With Trump's "extreme vetting" extending to Pakistan and others, nearly all U.S. institutions with a global reach will be cut off from some members. Internet Society Board Member Walid Al-Saqaf, from Yemen, can't attend the IETF meeting next month in Chicago. Board Member Alice Munyua from Kenya may also have to skip the event. "There is a high threat from terrorism in Kenya," the British government reports. Kenyans likely will require extreme vetting. ICANN board member Kaveh Ranjbar, born in Iran, has also been appointed to the IETF Administrative Oversight Committee. more
The new head of the U.S. Executive Branch took several actions this week that have profound collateral consequences for Silicon Valley as well as its scientific and technical communities. Presumably, he thought it was payback time for not supporting him. Perhaps he thought that producing automobiles domestically for non-Muslim U.S. citizens to drive around a walled nation is the way to future economic success. No matter, the effects of actions taken this week are the equivalent of nuking Silicon Valley. more
The free home-connectivity trial in Old Havana will end this week. Two thousand homes were eligible for the trial and I was told, off the record, that 700 people have signed contracts to pay for the service. I am not certain, but my guess is that those two thousand homes are served by a single central office that has been upgraded to offer Digital Subscriber Line (DSL) connectivity. more
Private or public? Both cloud types offer benefits and both have enjoyed significant growth over the last few years. Yet, what's the best bet for your business: The virtually limitless resources of public cloud stacks, or the close-to-home control of private alternatives? Here's a look at some critical differences between public and private clouds... more
Unsubscribing from mailing lists is hard. How many times have you seen a message "please remove me from this list," followed by two or three more pointing out that the instructions are in the footer of every message, followed by three or four more asking people to not send their replies to the whole list (all sent to the whole list, of course,) perhaps with a final message by the list manager saying she's dealt with it? For marketing broadcast lists, it's even worse because there's no list to write to. more
In the case, filed by Michelin, the panel found the domain name 'tyre.plus' confusingly similar to the trademark TYREPLUS. Specifically, the panel wrote: "If one ignores the 'dot' between the Second-Level Domain ('tyre') and the Top-Level Domain ('plus'), the mark and the Domain Name are identical..." It's an issue that's arising with increasing frequency -- just as I had predicted. more
The question is not uncommon these days for someone who has been the principal historian on the ITU over the past 40 years. The short answer is that the institution should do just fine. Indeed, the appearance of bizarre phenomena like Trump, enhance the value and trustworthiness of a stable, globally inclusive intergovernmental venue dealing with matters that by their nature require worldwide cooperation and is buttressed by one of the most highly regarded Secretary-Generals in its history. more
In Spike Jonze's 2013 film "Her", the main character Theodore Twombly (played by Joaquin Phoenix) falls in love with a Siri-like virtual assistant. It is an intelligent computer operating system, a variance of AI envisioned by the high technology developers of today. We are still far away from creating AI capable of thinking and learning for themselves, not to mention living in symbiosis with them. However, Intelligent Virtual Assistants can be perceived as a step towards the fulfillment of the idea. more
Many organizations are struggling to overcome key conceptual differences between today's AI-powered threat detection systems and legacy signature detection systems. A key friction area -- in perception and delivery capability -- lies with the inertia of Indicator of Compromise (IoC) sharing; something that is increasingly incompatible with the machine learning approaches incorporated into the new breed of advanced detection products. more
The term "counterfeit" is defined under U.S. trademark law as "a spurious mark which is identical with, or substantially indistinguishable from, a registered mark." 15 U.S.C. ยง 1127 (Lanham Act, Sec. 45). Used as a noun, domain names ultimately found to have been registered in bad faith make their registrants cybersquatters by definition. But more commonly we encounter counterfeiting as an adjective as it applies to spurious goods (counterfeit goods) -- "made in exact imitation of something valuable or important with the intention to deceive or defraud." more
Some years ago I wrote a post on the fact that I saw the world automate fast and did not see a lot of people worrying about the consequences for their lives. Nobody was smashing automated production lines. Smashing smartphones and laptops. In fact, embrace of new technology by the masses probably never before in history went this fast. Several and very different causes, including globalization, have led to a level of wealth that made these expensive tools and toys within reach of a vast number of people. more
In Part 1 of "Bug Bounty Programs: Are You Ready?" we examined the growth of commercial bug bounty programs and what organizations need to do before investing in and launching their own bug bounty. In this part, we'll discuss why an organization needs to launch a bug bounty program, and what limits the value they will likely extract from such an investment. more
Distributed Denial of Service is a big deal -- huge pools of Internet of Things (IoT) devices, such as security cameras, are compromised by botnets and being used for large scale DDoS attacks. What are the tools in hand to fend these attacks off? The first misconception is that you can actually fend off a DDoS attack. There is no magical tool you can deploy that will allow you to go to sleep every night thinking, "tonight my network will not be impacted by a DDoS attack." more
The premise of crowdsourcing the task of uncovering new bugs and vulnerabilities in an organization's web applications or consumer products sounds compelling to many. What's not to like with the prospect of "many eyes" poking and prodding away at a corporate system for a minimal reward -- and preemptively uncovering flaws that could have been exploited by hackers with nefarious intent? more
Aida Zeki?, a student at the University of Uppsala, Sweden has published her master's thesis, "Internet in Public: an ethnographic account of the Internet in authoritarian Cuba." The thesis reports on interviews of 50 Cuban Internet users at nine WiFi hotspots in Havana during September and October 2016. She asked pre-planed, but mostly open-ended questions of 25 men and 25 women. She tried to identify people between 25 and 50 years old, but a few were a little older. more
Sponsored byRadix
Sponsored byVerisign
Sponsored byCSC
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byWhoisXML API
Sponsored byIPv4.Global