The cloud computing scandal of the week is looking like being the catastrophic loss of millions of Sidekick users' data. This is an unfortunate and completely avoidable event that Microsoft's Danger subsidiary and T-Mobile (along with the rest of the cloud computing community) will surely very soon come to regret. There's plenty of theories as to what went wrong -- the most credible being that a SAN upgrade was botched, possibly by a large outsourcing contractor, and that no backups were taken... more
Eolas, a technology company that was awarded $565 million in a patent infringement settlement against Microsoft in 2007 is embarking on another campaign against others under the same grounds of patent violation. The latest lawsuit alleges that Apple and 22 companies are in violation of U.S. Patent Nos. 5,838,906 and 7,599,985, which involve embedded Web applications within a browser. The list of infringers also include Google/Youtube, Yahoo, Adobe, Amazon, Blockbuster, Citigroup, eBay, Frito-Lay, Go Daddy, J.C. Penney, JPMorgan Chase, Office Depot, Perot Systems, Staples, Sun Microsystems, Texas Instruments even adult-oriented Playboy. more
One of the bigger news stories is that of 10,000 usernames and passwords of Hotmail users were posted this past week, victims of a phishing scam... It seems unlikely to me that this would be a hack where someone would break into Hotmail's servers and access the account information that way. It is much more likely that the spammers got the information by social engineering. Why is this more likely? For one, they'd have to get past all of the firewalls and security measures that Microsoft/Hotmail have to keep intruders out. more
Sometimes you get what you are asking for. And this seems to be one of those occasions... and the US government can give itself a pat on the back for having listened to other stakeholder opinions. For years the world of Internet governance has been seen as its own special corner of the technosphere, full of arcane acronyms and quiet power deals. Despite efforts to make ICANN and the broader Internet community more transparent and user-friendly, many observers, including many African governments, still saw the stage as too much of an insider's game -- with the ultimate insider being the US Department of Commerce. more
During the ITU Conference I had the honour of a private meeting with Dr Hamadoun Touré, Secretary-General of the ITU since 2006... Dr Touré has a fascinating background. Born in Mali and educated in Russia, he has brought with him a distinctly fresh approach to the ITU. He has been Africa's Regional General Manager for ICO Global Communications and worked at various levels at the International Telecommunications Satellite Organization (INTELSAT). more
Since Obama became President -- and yes, I voted for him -- there has been a great deal of optimism and energy around the idea that the Internet can be used to improve or "reboot" our democracy. The Administration has hired some great people to work on making government more open and transparent. This is all great. But how much good will all of this nifty e-government do for American democracy if citizens' rights to privacy and free expression are not also fiercely defended? more
There has been quite a bit of talk lately about the best way to secure a domain, mainly centered in two camps: using Secure Socket Layer (SSL), or using DNS Security Extensions (DNSSEC). The answer is quite simple -- you should use both. The reason for this is that they solve different problems, using different methods, and operate over different data. more
This comment is being presented in my personal capacity and does not represent the views of my employer (Neustar, Inc.) and its subsidiaries or affiliates, or the Implementation Recommendations Team. Ok. I admit it. I supported the concept of a post delegation dispute resolution process for generic Top-Level Domains (gTLD) Registries. I served as the only gTLD registry member of the Implementation Recommendation Team (IRT) appointed by the Intellectual Property Constituency of the Generic Names Supporting Organization of ICANN. I was one of the authors of the IRT Recommendation in favor of a Post Delegation Dispute Resolution Procedure. more
I have found a disturbing lack of context in respect of some reports examining the state of Canada's telecommunications industry, especially those that have cited various OECD studies released over the past few months. It has become increasingly clear that the OECD's analysis is flawed. The failure by so many to analyse the data appears to confirm what President Barack Obama said recently in a newspaper interview... more
Very little was said about telecommunications during the official speeches and forums at ITU Telecom World 2009. The industry is even talking about changing its focus from telecommunications to ICT [United Nations Information and Communication Technologies Task Force], Discussions are now focusing on how ICT can be used to underpin the various socio-economic developments that are taking place. more
The much-anticipated New gTLD Draft Application Guidebook is out! ICANN has released Version 3. Lots of changes, some minor, some large. All worth reading if you're a potential applicant or just interested in the promise of new Top-Level Domains (TLDs). The public comment period clock started October 4, and runs until November 22 of this year. more
The surest way to screw up future innovative applications would be for ISPs to make constraining assumptions about the future based on existing applications' performance. Discussing P2P behavior as if it were some monolithic, unchanging entity is simply wrong. What is P2P? BitTorrent? Skype? CNN live video feed fan-outs? And what of changes to these existing apps? What of future apps? more
A secret weapon is falling into dangerous hands. Organized cybercriminals are building up portfolios of cybersquatting domain names. A smart operator with such a portfolio can go beyond simple stealing and competing full out for traffic and revenues. Rightful brand owners, feeling the squeeze, will find out too late that the bandits have the money to fight legal action. The time to act is now, before pieces of the playing field have been bought up by the enemy. more
I received a spam message the other day that went to my Junk Mail Folder. I decided to take a look at it and dissect it piece by piece. It really is amazing to see how spam crosses so many international borders and exploits so many different machines. Spammers have their own globally redundant infrastructure and it highlights the difficulties people have in combating the problem of it. more
In 2007, Johna Till Johnson, president of Nemertes Research, published a paper that hyped a so-called "Exaflood" - a kooky Discovery Institute idea about how the Internet would drown in its own data. The Nemertes press release on the paper was widely reported in newspapers. It described itself as a "... landmark study ... groundbreaking analysis ... evidence the exaflood is coming... It said: "The findings indicate that by 2010 ... users could increasingly encounter Internet "brownouts" or interruptions to the applications they've become accustomed to using on the internet." more
Sponsored byIPv4.Global
Sponsored byCSC
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byVerisign
Sponsored byRadix
Sponsored byWhoisXML API