Last month saw a much-anticipated decision handed down in the Independent Review Panel (IRP) proceeding examining the controversial 2015 auction for the .web generic top-level domain name registry (gTLD). This decision has been covered by others, including Kevin Murphy's DomainIncite, and has been the subject of unsurprisingly incongruous statements by both Verisign and Afilias, who are both contending for the .web concession privilege. more
In spite of being a latecomer to the race to deploy a constellation of low-Earth orbit (LEO) broadband Internet satellites, Amazon's Project Kuiper will be a formidable competitor. SpaceX, OneWeb and Telesat already have test satellites in orbit, but Amazon has several strategic advantages. For a start, each of the LEO broadband competitors plans to end the digital divide by providing global connectivity to end-users and small organizations in underserved areas... more
The public policy objectives in the area of content filtering and blocking space are intended to fulfil certain public policy objectives by preventing users within a country from accessing certain online content. The motives for such public policies vary from a desire to uphold societal values through to concessions made to copyright holders to deter the circulation of unauthorised redistribution of content. more
A common security prediction for 2010 is the continued rise of malware and phishing attacks on mobile phones. The MarkMonitor Security Operations Center recently detected an interesting twist on this theme involving a popular smartphone and the latest smart technologies used by cybercriminals. In this case, instead of compromising a smartphone to steal its information, cybercriminals used phishing techniques to clone smartphones. more
There's still a few weeks before Halloween, but have we ever got a scary story for you -- and every word of it is true. (Imagine we're sitting around a campfire, chowing down on s'mores, flashlights under our faces.) Seven years ago, on this very internet, there was a man named Matthew who was angry about spam. Now sure, there are lots of people angry about spam, and some of them are named Matthew, but this particular Matthew decided that he was going to do something about it... more
When CAN-SPAM was passed in 2003, it was fairly clear that Congress wasn't trying to enable broad private enforcement. Everyone knew that rabid anti-spammers would seize any new statutory right for a litigation frenzy... Although I personally think Congress would better served all of us by omitting all private enforcement rights in CAN-SPAM, unquestionably the private rights in CAN-SPAM are drafted narrowly to prevent their abuses. That hasn't stopped some zealous anti-spammers from testing the limits of CAN-SPAM's private enforcement remedies anyway. more
A rewrite of the Rich Internet Application (RIA) article is my latest contribution to Wikipedia following last year's full rewrite of the Cloud Computing article (which is now finally fairly stable and one of the main authoritative sources on the topic; according to the article statistics I've just done my 500th edit, or one every eight hours on average so it's about as up-to-date as you'll find). Needless to say I agree wholeheartedly with Mozilla's Mark Finkle in saying RIA is Dead! Long Live Web Applications... more
There is a lot of news recently about low-orbit satellite broadband. There is recent news concerning the three primary companies that will be vying in the space. First is Jeff Bezos Project Kuiper, which is still likely to get a brand name at some point. Project Kuiper has contracted with United Launch Alliance, a joint Boeing-Lockheed Martin venture, for the first nine broadband rocket launches. more
ICANN has just published a paper from its contractor PowerAuctions LLC, regarding the use of auctions to award new Top Level Domains (TLD) strings in case of contention. I can understand what ICANN wants to avoid. In the past, it has been criticized for using the "beauty contest" model with the redelegation of the .net TLD... However, the auction model is based on the idea that whoever wins the auction will be able to recoup its investment on the sale... more
Sure the iPhone has problems, but John Stankey of AT&T thinks restoring a $2B capex cut will fix them. It may take a little more money than that, but Glen Campbell of Merrill Lynch has confirmed he's on track. In a 50 page report that's one of the best I've read in years, Merrill destroyed the common belief that wireless has a significant spectrum shortage. more
As long as US telecom is duopoly dominated, a neutral Internet is endangered if not impossible; regulation of this kind of concentrated power is necessary but is unlikely to be sufficient. The solution, IMHO, is to dilute the power of the duopoly so that consumers can buy whatever kind of Internet access they want. Countries like the UK with a competitive ISP market do not seem to have net neutrality problems nor require net neutrality regulation and have better Internet access than we do at lower prices. more
A substantial amount of DNS community discussion on the topic of DNS Abuse is focused on defining what is or is not DNS Abuse. The definition adopted by ICANN contracted parties, as well as the DNS Abuse Institute, is straightforward: DNS Abuse is malware, botnets, pharming, phishing, and spam where it's a vehicle for the preceding harms. There is, of course, some fuzziness on the margins, where technical harms are also using content. more
Five years ago, any discussion of 5G included a vision that we'd end up with smart cars that were all connected with a ubiquitous 5G network that was going to be built everywhere. We're still waiting to see a real 5G network anywhere instead of the 4G LTE networks that are still being touted by every cellular company as 5G. The idea of a ubiquitous network capable of supporting smart cars died, but there is still an effort underway to use wireless technology to make car travel safer. more
The promise of "big data" -- real-time insights, predictive analytics and a better understanding of customer behaviors -- has many companies jumping into this near-bottomless information pool with both feet. But the sheer volume of data can cause serious stress for IT professionals trying to balance C-suite expectations, legacy tech limitations and corporate workloads. What's more, the data market is rapidly evolving. more
In the end it was a disappointment that the treaty on International Telecommunications regulations (ITRs) that had been under negotiation for two weeks at WCIT-12 was not acceptable to 55 countries, and that, as a consequence, these countries did not sign the final version of the international treaty (89 did sign). After two weeks of sometimes fractious negotiation - 1,275 proposals were discussed in all - the contentious issues were significantly watered down. However the dissenting countries felt that the key issue - anything in relation to the internet - should not be included at all and, quite correctly, did not compromise on that. more
Sponsored byCSC
Sponsored byDNIB.com
Sponsored byWhoisXML API
Sponsored byRadix
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byVerisign