I spend a lot of time talking with customers about how they choose their managed DNS provider. In listening to their stories over the years, I have noticed that many of them use similar (if not identical) criteria to make this very important decision -- one that could ultimately mean success or failure for the lifeblood of their Web-based infrastructure and often their entire business. I’d like to take this opportunity to outline some of the more important criteria to consider when selecting a managed DNS provider.
- Provider Track Record and Experience: First and foremost, consider the provider’s track record when choosing them to handle any critical aspect of your business. Any provider you consider should be able to point to real-world implementations of the service globally. Only with such references in hand can you be confident you are getting a robust, scalable solution.
UCLA and Washington University in St. Louis recently announced the launch of the Named Data Networking (NDN) Consortium, a new forum for collaboration among university and industry researchers, including Verisign, on one candidate next-generation information-centric architecture for the Internet.
Verisign Labs has been collaborating with UCLA Professor Lixia Zhang, one of the consortium’s co-leaders, on this future-directed design as part our university research program for some time. The consortium launch is a natural next step in facilitating this research and its eventual application.
Van Jacobson, an Internet Hall of Fame member and the other co-leader of the NDN Consortium, surveyed developments in this area in his October 2012 talk in the Verisign Labs Distinguished Speaker Series titled “The Future of the Internet? Content-Centric Networking.”
As I stated in my summary of the talk, content-centric networking and related research areas under the heading of information-centric networking and NDN bring Internet protocols up to date to match the way many of us already are using the Internet. As Van noted, when people want to access content over the Internet– for instance the recording of his talk – they typically reference a URL, for instancehttp://www.youtube.com/watch?v=3zOLrQJ5kbU.
If you are trying to communicate anonymously on the Internet using Tor, this paper may be an important read for you.
Anonymity and privacy are at the core of what the Tor project promises its users. Short for The Onion Router, Tor provides individuals with a mechanism to communicate anonymously on the Internet. As part of its offerings, Tor provides hidden services, specifically anonymous networking between servers that are configured to receive inbound connections only through Tor. In order to route requests to these hidden services, a namespace is used to identify the resolution requests to such services. Tor uses the .onion namespace under a non-delegated (pseudo) top-level-domain. Although the Tor system was designed to prevent .onion requests from leaking into the global DNS resolution process, numerous requests are still observed in the global DNS, causing concern about the severity of the leakage and the exposure of sensitive private data.