/ Most Commented

If You Build It, They Will Come.

Only two years after signing the DNS root zone, the powerful lure of a secure global infrastructure for data distribution is starting to reveal itself. It is illustrated clearly by two proposed technical standardizations that seek to leverage secure DNS. To some degree these developments highlight the strength of DNS institutions and how they might fill gaps elsewhere in the Internet's governance. But an increasing reliance upon and concentration of power in the DNS also makes getting its global governance correct even more important. more

2100 New gTLD Applications. What Does It Mean?

Over the course of the last week, ICANN has released several pieces of information that taken together begin to allow us to piece together the overall gTLD landscape. ICANN is releasing partial information, without explanation or context, in dribs and drabs, and rumors are flying that we won't get the "Reveal" until the ICANN meeting in Prague at the end of June. This partial information and delay from ICANN is creating consternation and confusion among the many applicants and those watching the new gTLD scene. more

Donuts and TAS: What We Really Care About

Like everyone else applying for new gTLDs, the Donuts team thought it would now be poring over a list of applicant names and strings, nodding heads and at times raising eyebrows. The timing didn't work out that way. ICANN did the right thing by closing TAS temporarily in order to understand what it was dealing with. It's easy enough for applicants to get rattled by what they think may have happened... more

Spam from Mobile Networks? Who Woulda Thought…

Mobile networks aren't usually thought of as sources of spam, but a quick look at some of the resources that track spam reveals they actually are. This is counter intuitive at first glance because when most people think of mobile they think of smartphones, and those aren't known to be sources of spam (at least not yet). What's really going on is PCs connected to mobile networks with air cards, or tethered with a smartphone where it's permissible, are the culprits more

ICANN Board Meetings Should be Webcast Live

ICANN has just announced that, starting with the June meeting in Prague, the ICANN Board will no longer meet and cast votes on the final day of its three annual public meetings. We think this is an ill-advised step backwards from ICANN's commitment to transparency and the accountability that accompanies it. We also believe that ICANN should have told "the community" it was considering this major change and asked for public comment before making such a decision. more

Google Launches Storage Service, “Drive”

Google today launched a long-rumored "Drive" service to allow users store photos, videos, and other digital files in its massive data centers. Available immediately, first five gigabytes of storage per account of Google Drive is free and additional storage will be sold for prices starting at $2.49 per month for 25 gigabytes. more

Names of the Inaugural Internet Hall of Fame Inductees Announced

The names of the inaugural Internet Hall of Fame inductees were announced today at the Internet Society's Global INET 2012 conference in Geneva, Switzerland. Internet pioneers and luminaries from around the world have gathered at the conference to mark the Internet Society's 20th anniversary. more

Driving DNSSEC: The Need for Integration of All the Functions Needed

DNSSEC continues to gain momentum as network operators and domain owners watch and learn from early adopters. The learning process is made easier by efforts such as the ongoing work conducted by researchers at Sandia labs to methodically identify and categorize the kinds of problems that are occurring. more

IPv6 DNS Blacklists Reconsidered

I opined about a year ago that DNS blacklists wouldn't work for mail that runs over IPv6 rather than IPv4. The reason is that IPv6 has such a huge range of addresses that spammers can easily send every message from a unique IP address, which means that recipient systems will fire off a unique set of DNSBL queries for every message... Now I'm much less sure this will be a problem... more

Spectrum Key to Broadband Utility

The explosion in mobile communications in the developing world has created social and economic changes that have exceeded all expectations and predictions -- even those made as recently as five years ago. There are still countries lagging behind, but now is the time to move on to the next stage -- and that means broadband. Already the developed world is showing an enormous appetite for mobile broadband, so the demand is most certainly there. The rapid development of low cost Smartphone, projected to approach $50 soon... more

Red Cross and Internet Governance with Cause

One of many controversies surrounding the introduction of new domain names is the special protection given, though a moratorium, to the Red Cross and Red Crescent Movement (RCRC) and International Olympic Committee (IOC). Although the RCRC and the IOC are discussed together, they are very different. more

US-NL Cybercrime Treaty Signed

On Wednesday 22 February the United States and The Netherlands signed a "declaration of intent" on the cooperation on fighting cybercrime. This event was reported by the press as a treaty. At least that is what all Dutch postings I read wrote, with exception of the official website of the Dutch government. So what was actually signed? Reading the news reports some thoughts struck me. more

The Privacy Party and Leaving Dishes in the Sink

Boy, that was a great party the White House threw yesterday when their new online privacy rights were unwrapped and passed around. Most everyone hefted their shiny new rights, agreed they were nice, and talked about the need for swift adoption. But when the party was done, everyone filed out, turning a blind eye to the post-party cleanup and a sink full of dirty dishes. more

Email and Social Media Accounts Under the Spotlight in UK’s Proposed New ‘Spy’ Plan

It would be reasonable to assume that your employer is archiving your email communications. But what about your personal emails, texts, phone calls and Facebook posts. Are these really private? Not for long, if the UK government has its way. It has been reported that its new anti-terror plan, if passed, would require Internet providers and phone companies to store all online communications by UK citizens for one year. more

Debilitating Cyber Attack: Not If, But When?

We all know how easy it can be to ignore or underestimate the possibly, or even likelihood, of a terrorist attack; just remember what happened on 9-11. That seems to be just what the U.S. is doing when it comes to a possible Cyber-Attack, no not in other countries, but right here at home where targets like private sector companies, who provide vital economic and emergency services to our population using broadband infrastructure, and are woefully under-secured for such attacks. more