Consumers who have a choice are quickly deciding they don't need the old copper-based phone network, often known as POTS for Plain Old Telephone Service. We use our cellphones for talking even when we're not mobile. The cell phones have built in phone directories, easy ways to return calls, the ability to call a number on a web page; and we don't share them with our parents or children... It's a good year for traditional phone companies when they don't lose more than 10% of their POTS lines. more
This is, of course, about the recent NYT article that showcases the results of Prof Stefan Savage and his colleagues from UCSD/Berkeley. As my good friend and longtime volunteer at CAUCE, Ed Falk, points out, this is a great find, but hardly a FUSSP. The nice thing about the fight against bots and spammers is these little victories people on "our" side keep having in an endless series of skirmishes and battles... more
The latest ICANN Applicant Guidebook was released in mid-April and covers the introduction of new generic Top Level Domains (gTLD). The introduction of new gTLDs has been an ongoing conversation for more than a decade. We have an opportunity to approve the final draft in time for consideration of the new gTLD implementation program during the ICANN Board meeting, which will be held on Monday, 20 June 2011, in Singapore. We submitted our comments yesterday and wanted to share them with you. more
A common acronym in spam-fighting is FUSSP -- Final Ultimate Solution to the Spam Problem. It's used (usually derisively) to describe the latest proposed scheme to end spam once and for all. Usually these schemes are based on false assumptions or have already been tried with no results. This time - be still, my beating heart - it looks like some researchers at the University of California might really be on to something. more
In case you missed it a few days, a story broke that said that Facebook was caught hiring a PR firm to spread stories about Google about how they invade people's privacy... Even though I work for Microsoft and therefore can hardly be considered unbiased, I think Microsoft would be in a position to call out others for lack of privacy protection. I say this based on the fact that in my division, every new feature that we implement has to go through Privacy reviews... more
The EC recently approved technical rules on how the 900MHz and 1800MHz frequency bands should be utilised for 4G services, including LTE and WiMAX. National governments have until the end of 2011 to implement the decision into national legislation. Restrictions were initially imposed by the 1987 GSM Directive which limited these bands for 2G. more
The current .NET Registry Agreement between ICANN and VeriSign is due to expire on 30 June 2011. On April 11 2011 ICANN posted a proposed draft renewal agreement for public comment. Under the terms of the existing agreement, which contracted a 6 year term starting July 1 2005, renewal is automatic unless VeriSign commits some egregious breach of terms. more
Buzz Lightyear, the astronaut character from the movie Toy Story, is known for his tagline, "To infinity, and beyond!" ICANN can take a lesson from the ebullient Buzz with respect to accountability and transparency. Just as Buzz believed he could fly beyond infinity, ICANN should view full implementation of the Accountability and Transparency Review Team (ATRT) recommendations not as the last stop, but as the next stop on its important journey of accountability and transparency. more
It's no secret that the supply of IPv4 addresses, on which the Internet has been based since the dawn of digital time, is rapidly running out. The official replacement is much larger IPv6 addresses, but I can report from experience that the task of switching is not trivial, and for a long time there will be a lot of the net that's only on IPv4. So once the initial supply of IPv4 addresses run out, and the only way to get some is to buy them from someone else, what will the market be like? more
Last week I published an article in Ad Age that the editors titled "Should your company jump on the dot-brand bandwagon?" I received several emails and LinkedIn requests from advertising and PR agencies as well as brand managers. One of the questions I received had to do with my opinion on whether brands that are currently promoting themselves via Facebook, e.g., "Find us on Facebook.com/brand," should consider the new Top-Level Domains (TLDs). more
I was a little early. "By the end of President Obama's first term, there won't be any more copper landlines left in the country, I blogged just after Obama had been elected. Before that I'd prophesized the end of POTS (Plain Old Telephone Service) by 2010. Nevertheless, the end is nigh. And it's gonna be ugly without some planning. more
ICANN released its sixth version of the draft Applicant Guidebook for the new Top-Level Domain (TLD) program in April following three years of debate surrounding the rules and procedures that will outline how potential applicants will apply to own their own piece of Internet real estate. Overall, the response has been positive. more
The distribution and installation of malicious and unauthorized software has evolved consistently throughout the 21st Century. The evolutionary path from annoying viruses, to destructive malware and on to financially driven crimeware, is well documented and can even be conveniently traced via the parallel evolution of technologies that were designed to counter each new aspect of the then contemporary threat. more
There's more than a hint of theatrics in the draft PROTECT IP bill that has emerged as son-of-COICA, starting with the ungainly acronym of a name. Given its roots in the entertainment industry, that low drama comes as no surprise. Each section name is worse than the last: "Eliminating the Financial Incentive to Steal Intellectual Property Online" (Sec. 4) gives way to "Voluntary action for Taking Action Against Websites Stealing American Intellectual Property". more
The breadth of cyber threats that an organization must engage with and combat seemingly change on a daily basis. Each new technology, vulnerability or exploit vector results in a new threat that must be protected against. Meanwhile some forms of attack never appear to age -- they remain a threat to business continuity despite years of advances in defensive strategy. One particularly insidious and never-ending threat is that of the Distributed Denial of Service (DDoS) attack. more
Sponsored byVerisign
Sponsored byWhoisXML API
Sponsored byIPv4.Global
Sponsored byRadix
Sponsored byVerisign
Sponsored byCSC
Sponsored byDNIB.com