The debate about the control of the internet is intensifying, with interesting discussions expected later on this year in Dubai at the WCIT conference organised by the ITU. Over the last 25 years the industry has moved from being mainly telephony-based to being mainly IP-based, and many say that what is now at stake is the future of the internet as we know it at this point in time... The reality now is that the political stakes of the internet have risen significantly. more
Maybe it's because I was schooled in political science, not computer science. But frankly I've been surprised by the extent to which some respected commentators have focused on trashing Google for lacking purity of motive. As if that were some kind of brilliant revelation. Of course Google's actions are motivated by self-interest. Self-interest is a complicated thing, and isn't only financial... But let's be honest with ourselves. How many people on the planet do anything for 100% selfless reasons? If having a free, open and just society depends on purity of motive, God help us all. more
The announcement last month of a new approach by the Internet Corporation for Assigned Names and Numbers (ICANN) to Africa is welcome, and significant for a number of reasons. Africa must participate in ICANN's activities to help shape its policies, and benefit from the domain name industry (estimated at $2 billion in 2008), where it lags behind other regions, given the few African registrars, and that there are no generic top-level domain names (gTLDs) registries that are African. more
There's been a global argument going on for some time now over how the Internet should be governed. Many governments, including China but also many others, are not happy that the "root" of the Internet is controlled by the Internet Corporation for Assigned Names and Numbers (ICANN), which ultimately answers to the U.S. Department of Commerce. In 2005, there were proposals from various countries to move Internet governance from ICANN to a United Nations body of some kind... But there was no consensus. Human rights groups were rightly concerned that giving governments like China and Iran greater say in Internet governance would lead to more censorship and the elimination of privacy and anonymity. more
How will the business of existing top-level domains (TLDs) be impacted by the new gTLDs? Someone asked me this simple question and I was very surprised to see that my online searches couldn't easily find many detailed articles or research related to that point. more
A report "Securing Cyberspace for the 44th Presidency" has just been released. While I don't agree with everything it says (and in fact I strongly disagree with some parts of it), I regard it as required reading for anyone interested in cybersecurity and public policy. The analysis of the threat environment is, in my opinion, superb; I don't think I've seen it explicated better. Briefly, the US is facing threats at all levels, from individual cybercriminals to actions perpetrated by nation-states. The report pulls no punches... more
After more than two years of work behind closed doors, the Global Network Initiative is launching this week. That's the corporate code of conduct on free speech and privacy I've been talking about in generalities for quite some time. By midnight Tuesday U.S. East Coast time, the full set of documents and list of initial signatories will be made publicly available at globalnetworkinitiative.org. more
The success or failure of public cloud services can be measured by whether they deliver high levels of performance, security and reliability that are on par with, or better than, those available within enterprise-owned data centers... IDC forecasts that public cloud IT spending will increase from $40 billion in 2012 to $100 billion in 2016. To provide the performance, security and reliability needed, cloud providers are moving quickly to build a virtualized multi-data center service architecture, or a "data center without walls." more
Today ICANN releases a paper with the title "DNSSEC @ ICANN - Signing the root zone: A way forward toward operational readiness". The paper explains in more detail than earlier documents what ICANN view on signing of the root zone is. I think the key points mentioned in this paper are true, and in general, I think this document is a good read. It is not long, and summarizes what I would call the current view is. more
Last week I took a Cab on my way back from the Montparnasse Station in Paris. My wife had ordered a Taxi and it was waiting for us at the Taxi station. We had ordered it because we arrived late in Paris that night. Surprisingly, the Cab was a black Limousine with no Taxi sign on its top and the driver, who wore a costume, was gentle and polite. If you ever took a Taxi in Paris, you probably know why I am adding this to this paragraph. more
Universal Acceptance (UA) is a fundamental requirement for a truly multilingual and digitally inclusive Internet. UA is important because it ensures that all domain names, including new long top-level domains (TLDs) and Internationalized Domain Names (IDNs), and email addresses are treated equally and can be used by all Internet-enabled applications, devices, and systems. more
The sixth annual Counter-eCrime Operations Summit (CeCOS VI) will engage questions of operational challenges and the development of common resources for the first responders and forensic professionals who protect consumers and enterprises from the ecrime threat every day. This year's meeting will focus on the shifting nature of cybercrime and the attendant challenges of managing that dynamic threatscape. more
According to recent news reports, the administration wants new laws to require that all communications systems contain "back doors" in their cryptosystems, ways for law enforcement and intelligence agencies to be able to read messages even though they're encrypted. By chance, there have also been articles on the Stuxnet computer worm, a very sophisticated piece of malware that many people are attributing to an arm of some government. The latter story shows why cryptographic back doors, known generically as "key escrow", are a bad idea. more
There certainly is a lot of interest in machine-to-machine communication (M2M) and the Internet of Things (IoT). But what we are seeing is only what is happening on the surface. Most of the M2M activities are taking place unnoticed. For example, most newly produced electronic devices are now all M2M enabled. Over 100 million smart meters have already been deployed by the electricity industry, with literally hundreds of millions of them in the pipeline. Healthcare is another key industry. more
The Internet is currently full of news articles describing how the FCC will soon be putting to bed the last vestiges of its order a few years ago to eliminate net neutrality rules. The order that is widely being called the net neutrality ruling was a far-reaching change at the FCC that essentially wrote the FCC out of any role in regulating broadband. more
Sponsored byCSC
Sponsored byRadix
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byWhoisXML API
Sponsored byIPv4.Global