Almost a year ago I wrote about Google Chrome: Cloud Operating Environment and [re]wrote the Google Chrome Wikipedia article, discussing the ways in which Google was changing the game through new and innovative features... Similar features were quickly adopted by competitors including Opera (which Chrome quickly overtook at ~2%) and Firefox (which still has an order of magnitude more users at ~20-25%). more
Who would dare to predict the year the Internet will reach 50 billion addressable devices? Thomas Noren, head of LTE product development at Ericsson sees one day 50 billion devices shouldered by LTE. He sees LTE as the truly global standard putting to rest the long and acrimonious rivalry between CDMA and GSM protagonists and even sees the Chinese third way with their TD-SCDMA aligned on LTE. Mobile WiMax is, in his mind, already relegated to the dustbin of history... more
It was interesting to see that in New Zealand Vodafone had second thoughts and decided to come up with its own proposal of forming a consortium of network operators, rather than simply supporting the government's announcement of its FttH plans. Our analysis of this change of mind is that mobile operators increasingly need fibre networks to sustain the enormous growth in mobile broadband. Most mobile stations around the world are not connected to a fibre network. more
The Wall Street Journal's dubious story about Iran's use of Deep Packet Inspection (DPI) for spying, censorship and disinformation appears in a highly charged atmosphere. The US Republican right wing wants the US to talk tougher to Iran, to bomb-bomb-bomb, invade, or commit "regime change." More questions than mine have surfaced about the WSJ's story... more
I'm not sure what the Chinese government is thinking, or whether certain parts of certain ministries and party apparatus have gotten completely out of control. Until recently, it had seemed to me that the Chinese government was managing its censorship system with surprising success... But this month, something shifted. It's unclear whether the shift is long-lasting or just temporary madness until the PRC's 60th anniversary on October 1st. more
Over the past few weeks I have been seeing reports that some ISP's are actually subverting DNS queries to their own DNS server. Oh the humanity! What this means is that when you (your computer) does a UDP or TCP Port 53 DNS query the ISP is intercepting that and directing it to their own servers. Has anyone been told by their ISP that they are doing this? No? I didn't think so... more
Many software applications rely on validation routines to check the validity of domain names. By validation, I mean here to test the string submitted by the user and see if it matches a pre-defined pattern. A typical example are web forms that need to validate e-mail addresses. This is by new means a new issue. It first appeared with the introduction of the .info Top-Level Domain (TLD). more
The deployment of Fiber to the Home (FttH) around the world is beginning to lead to exciting developments for the next generation of telecommunications. In particular, infrastructure based on FttH is providing the foundation for smart communities and cities where a number of technologies and services are combined to create an enhanced value proposition for residents. Smart homes connected to these networks can utilise services such as tele-health, e-education and e-government as well as access digital media and high speed Internet. more
Internet governance is getting a thorough look under the hood, thanks to the National Telecommunication and Information Administration. NTIA recently concluded its public comment period under a Notice of Inquiry (NOI), which asked for public comments regarding the future of the Joint Project Agreement (JPA) between the Department of Commerce and ICANN. At its core, the NOI asks whether the White Paper's original vision of privatizing the technical coordination and management of the Internet is working. For reasons I will explain, it would be deeply unwise for NTIA to terminate the JPA just yet. more
ICANN controls the "root" of the naming hierarchy, designating the operators and managers of the top-level domains, like ".com" and ".net" and ".uk." Since its founding in 1998, ICANN has operated under a "Joint Partnership Agreement" (JPA) with the U.S. Department of Commerce. The current extension of this agreement is set to expire on September 30 of this year. Some advocates say it's now time for the U.S. government to cut its ties and let ICANN stand on its own. That's not a good idea. more
If you put 65 million people in a locked room, they’re going to find all the exits pretty quickly, and maybe make a few of their own. In the case of Iran’s crippled-but-still-connected Internet, that means finding a continuous supply of proxy servers that allow continued access to unfiltered international web content like Twitter, Gmail, and the BBC... more
At first blush, Mahmoud Ahmadinejad and the Globally Protected Marks List (GPML) do not seem to have anything in common. The first is a politician of debated repute that is seeking to quell disputes over the legitimacy of his election. The second is a recommendation that seeks to protect trademark owners and consumers from an explosion of infringement and source confusion that could be wrought by the introduction of new Top-Level Domains (TLDs). However, upon a closer analysis, they do share one common flaw: both have arguably failed to appropriately prioritize the right to free speech... more
.ORG, The Public Interest Registry has, since its inception, advocated for policies designed to reflect the public interest, namely of fair and open competition that benefits not only .ORG, but all Internet users. ICANN is now faced with a critically important decision on whether to remove the trusted and proven safeguards that prevent domain name registrars from owning and operating domain name registries. Because of its concern for end users, support for the success for new Top-Level Domains (TLDs), and strong belief in the benefits of fair competition, .ORG vigorously opposes removing these critical safeguards and strongly supports registry-registrar separation... more
Lord Carter's Digital Britain report contains few surprises given that its essential thrust has been much discussed during the past six months. What remains unequivocal is that the report and its (political) backers trumpet a national broadband network which promises to deliver an insufficient network. It also lacks a broader vision... more
Apple's Wordwide Developers Conference may have just ended, but already, the conference release of Mac's OS X 10.6 — a beta build previewed for developers — has been leaked onto torrent sites. It borders on irony: for years, Mac lovers have touted the superior security of the Mac operating system over Windows, but earlier this year, it was torrent sites — the very sites where OS X 10.6 is now being freely copied — that caused more than 25,000 Mac users to fall victim to the iServices Trojan. Some Macs never learn. more
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byRadix
Sponsored byVerisign
Sponsored byCSC
Sponsored byIPv4.Global
Sponsored byWhoisXML API