 pounds of lunar material to bring back. more

Trump Orders Cyberattacks by US Companies

It is supremely ironic. A rogue national leader with the stroke of a pen, dictates that its companies will expose a foreign company's end users to cyberattacks. This is the net effect of denying security patches or operating system updates pursuant to Trump's order. In the US Great Rogue Leader's bizarro world, this is the very behavior that he claims makes his actions necessary. In fact, this Trump malware attack is worse because of the mass exposure to exploits. more

ICANN and Voodoo Economics in Wonderland

The exposed areas needing improvement by ICANN - both the organization as well as its global community of stakeholders - provide a target-rich environment. In the nearly three years since the completion of the transition of the Internet Assigned Names Authority (IANA), ICANN has persistently sought to drive top-down dictatorial policymaking; to shroud its activities and decision-making from public view; and, to evade accountability -- in some cases even doubling down on its efforts. more

What Does It Mean to Deploy DMARC?

The IETF's DMARC working group is thinking about a maintenance update to the DMARC spec, fixing bits that are unclear and perhaps changing it where what mail servers do doesn't exactly agree with what it says. Someone noted that a lot of mailers claim to have "deployed DMARC," and it's not at all clear what that really means. ... I've suggested that we could write a DMARC deployment guide that describes the parts of DMARC, the ways they interact and in what sequence it's useful to deploy them. If you'd find that useful, leave a comment. more

Happy Birthday BGP

The first RFC describing Border Gateway Protocol (BGP), RFC 1105, was published in June 1989, thirty years ago. By any metric that makes BGP a venerable protocol in the Internet context and considering that it holds the Internet together, it's still a central piece of the Internet's infrastructure. How has this critically important routing protocol fared over these thirty years, and what are its prospects? Is BGP approaching its dotage or will it be a feature of the Internet for decades to come? more

Hongyun Project - China's Low-Earth Orbit Broadband Internet Project

Last December, State-owned China Aerospace Science and Industry Corporation (CASIC) launched the first experimental Hongyun (rainbow cloud) Project satellite, and they began testing it in March. The 247 kg test satellite is in orbit at an altitude of around 1,100 km, and they plan to launch four more test satellites this year and begin operating with a 156-satellite constellation in 2022. more

A Report on DNS Operations, Analysis, and Research Center (DNS-OARC) 30th Meeting

DNS Operations, Analysis, and Research Center (DNS-OARC) held its 30th meeting in Bangkok on the 12th and 13th May. Here's what attracted my interest from two full days of DNS presentations and conversations, together with a summary of the other material that was presented at this workshop. Some Bad News for DANE (and DNSSEC): For many years the Domain Name X509 certification system, or WebPKI, has been the weak point of Internet security... more

Food for Thought on the "New TLD" Business Models

There is always some degree of confusion in discussions about the "new TLDs". Some points of view try to be optimistic, others on the contrary only highlight the bad news, and most refer indistinctly to the "new TLDs" as if they did not break down into different segments, each of which obeys dynamics and constraints of its own. The purpose of this post is to provide some food for thought and to shed some light on those dynamics and constraints... more

Does China’s Digital Silk Road to Latin America and the Caribbean Run Through Cuba?

China's Belt and Road Initiative (BRI) is an ambitious, long-term, global investment and development program. It was launched in 2013 with a focus on infrastructure -- roads, railroads, pipelines, undersea cables and ports. Since then China has invested $80 billion and signed 173 BRI agreements with 125 countries and 29 international organizations. more

The Impact of Satellite Broadband

Recently I've had several people ask me about the expected impact of low-orbit satellite broadband. While significant competition from satellites is probably a number of years away, there are several major initiatives like StarLink (Elon Musk), Project Kuiper (Amazon), and OneWeb that have announced plans to launch swarms of satellites to provide broadband. more

Trade War Is Turning Into a Technology War

President Trump knows that in the current trade war, the Huawei issue is perhaps one of the most important issues for the Chinese government. It directly undermines the Chinese prestige and the ban create global anxiety. This is resulting in discussions in many countries, assessing their relationship with China. It highlights the domination of the Chinese in telecoms manufacturing, but at the same time, it opens up other discussions in relation to Chinese dominance and influence. more

Topics

IP Addressing

Sponsored byAvenue4 LLC

New TLDs

Sponsored byAfilias

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

DNS Security

Sponsored byAfilias

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days