Adolescents were fascinated by the book and film called "Hunger Games". The plot is about a government forcing people to watch, and forcing some to play, a cruel game for life and death. ICANN's own Hunger Games, the so-called "digital archery" or "batching" process, is not lethal to people, but shares all other features: it is forced upon the participants, it is destructive, unfair and unnecessary. more
The Internet is in for interesting times. Previously, on Renysys' blog I wrote about the engineering issues and the policy issues facing us over the next five years. But there is at least one large issue still lurking. Most of you will not be surprised to learn that almost all of these issues are outgrowths of a single factor: money. The core of the Internet still doesn't have a sustainable business model. more
In reading a Q&A with Verizon's Brian Whitten I found this striking Q and A: "Q. With a fiber connection being symmetric, many fiber providers such as Paxio are providing symmetric connections such as 5Mbit, 10Mbit, 30Mbit. Why is Verizon keeping this arbitrary asymmetric limit with Fiber? A. ...Indeed, our FTTP network can easily support a symmetric data service. As market dynamics change, we would re-assess the benefit to our customers of introducing a class of symmetric data services." My reaction is "No thank you, I'd rather do it myself". To understand my reaction you need to recognize the difference between wanting to build my own bridge across a stream and asking why I'm not allowed to cross it myself using my own boat. more
The world is abuzz this week with some flaming malware - well "Flame" is the family name if you want to be precise. The malware package itself is considerably larger than what you'll typically bump into on average, but the interest it is garnering with the media and antivirus vendors has more to do with the kinds of victims that have sprung up - victims mostly in the Middle East, including Iran - and a couple of vendors claiming the malware as being related to Stuxnet and Duku. more
Upon being appointed as ICANN's new CEO in Sydney, Rod Beckstrom gave a rousing speech in which he stressed the vital importance of free expression on the Internet... Many ordinary, powerless people are indeed willing to fight and die. But is ICANN going to help them? Or at very least make sure that their decisions won't help those who want to muzzle them? more
On December 9, 2009, the ICANN Board announced its intention to vote during its upcoming February 4, 2010 meeting to approve a plan by which ICANN would solicit "Expressions of Interest" (EOI) from prospective applicants for new Generic Top Level Domains (gTLDs) such as .BLOG. But given a number of significant governance and public policy concerns raised by the current EOI proposal, the ICANN Board should take no action on it before the next in-person ICANN regional meeting--in Nairobi, March 3-7, 2010. more
Planning to register your trademark as a domain name during a Sunrise Period only to find out that the registration appears on a Reserved Names list? There are a number of reasons why a domain that matches your trademark is appearing on a Reserved Names list. First of all, if the domain desired is the subject of Name Collision, it may appear on a Reserved Names list. Although this is not true for all registries, as some operators are allowing domains that have been the subject of Name Collision to be allocated during Sunrise, but not delegated. more
James Urquhart claims Cloud is complex - deal with it, adding that "If you are looking to cloud computing to simplify your IT environment, I'm afraid I have bad news for you" and citing his earlier CNET post drawing analogies to a recent flash crash. Cloud computing systems are complex, in the same way that nuclear power stations are complex - they also have catastrophic failure modes... more
When I read government arguments in defense of the NSA, an oft-repeated line was: We're not targeting Americans. We're targeting foreigners. Foreigners. I really dislike that word. And I'm sure companies like Apple, Google and Facebook do as well. Why? more
Surveillance capitalism monetizes private data that it collects without consent of the individuals concerned, data to analyze and sell to advertisers and opinion-makers. There was always an intricate relationship between governments and surveillance capitalists. Governments have the duty to protect their citizens from the excesses of surveillance capitalism. On the other hand, governments use that data, and surveillance capitalism's services and techniques. more
One could think that the authors of The Universal Declaration of Human Rights (UDHR) -- adopted in 1948 -- had the Internet in mind when they declared in Article 19: "Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers." All human beings are entitled to certain rights, and it makes no difference if they choose to exercise them in a town square or an Internet chatroom. more
In 2018, nothing can get approved in 3GPP that China strongly opposes. In the past, 3GPP often was a battle between a few American giants and their European peers. A Qualcomm or a Nokia will still be heard, but the power has shifted. I haven't seen evidence that the Chinese influence has made for better or worse standards. There are now over a billion 4G subscribers at the big 3 Chinese telcos, by far the largest equipment buyers. Nokia, Ericsson, and the other vendors do not dare oppose their largest customers. more
In today's fast-paced world of IoT, perhaps one of the most significant involves the rapid identification of civilian drones -- more formally known as an Unmanned Aerial Vehicle (UAV). The identification of civilian UAVs has become a critical public safety concern today. Establishing a flexible, trusted global means for identifying these objects through worldwide supply chains and resolving the identifier tags to a responsible party rapidly via a network-based resolver is a high priority. more
The argument for end-to-end encryption is apparently heating up with the work moving forward on TLSv1.3 currently in progress in the IETF. The naysayers, however, are also out in force, arguing that end-to-end encryption is a net negative... The idea of end-to-end encryption is recast as a form of extremism, a radical idea that should not be supported by the network engineering community. Is end-to-end encryption really extremist? Is it really a threat to the social order? more
In research, one of the important steps is to identify the problem that needs exploration. Another step is to identify how to find a solution. Once it is possible to agree on the nature of the problem, then it begins to be a matter of how to approach the problem. more
Sponsored byIPv4.Global
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byRadix
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byCSC