This was never part of the plan. Going into the Dubai World Conference on International Telecommunications (WCIT) two weeks ago, there was optimism aplenty. After weeks of online and media campaigning, proponents of a free Internet had managed to scare everyone into thinking that WCIT was tantamount to digital Armageddon. This had the effect of defusing the conference before it even started, or so it seemed... more
A recent session of the Australian Computer Society (ACS) and the Australian Smart Communities Association (ASCA) masterclass on 5G, featured Dr. Ian Oppenheimer, the NSW Government's Chief Data Scientist and one of the country's most respected experts in radio technology. Ian is also the Chair of the scientific advisory board of the 6G Flagship organization, a global research organization based in Finland. This organization has just published a range of fascinating research papers on 6G. more
We are all accustomed to purchasing and/or using copyrighted material in one fashion or another. From music, movies-(BluRay), e-books-(Kindle), computers-(software), mobile phones-(iPhone) and games; the umbrella of companies wanting to restrict access to its products continues to grow and become increasingly restrictive. more
Today, four years after the launch of the Catalan linguistic and cultural registry, Google reports that there are 90 million pages of Catalan content under the some 36 thousand .CAT domains. As imperfect as Google's tools are as a metric, the correct observation is that the use of .CAT by Catalans vastly exceeds the expectations of its initial proponents... more
In the past week, Comcast filed an answer, denying all of E360's charges, and attached to it a motion to file a most impressive counterclaim. The court granted the motion on Monday so the counterclaim has been filed. At about the same time, E360 filed its response to Comcast's previous motion to dismiss the suit due to its utter lack of legal merit. more
Call it outreach, call it propaganda or call it brilliance or even desperate measures, spammers (people) who favour the Georgian side in the recent conflict have been spamming using email, to get their point across. Depending on where in the world you are from, your ideological standpoint on Russia and your beliefs, when it comes to what email should be like, can be different and you may judge the action as you will. I call it spam. An Estonian colleague Viktor Larionov was quoted saying that whether there is a cyber war in Georgia or not, we know there is in fact a media war in play... more
ICANN has proposed a major change to its bylaws that would require the organization to adopt all policy "advice" issued by the Governmental Advisory Committee (GAC) unless 2/3 of ICANN's non-conflicted board members vote to oppose the adoption of that governmental rule. This draconian proposal to change ICANN's bylaws would fundamentally transform ICANN away from being a "bottom-up" and "private-sector-led" organization and into a governmental regulatory agency... more
Zoom - one of the hottest companies on the planet right now, as businesses, schools, and individuals switch to various forms of teleconferencing due to the pandemic - has come in for much criticism due to assorted security and privacy flaws. Some of the problems are real but easily fixable, some are due to a mismatch between what Zoom was intended for and how it's being used now - and some are worrisome. more
My third installment regarding gTLD objections - and understanding exactly what's required for an objector to prevail - moves to the more complex community-based objections. For those getting their first exposure to this unwieldy beast, pull up a chair and get comfortable. The community objection involves multifaceted elements, each having its own set of defining factors and often using similar terminology in different contexts. As such, it can be very confusing and one can easily lose track of the bigger picture. more
The Domain Name System (DNS) has become the fundamental building block for navigating from names to resources on the internet. DNS has been employed continuously ever since its introduction in 1983, by essentially every internet-connected application and device that wants to interact online. Emerging from an era where interconnection rather than information security was the primary motivation, DNS has gradually improved its security features. more
In mid-August China launched "QUESS" (Quantum Experiments at Space Scale), a new type of satellite that it hopes will be capable of "quantum communications" which is supposed to be hack-proof, through the use of "quantum entanglement". This allows the operator to ensure that no one else is listening to your communications by reliably distributing keys that are then used for encryption in order to be absolutely sure that there is no one in the middle intercepting that information. more
In February 2012, Neustar surveyed IT professionals across North America to better understand their DDoS experiences. Most were network services managers, senior systems engineers, systems administrators and directors of IT operations. In all, 1,000 people from 26 different industries shared responses about attacks, defenses, ongoing concerns, risks and financial losses. more
The new gTLD program continues to throw up last-minute debates on what is acceptable as a TLDs and what is not. The latest such verbal joust centers around closed generics. These are generic terms being applied for by applicants whom, should they be successful, will not open the TLD up to everyone on an equal access basis. As an example, think .book being run by Amazon and only available to Amazon customers. more
In an article published by the Technology Liberation Front, Cato Institute adjunct scholar Tim Lee dissects a recent argument by the American Civil Liberties Union (ACLU) regarding free speech & anti-spam laws. It's been interesting to watch the ACLU wrestle with anti-spam legislation. Their entire purpose is to work through the legal system to protect our civil rights, as defined in the First Amendment -- which is why I've been a card-carrying member since before I was old enough to vote... more
Near the end of the first decade of this century, the world reached an Internet milestone. The number of Internet-connected devices surpassed the number of people alive on planet Earth. At the time, seven billion devices had already been connected to the Internet, and this went completely unnoticed by most people. This moment represented an important sign of the rapid pace in which we are adopting technology and embracing Internet connectivity. more
Sponsored byDNIB.com
Sponsored byIPv4.Global
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byVerisign
Sponsored byRadix
Sponsored byCSC