ICANN has its 34th international public meeting in Mexico City on 1-6 March i.e. in just over a fortnight. One of the consistent concerns I hear in my role as general manager of public participation for the organization is that there is not a way for people to ask questions to the staff and the Board. I don't think that's really true but I do accept that the formats used are not liked by a large number of people... more
As enterprise information security spending is scrutinized in unprecedented fashion in 2009 Information Technology management will seek to get more for their security dollar. While budgets tighten and risks grow due to the global economic downturn IT departments will be looking for point solutions, not suites of security tools. more
The telecom industry five years from now will be unrecognizable. The creative destruction of the Internet broadly writ will be even greater than it has been in the last decade. The major telcos, the major television networks, and the major cablecos -- if they still exist at all -- will have very different revenue models than they have today. That's the good scenario... more
Adding to the flurry of gambling news of late, the Washington Court of Appeals issued a decision today that found peer-to-peer betting company (betcha.com) did not violate Washington state gambling laws. The court runs through some other issues underlying the statute, but the net result is that Betcha is off the hook... for now. Read more... more
The telecom infrastructure decisions we are now facing have very little to do with developments or the need for services in 2009 or 2010. They are more related to where the digital economy is taking us in the future. This is well beyond the time needed to kick-start sluggish economies. more
In this multipart series I will be presenting some of the leading industry-standard best practices for enterprise network security using Cisco technologies... In Part 1 of this series, I provided an overview of the critical role that properly designed data security architectures play within an Internet-connected organization. Before we begin to discuss the security designs, processes and recommendations related to Cisco technology, let's first discuss some of the ways a network becomes unsecure... more
In the U.S., it is a federal crime to use malware to intentionally cause "damage without authorization" to a computer that is used in a manner that affects interstate or foreign commerce. Most, if not all, U.S. states outlaw the use of malware to cause damage, as do many countries. The Council of Europe's Convention on Cybercrime, which the United States ratified a few years ago, has a provision concerning the possession of malware. Article 6(1)(b) of the Convention requires parties to the treaty to criminalize the possession of malware "with intent that it be used for the purpose of committing" a crime involving damage to a computer or data... more
The story of America's lacklustre broadband performance is relatively well known. Part of that story relates to its low broadband penetration levels when compared with other developed economies... Another aspect of the story relates to broadband speeds... in terms of broadband technology levels, the USA still trails behind leading countries such as Japan and Korea, and some European countries such as France and Italy, by a full generation. more
The City of Amsterdam announcement to now move to the next stage of their FttH (fibre to the home) project -- with another roll out covering 100,000 connections -- is a clear indication that the concept of open access FttH networks is a valid one. This will have large scale implications for countries around the world who are looking at using open network based telecoms infrastructure projects to stimulate their economies. more
We've had snow storms recently in the UK, so there is much talk about storms. It strikes me that some might view the current issues at Nominet as a storm in a teacup – a small event that has been exaggerated out of all proportion. Not unsurprisingly, I don't agree. I think that the storm has already had a significant effect on Nominet... more
Most developed nations are now revisiting their telecoms policies with a view to using telecoms infrastructure as a tool to revive the economy. And when exploring this it quickly becomes clear that open networks are necessary if we are to achieve the economic benefits that the digital economy has to offer. The multiplier effect of open infrastructure is obvious. It stimulates developments in healthcare, education, energy, media and Internet -- this in stark contrast to the closed (vertically-integrated) networks that are currently operated by most incumbent telcos around the world. more
Today is a historic day as the first generic Top-Level Domain (gTLD) has been signed. Only a few other top level domains, all of which are country code Top-Level Domains (ccTLDs), have been signed to date. This step is part of the first phase of adoption. Authoritative DNS servers need to sign and publish their zones. The second part is for the resolvers on the Internet to validate the keys. Both systems working together will provide security in the DNS. more
Paul Stahura published a great report demonstrating that trademark holders have historically not been blocking their names across multiple Top-Level Domains (TLDs). I have always been a fan of number crunching -- "numbers never lie". Since Paul has already done a remarkable job of statistical analysis, I am going to wear my theorist hat and prove a reworded form of the Hypothesis using logical deduction and common sense... more
If you visit the new dashboard on ICANN's web site, you see some nice bar charts, including one rather large negative number of $4,462,000. If you click the little arrow at the top of the Financial Performance chart, a footnote window pops open where the last sentence is: "The large variance to budget is due to investment losses of $4.6 mil." Investment losses? Yup, ICANN's been speculating in the stock market... more
A Tipping Point for the Internet? Catching the precise moment of a tectonic shift in a global system as large and important as the Internet may be viewed as an exercise in the improbable. However, I point out in this summary that I think we are precisely in the midst of such a shift... more
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byCSC
Sponsored byIPv4.Global
Sponsored byWhoisXML API
Sponsored byRadix
Sponsored byVerisign