Thus far, the debate over broadband deployment has generally been between those who believe that private telecom incumbents should be in charge of planning, financing and building next-generation broadband infrastructure, and those who advocate a larger role for government in the deployment of broadband infrastructure... Tim Wu and Derek Slater have a great new paper out that approaches the problem from a different perspective: that broadband deployments could be planned and financed not by government or private industry, but by consumers themselves. more
Two quick facts about American industry's resilience against cyber-attack, (1) our critical infrastructure is inadequately protected and (2) federal regulation will be required to fix the problem, reliance on market forces alone will not be sufficient irrespective of whether or not Sony Pictures survives. Although regulation is needed, it needs to be coordinated and, above all, cost-effective. Which agency is charge of regulating cybersecurity? Right now, it's a free for all with agencies staking out turf and claims of authority. more
Now that ICANN's Last Resort Auctions are becoming an imminent reality, more and more applicants with gTLDs in contention are coming to the conclusion that they would be better off in a private auction. As a result, there is a renewed discussion of the various approaches that have been proposed. Interesting new suggestions have also been made within the gTLD applicant community. more
BusinessWeek is running a column called 'Brandjacking' on the Web. In summary, nobody likes deliberate cybersquatting or typosquatting. But if Typo domain-names did not exist, the traffic would continue to flow to Microsoft or Google via the browser's error search where those very large companies would make money in the same manner as the 'evil cybersquatters'... more
DNSSEC continues to gain momentum as network operators and domain owners watch and learn from early adopters. The learning process is made easier by efforts such as the ongoing work conducted by researchers at Sandia labs to methodically identify and categorize the kinds of problems that are occurring. more
Starlink launched maritime service in July 2022, and by January 2023 Elcome International LLC, a maritime technology solution provider since 1970, had installed multi-antenna Starlink Maritime arrays on two super yachts with more than 100 passengers and crew. Elcome launched its Starlink maritime service in May 2024 and now has over 3,000 terminals under management. more
Efforts to combat cybersquatting began in earnest in 1998 when the World Intellectual Property Organization (WIPO) (at the request of the United States Government supported by all member states) began an extensive process of international consultations "to address cross-border trademark-abusive domain name registrations." ... The extensive process concluded in the Spring of 1999 with WIPO publishing a detailed report... more
A group of major ISPs and major content providers have agreed on a a mechanism to enforce copyright laws in the network. While full details have not yet been released, the basic scheme involves using previously designed IP flags to denote public domain content. That is, given general copyright principles, it is on average a shorter code path and hence more efficient to set the flag on exempt material. more
A new age of openness is coming upon us. At least that's what we're being told. For instance -- "The reign of closed solution suites is over, shifting to the rise of open, heterogeneous software ecosystems." Maybe it's my 30 years in the information technology business (how many people remember Thomas-Conrad ARCnet hardware?), but I'm not convinced. It's worth taking a moment to consider the case. more
Following up on my recent post about how solving the Bufferbloat problem could dramatically increase the speed of Internet usage, I recently learned via a Google+ post by Michael Richardson of this video of a presentation by Jesper Dangaard Brouer of Red Hat at the recent DevConf.cz Brno 2013 titled "Beyond the existences of Bufferbloat - Have we found the cure?" more
This morning, CSO and MacKeeper published joint articles on a massive data leak from a marketing company. This company, River City Media (RCM), failed to put a password on their online backups sometime. This leaked all of the company's data out to the Internet at large. MacKeeper Security Researcher, Chris Vickery discovered the breach back in December and shared the information with Spamhaus and CSO online. The group has spent months going through the data from this spammer. more
One of the throwaway remarks I sometimes make at conferences is that "Google knows you're pregnant before you do". I can say this because the things you search for will change as your life changes, and search engine providers may well be able to spot the significance of these changes because they aggregate data from millions of people. Now Google's philanthropic arm, google.org, has shown just what it can do with the data it gathers from us all by offering to predict where 'flu outbreaks will take place in the USA. more
This post demonstrates that success factors differ across generic Top-Level Domains (gTLDs) depending on their implied signal/message. Success drivers can be grouped into four: community, location, generic keywords, and competitors to .com. I discuss their marketing implications... For community gTLDs, their success, as measured by profits, depends on whether the registrants are nonprofit or for-profit organizations. more
Telesat will use Google's network operating system. Telesat is making progress. Within the last month, they announced a launch contract with Blue Origin, a successful antenna test with Ball Aerospace and completion of system requirements reviews, but perhaps more interesting is an agreement to use the software defined network (SDN) platform Google has developed for their Project Loon. more
With each passing day, a new public opinion article appears or U.S. government official pronounces how the open internet is abetting some discovered catastrophic effects on our societal institutions. In just one week, the examples include increased information on FSB & GRU attacks on electoral systems and infrastructure, Trump's obliging tactical destruction of societal norms and propagation of the QAnon cult, U.S government agency officials playing "cyber security spin-the-bottle" at press conferences... more
Sponsored byVerisign
Sponsored byCSC
Sponsored byWhoisXML API
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byRadix
Sponsored byIPv4.Global