There is something quite compelling about engineering a piece of state-of-the-art technology that is intended to be dropped off a boat and then operate flawlessly for the next twenty-five years or more in the silent depths of the world's oceans! It brings together advanced physics, marine technology, and engineering to create some truly amazing pieces of networking infrastructure. more
Most of us, when we go to a website and see the little lock at the top of the browser, don't think twice and trust that we are communicating with the right company or organization. However, this is no longer the case because of a rather radical development that has largely occurred without notice or intervention by almost everyone. The web now has its own rapidly spreading version of CallerID spoofing that is about to get worse. more
Very few African states today have developed a national cybersecurity strategy or have in place cybersecurity and data protection regulations and laws. Yet, the continent has made major headway in developing its digital ecosystem, and moreover, it is home to the largest free trade area in the world, which is predicted to create an entirely new development path harnessing the potential of its resources and people. more
A few good questions have circulated in response to my recent blog post seeking clarity around the following: 1) what we mean with respect to adhering to Public Interest Registry's (PIR) historic practices on pricing, and 2) our interpretation of how the new co-operative proposal would reward speculators. With regard to Ethos' pricing commitments: we are not saying that we will raise prices 10% every year -- our commitment is that any price increase would not exceed 10% per year on average, if at all. more
Given the level of public interest in Ethos' acquisition of Public Interest Registry ("PIR") from the Internet Society, it is no surprise that this agreement continues to attract press attention. Ethos welcomes open discussion on this important investment, and we are of course following the media coverage closely. Unfortunately, it is not always possible to respond point-by-point to every article, so I would like to take this opportunity to address several mischaracterizations of the deal recently reported by Wired, Deutsche Welle, and others. more
There is a degree of dread in the investor community that prized domain names will be forfeited to trademark owners in proceedings under the Uniform Domain Name Dispute Resolution Policy (UDRP). Since the UDRP has no internal appeal mechanism to correct errors of law or judgment, the sole recourse is an action in a court of competent jurisdiction as spelled out in UDRP paragraph 4(k). In the U.S., this would be a district court under the Anticybersquatting Consumer Protection Act (ACPA). more
If it feels like the work of the latest group addressing registration data within ICANN has been going on forever, try participating in it! Since the summer of 2018, the team has regularly been meeting for several hours each week, participating in numerous face-to-face meetings and exchanging thousands of emails. Last week in Los Angeles, the team got together once again to continue our Phase 2 work creating policy that will (among other issues) govern the disclosure of non-public registration data to third parties. more
On January 28, the UK government was set to announce whether it would allow Huawei, the Chinese information and communication technologies provider, to develop its 5G infrastructure. Given Brexit and its need to form new alliances, the decision was marked as a significant moment for the UK's trade future. Leading up to the day of the decision, the UK was subjected to a significant amount of pressure from the United States government to reject any deal with Huawei. more
The 2010's have been nothing short of transformative in the broadband space. Despite disappointing deployment rates across the U.S., the past decade has been a period of exponential change and innovation. As we look toward the new decade, here are five key predictions based on current trends and developments in the broadband industry. more
FCC Chairman Ajit Pai recently told the crowd at CES that 5G would be a huge benefit to rural America and would help to close the rural broadband divide. I have to imagine he's saying this to keep rural legislators on board to support that FCC's emphasis on promoting 5G. I've thought hard about the topic, and I have a hard time seeing how 5G will make much difference in rural America – particularly with broadband. more
Internet Governance like all governance needs to be founded in guiding principles from which all policy making is derived. There are no better fundamental principles to guide our policy making than the Universal Declaration of Human Rights, (UDHR). This article is Part 3 of a series exploring the UDHR as a guide and template for the digital governance and digital citizenship. We discuss UDHR Articles 6 through 12 and address topics such as fundamental digital values, cyberlaw, policymaking and the role of tribunals in digital governance. more
The latest report from China's Ministry of Industry and Information Technology (MIIT) shows Huawei at the top of the list of 100 largest software companies in China. On reflection, that's not surprising. Half of Huawei's business is now phones, where chief rival Apple has long considered itself a software company. The great achievement of Huawei's phone division was to pull ahead of everyone in the quality of picture-taking. The hardware can be matched; Huawei's advantage comes from software. more
I've been proud to serve Public Interest Registry (PIR) since 2017 and play a part in helping the organization support those with a mission to do good. I recently joined every one of my fellow board members in reaching the unanimous decision to approve the sale of PIR, as I believe PIR's mission will best be served by the sale and .ORG's long-term future will be stronger under Ethos Capital ownership. more
In my recent CircleID post, DNS, Domain Names, and Certificates: The Missing Links in Most Cybersecurity Risk Postures, I highlighted the importance of applying multiple layers of defense to secure these business-critical assets. Last Friday, Brian Krebs, the world-renowned cybersecurity journalist, reiterated the criticality of domain name security because the domain name "e-hawk.net" was stolen from the rightful owner using social engineering tactics targeting its domain name registrar. more
In a study of the Internet in China in the late 1990s, my colleagues and I observed that "China has been able to execute plans effectively by allocating resources to competing, government-owned enterprises," and Kai-Fu Lee shows that they have pursued a similar strategy with respect to AI. Now they are doing the same with low-Earth orbit (LEO) broadband satellite constellations. more
Sponsored byCSC
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byRadix
Sponsored byWhoisXML API
Sponsored byDNIB.com
Sponsored byVerisign