In March of this year, the Federal Communications Commission (FCC) adopted an initial Notice of Inquiry (CG No. 17-59) to mitigate robocalls. In July, it adopted a Second Notice. Mitigating spoofed telephone calls is a global problem which every country in the world has been addressing as part of a global ecosystem for many years in intergovernmental and industry bodies, in academic R&D and patent filings, and industry products with ongoing activity continuing today. more
No baby boomers had been born when Congress enacted Title II of the Communications Act in 1934 as a means of regulating the Bell telephone monopoly, and the first Millennials were in elementary school when that monopoly was broken up in 1983. Title II was set to die along with plain old telephone service until the Obama administration decided Title II should be used to implement net neutrality -- the principle that consumers should have reasonable access to internet functionality. more
Finally, Guyanese Internet users at all levels who are interested in internet governance issues and policy-making now have a local organization to address their interest. The Internet Society, a leading advocate for the open development, evolution, and use of the Internet for everyone, announced on October 10, 2017, at the official launch of the Internet Society Guyana Chapter that they were happy to finally have Guyana onboard. more
RIPE held its 75th meeting in Dubai in mid-October. As usual, there was a diverse set of presentations covering a broad range of activities that are taking place on today's Internet. The topics include issues relating to network operations, regulatory policies, peering and interconnection, communications practices within data centers, IPv6, the DNS, routing and network measurement. If that's not enough, the topic of the Internet of Things has been added as a Working Group in the RIPE pantheon. If you add address policy, database and RIPE services to the mix, you get a pretty packed five days with topics that would appeal to most Internet folks. more
IPAM solutions are the source of truth for IP resources on the network, but when performing IPAM functions such as assignments, reconciliations, DNS updates, network plans, or Regional Internet Registry (RIR) requests, IPAM is often limited by its integration with an OSS. Operational teams can find it challenging to complete routine tasks without an integrated IPAM solution due to siloed data pools and swivel-chair environments. more
Complainants naturally want to prevail on their claims of alleged infringing conduct and respondents (when they appear) naturally do their best to resist having their domain names taken from them in proceedings under the Uniform Domain Name Dispute Resolution Policy (UDRP), but their success depends on their submitting the right constituents of fact and proof. In a forum that has adjudicated over 60,000 cases, it would be surprising if there were no questionable or badly reasoned decisions. more
In 1990, Teledesic was formed to deliver satellite-based Internet service. Cellular pioneer Craig McCaw, Microsoft co-founder Bill Gates and Saudi Prince Alwaleed bin Talal were early investors and Boeing was both an investor and the prime contractor. Teledesic hoped to offer global Internet connectivity using a constellation of 840 satellites in low-Earth orbit (LEO) at an altitude of 700 km... Teledesic failed. Twenty seven years later three companies SpaceX, OneWeb and Boeing are trying to do what Teledesic could not do. Will they succeed? more
One of the most profoundly disruptive developments occurring in the cyber security arena today is the headlong rush by a set of parties to ubiquitously implement extreme End-to-End (e2e) encryption for communication networks using essentially unbreakable encryption technology. A notable example is a new version of Transport Layer Security (TLS) known as version 1.3. The activity ensues largely in a single venue... more
The best and most knowledgeable experts of dot Brand met in the Brands and Domains conference, on October 2 and 3 in the Hague, Netherlands. Brand and project owners were also present, coming from all around the world -- from Australia or Japan to the USA and Canada. The keynote by Georges-Edouard Dias, CEO of Quantstreams and founder of the concept of brand hospitality, explained how customers are not anymore the targets of brands. more
Amazon filed applications for the .AMAZON top-level domains in several scripts in 2012. Five years later, ICANN will re-examine the applications after an Independent Review Process (IRP) proceeding. The IRP Panel found that ICANN's Board failed to demonstrate the existence of public policy reasons for denying the applications. more
Rep's Graves and Sinema recently introduced H.R. 4036, the catchily named Active Cyber Defense Certainty Act or ACDC act which creates some exceptions to criminal parts of computer crime laws. Lots of reports have decried "hack back" but if you read the bill, it's surprisingly well targeted. The first change is to what they call Attributional Technology, and says it's OK to put bait on your computer for an intruder intended to identify the intruder. more
Independence must be a fashion of the moment. Cataluña, a place where I've lived, is fighting hard to be independent and, even if I don't believe a second that this will ever happen, it is a common example of a community which fought hard, very early and by all means, to operate a new gTLD to clearly identify its culture (and Nation) on the Internet: the .CAT Top-Level domain. Note that this TLD has nothing to do with the .DOG nor .PET new gTLDs (joke). more
Some inevitable changes are hard to see in prospect, yet are 'obvious' in retrospect. The next communications revolution is 'made for cloud' access. A colleague pointed me to a Forbes article "For Today's Telecoms Companies, Customer Experience Is Just As Important As Download Speeds". It was written by Huawei's global president of assurance and managed services. Well, I told you so! more
The French MP and Fields medal award winner, Cédric Villani, officially auditioned Constance Bommelaer de Leusse, the Internet Society's Senior Director, Global Internet Policy, last Monday on national strategies for the future of artificial intelligence (AI). In addition, the Internet Society was asked to send written comments, which are reprinted here. more
The U.S. Internet Revenue Service now says that criminals already had most of the information that credit bureau Equifax lost in a breach that revealed personal information about nearly 150 million people. The incident at Equifax and the IRS' mid-October admission of how much-stolen data was already in criminal hands may force changes in how the world handles personal information. more
Sponsored byCSC
Sponsored byRadix
Sponsored byIPv4.Global
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byVerisign