At June 30, 2015 the Inaugural Meeting of the Coordination Council of the NetMundial Initiative (NMI.CC) elected a "Quintett" to guide its activities through the global Internet Governance Ecosystem. Alibaba's CEO Jack Ma from China, ICANN's President Fadi Chehade, Brazilian's Minister Virgilio Almeida and two woman: Eileen Donahou from Human Rights Watch (HRW)) and Marilia Maciel from the Center of Technology and Society (CTS) in Rio de Janeiro are sharing now the helm to bring more steam to this new innovative multistakeholder platform. more
During the last week of December, two US Government agencies released papers on IPv6. NIST released Special Publication 800-119, Guidelines for the Secure Deployment of IPv6. This comprehensive 188 page paper provides guidelines for federal agencies (and anyone else who might want to take advantage of it) to securely deploy IPv6. more
The experience of interviewing a data scientist is like none other. Over the past year, we've interviewed more than 100 data scientists, and most, if not all, of them are brilliant. After all, they are a data scientist and have spent many years mastering their craft. The purpose of this post is to potentially assist technology leaders who are considering hiring a data scientist or a data science team. There are five items of consideration. more
Time for another annual roundup from the world of IP addresses. What happened in 2013 and what is likely to happen in 2014? This is an update to the reports prepared at the same time in previous years, so let's see what has changed in the past 12 months in addressing the Internet, and look at how IP address allocation information can inform us of the changing nature of the network itself. more
What occurred in Dubai on 14 December was unprecedented in the history of the ITU. It was unprecedented in the history of international telecommunication law. Most of the major nations of the telecommunication world rejected a profoundly broken treaty instrument that had no reason to even exist. A large number of "minor" networking nations accepted the obligations of the treaty instrument, although almost all of them entered significant reservations. In the long history of telecommunication law and intergovernmental organizations since 1850, this has never occurred. more
It seems everywhere I turn, there's someone throwing around statistics for how the Internet and broadband will drive economic growth, create jobs, end world hunger and bring world peace (ok, maybe not the later). Sure enough, government officials are buying into that rhetoric and extending it in initiatives like national broadband strategies, cybercrime and cybersecurity plans as well as e-governance strategies. more
Innovation is one of those words that is a bit hard to internalize. Merriam-Webster says innovation is the introduction of something new or a new idea, method, or device. That would be a narrow definition, perhaps even obsolete. Innovation is much more than invention or introducing new technology. Some would say that innovation is more of a state of mind, an attitude. One thing is for sure: innovation is happening more quickly; it is more open and more collaborative. more
One of the other web sites I subscribe to is Stratfor. It's a global intelligence website and doesn't really have much to do with spam. But I like politics so I read it. They have some articles which you can get for free, but the better stuff you have to pay for. About two weeks ago, they ran a three-part series on Cyberwarfare. The first article was the title of this post, which you can access here (requires registration). In the article they described different types of cybercriminals and not-so-criminals which they referred to under the umbrella as "hackers." more
Through 2024, IPv4 leasing stayed steady at about $0.50 per IP per month, even as purchase prices diverged by block size. Large blocks (like /16) corrected notably while smaller blocks (/20 - /24) remained comparatively firm. That spread reflected shifting enterprise behavior (more surgical allocations, less speculative buying) and the resilience of subscription-like leasing in unstable conditions. more
Too many techies still don't understand the concept of due process, and opportunistic law enforcement agencies, who tend to view due process constraints as an inconvenience, are very happy to take advantage of that. That's the lesson to draw from Verisign's proposal and sudden withdrawal of a new "domain name anti-abuse policy" yesterday. The proposal, which seems to have been intended as a new service to registrars, would have allowed Verisign to perform malware scans on all .com, .net, and .name domain names quarterly when registrars agreed to let them do it. more
This part 3 of the selecting a back-end registry service provider series focuses on Whois and sharing data in new gTLDs. If you've ever looked up information about a domain name you've used a Whois service. It's the public information system about contact information for a domain name or IP addresses, though in this article, we will just talk about domain name Whois. In some generic and sponsored Top Level Domains (gTLDs), Whois is run authoritatively by the gTLD. In older gTLDs such as .com and .net, the authoritative Whois service is run by the registrar responsible for the domain name. While some TLD operators run their own infrastructure... more
Last month saw a much-anticipated decision handed down in the Independent Review Panel (IRP) proceeding examining the controversial 2015 auction for the .web generic top-level domain name registry (gTLD). This decision has been covered by others, including Kevin Murphy's DomainIncite, and has been the subject of unsurprisingly incongruous statements by both Verisign and Afilias, who are both contending for the .web concession privilege. more
On September 12 China, the Russian Federation, Tajikistan and Uzbekistan released a Resolution for the UN General Assembly entitled "International code of conduct for information security." The resolution proposes a voluntary 12 point code of conduct based on "the need to prevent the potential use of information and communication technologies for purposes that are inconsistent with the objectives of maintaining international stability and security and may adversely affect the integrity of the infrastructure within States..." more
Conventional thinking or solutions will no longer work in the new era of ISIS and the 'Unprecedented' cyber and non-cyber attacks we live in today. Like it or not, everyone is impacted, and no one is immune. Whether you are an average citizen, a chairman or CEO of a multinational, or a government or academic institution leader, the questions to ponder are: Do you know what to do next? Do you know what the solution is? more
To paraphrase an old Klingon proverb, there can be no spam solution, so long as e-mail is free. Yahoo has unveiled plans to launch its Domain Keys software as an open-source toolkit in 2004. The intent is to allow developers of major e-mail systems to integrate Yahoo's public/private key authentication system into their own software and thus create momentum for a standard whose raison d'etre is identify verification. This is a commendable effort, but a closer look reveals that it will not only not stop the spam problem, it may have almost no effect at all. more
Sponsored byWhoisXML API
Sponsored byRadix
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byCSC
Sponsored byVerisign
Sponsored byIPv4.Global