On May 29, I attended an AEI event on "International economics and securing next-generation 5G wireless networks," with Ambassador Robert Strayer, who heads the U.S. State Department's CIP team. But the focus of the talk was not really on 5G security, international trade or 5G development. In fact, there was no constructive agenda at all. The talk was an extended attack on China and the Chinese-based telecommunications vendor Huawei – another episode in an ongoing U.S. government campaign to shut Huawei and other Chinese firms out of the U.S. market, and to convince every other country in the world to do the same. more
The implementation of the General Data Protection Regulation (GDPR), and ICANN's conservative temporary policy, which favors privacy and limits registrar liability, has made domain enforcement against cybersquatters, cyber criminals and infringement more difficult, expensive and slow. With heightened concerns over privacy following high-profile breaches of consumer data and its subsequent illicit use and distribution, there is no question that consumer data protection practices would come under scrutiny. more
A colleague sent me an article that had been published earlier this year in MachineDesign magazine that predicts that driverless cars can't be realized until we have a ubiquitous 5G network. When looking for the original article on the web I noticed numerous similar articles like this one in Forbes that have the same opinion. These articles and other similar articles predict that high-bandwidth, low-latency 5G networks are only a few years away. more
Congestion. Traffic. Two words that draw a visceral response, whether you are commuting to work or managing a network. Managing data traffic used to be easy. Everything was housed in centralized data centers, and all traffic was routed through big, dedicated, effective but expensive "pipes" -- Multiprotocol Label Switching (MPLS) links. When all the applications are at the data center, it makes sense to build private access for all traffic. more
The Uniform Domain Name Dispute Resolution Policy, commonly known as the UDRP, was first introduced on October 24, 1999, by the Internet Corporation for Assigned Names and Numbers (ICANN). The UDRP is incorporated by reference into Registration Agreements for all generic top-level domain names (gTLDs) and some country-code top-level domain names (ccTLDs). more
Dear colleagues and friends, it is very, very difficult to write these words. The loss of a young person is always a tragedy. The untimely loss of a friend is even worse and is always a very difficult time. The loss of a fellow Internet pioneer is like losing a brother. Tarek Kamel was a great friend of the Internet Society–Bulgaria. I remember him giving an interview for the Bulgarian public television in Yokohama during the INET 2000 meeting... more
In their annual hype cycle on on network technologies, Gartner lists the emerging technologies and an estimate of the timeframe in which they will reach the plateau of productivity. The latest hype cycle on enterprise networking labels Software-Defined Networks (SDN) as an obsolete technology. So on the surface, it would appear that SDN is now semi-officially dead. While most natural scientists accept the Darwinian theories, the technology industry has traditionally been trying to defy evolution. more
By now, we are all exposed to the narrative of how the Internet is no longer a safe place. It is full of bots, misinformation, abuse and violence; it is a space that has been overtaken by terrorists and extremists. The Internet is weaponized to influence elections, undermine democracies, and instill fear in its users. That's the story we are told. No one can deny the swift change that is taking place in global politics. The "brave new world" that has emerged is, currently, based on isolation and fear. more
Just over one week ago, the New York Times published a major investigation into the intractable problem of illegal sexual images of minors being exchanged online. Despite flaws in the story and its companion pieces, the main take-away that Internet companies have failed to adequately address the problem has resonated widely. Prostasia Foundation too has been critical of some of the Internet platforms called out in the article. But at the same time, we need to be realistic about how much responsibility we can (or should) place on tech firms to solve this problem. more
For decades, the US government has fought against widespread, strong encryption. For about as long, privacy advocates and technologists have fought for widespread, strong encryption, to protect not just privacy but also as a tool to secure our computers and our data. The government has proposed a variety of access mechanisms and mandates to permit them to decrypt (lawfully) obtained content; technologists have asserted that "back doors" are inherently insecure. more
The DC Circuit Court of Appeals ruled on the last day of September that the FCC had the authority to kill Title II regulation and to repeal net neutrality. However, the ruling wasn't entirely in the FCC's favor. The agency was ordered to look again at how the repeal of Title II regulation affects public safety. In a more important ruling, the courts said that the FCC didn't have the authority to stop states and municipalities from establishing their own rules for net neutrality. more
Over the years, the Kenyan Network Information Center (KeNIC) has struggled to reach the 100,000 mark in .ke Kenya country code domain registrations. Many reasons have been given for this shortfall, among them pricing, competition from generic Top-Level Domains (gTLDs) like .com and .org, and also competition from Geographic domains like the new .africa. Also, not opening up the second level for registration has been cited as one of the reasons for the low number. more
Around 2014, as Stephen (Steve) J. Lukasik proceeded well into his 80s, he began to consider ways to capture the enormous sweep of activities and history in which he was a key figure. Indeed, that sweep was so broad and often compartmentalized, and his output so prolific, that even his closest associates only knew of slices of his accomplishments. So he began sorting through his career and produced this autobiographical essay on his accomplishments at ARPA that is being made posthumously available now. more
On Thursday, Stephen J. Lukasik passed away peacefully at the age of 88. He was the legend in a field with no peer. For nearly half a century, he shaped the development of national security and network technology developments at a level and extent that is unlikely ever to be matched. For a great many of us in that arena from the 1960s past the Millennium, he was the demanding visionary leader who set the policies and directions, framed the challenges, approved and funded the projects, and questioned the results. more
It is with a heavy heart that we note the passing of a dear friend, colleague and member of the CAUCE board of directors, Don Blumenthal, on September 28, 2019, in Ann Arbor, Michigan. He was 67. Don was an anti-spammer for as long a there was an anti-spam community: he helped design, deploy and maintain the famous 'Spam Fridge,' the repository of junk email maintained by the Federal Trade Commission (FTC). more
Sponsored byIPv4.Global
Sponsored byWhoisXML API
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byCSC
Sponsored byRadix
Sponsored byVerisign