Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Categories
Articles

Internet Invariants – things worth fighting for

Leslie Daigle, Chief Internet Technology Officer of the Internet Society (ISOC) talked about the Society’s eight “Internet invariants” in the closing plenary session of TERENA’s Networking Conference 2012. The invariants are key features of the Internet that make it such a good platform for innovation and whose loss might harm the network’s ability to support […]

Categories
Articles

Are We Too Late for IPv6 Transition?

[This post was originally published on the TERENA conference blog] Tuesday morning at the TERENA Networking Conference 2012 began with an entertaining and important call to action by Geoff Huston, on why we may have left transition to IPv6 too late and the serious consequences for open Internet connectivity that could result. It was recognised […]

Categories
Articles

Analytic Cookies: last minute change

With enforcement of the UK’s new law on internet cookies due to begin this week, on Friday the Information Commissioner published a new version of his guidance on compliance. Although the Information Commissioner says the new version is a clarification, others have described it as a “striking shift”. The most significant change appears to be […]

Categories
Articles

Analytic Cookies: last minute change

With enforcement of the UK’s new law on internet cookies due to begin this week, on Friday the Information Commissioner published a new version of his guidance on compliance. Although the Information Commissioner says the new version is a clarification, others have described it as a “striking shift”. The most significant change appears to be […]

Categories
Articles

New Defamation Bill – first thoughts

The new Defamation Bill promised in the Queen’s Speech has now been published. Although it also contains changes to what statements can give rise to liability for defamation, the most interesting part for network operators is likely to be the new provisions on liability for those who host third party content on web sites and […]

Categories
Articles

“Blocking” and Anti-blocking

Given the outcome of previous hearings on copyright infringement, the court’s conclusion this week that the UK’s major ISPs should be ordered to block access to The Pirate Bay was no surprise. However the judgment raises an interesting technical issue. In a previous hearing, it had been pointed out that there was a way to […]

Categories
Articles

IETF on Botnet Detection

A bot is a program, maliciously installed on a computer, that allows that computer and thousands of others to be controlled by attackers. Bots are one of the major problems on the Internet, involved in many spam campaigns and distributed denial of service attacks, as well as allowing attackers to read private information from the […]