Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Law as Unusual: Quantum Computing’s Five-Dimensional Challenge to the Legal Establishment

Quantum computers are coming, and the American Bar Association's SciTech section is beginning to consider the legal implications. This raises the question, will the legal profession be able to adopt emerging quantum technologies on a tech-business as a usual basis? Or will the developments flowing from quantum mechanical theory present a categorical challenge to the legal-industrial complex? more

FCC Requests Comments on Definition of “Broadband”  - Comments Due Aug 31; Replies Due Sept 8

The FCC is engaged in researching and preparing a National Broadband Plan which is due to Congress in February 2010. The FCC has released a Notice of Inquiry soliciting comments for the plan and is currently actively holding a lengthy series of workshops exploring the different aspects of what might go into the plan. more

Three Myths About DKIM

The DKIM standard has been out for two years now, and we're starting to see some adoption by large mail systems, but there's still a lot of misunderstanding about what DKIM does and doesn't do... Any a mail system can add a signatures to the messages it handles, and spammers can sign their mail, too. A DKIM signature contains, stripped down to its basics, the domain of the signer and a checksum of the message. more

Governments Shouldn’t Play Games with the Internet

Governments often use small players as pawns in their global games of chess. Two weeks ago the European Court of Justice invalidated the EU-US Safe Harbor ("Safe Harbor") framework, turning Internet businesses into expendable pawns in a government game. But for the past fifteen years, Safe Harbor allowed data flows across the Atlantic -- fostering innovation and incredible economic development. more

The Governance of the Internet

Among the hottest topics at the Broadband Leadership Summit, which was held during the ITU Telecom World 2011 in Geneva, were the issues in relation to the security of the various aspects of the digital economy. The key issue in relation to the governance of the internet relates to the many political, social and cultural differences between countries. This is one of the most contentious issues. more

VoIP Security Predictions for 2009

Here are my VoIP and Voice security predictions for 2009, limited to just a few, key predictions... The poor economy will slow the adoption rate for VoIP and Unified Communications (UC). This will continue to limit the size of the enterprise VoIP deployments for potential hackers to exploit. VoIP/UC will continue to be mostly an internal/campus application where the threat level for attack is low, so deployments will be largely secured along the same lines as other data network applications. more

How Far Will U.S. Regulators Bend to AT&T and Verizon?

Recent events relating to the network plans of AT&T and Verizon are extraordinary: it appears that the commercial and lobbying clout of two major telcos is determining the telecom services which their customers can receive, the technology they will receive them with, and whether they will receive them at all. Already a large number of states have agreed to dismantle Carrier of Last Resort (COLR) obligations on them, while the FCC itself is being advised to change the rules to suit the business interest of the telcos. more

Will LTE Steal the Broadband Revolution?

There is no doubt that LTE is going to take a prime position in broadband developments. With competitively priced services, innovative smartphones and an increasing range of very innovative apps this market is set to continue to boom. So how will all this impact the overall broadband market? ...this is not an 'us or them' issue between fixed and mobile broadband. As a matter of fact, the companies that are rolling out LTE are increasingly dependent on deep fibre rollouts as they need to handle massive amounts of data, to which the mobile infrastructure technology is not well-suited. more

ICANN Must Release the Single-Character .com Hostages from the IANA Impostor’s Warehouse

Most of the single-character .com labels were initially registered in 1993 by Dr. Jon Postel while performing work pursuant to a contract with, and funded by, the U.S. government and are currently assigned to a "shell registrar" created and controlled by ICANN. This shell - which is the 376th entry on ICANN's list of accredited registrars - is misleadingly identified as the IANA registrar while being engaged in the illicit warehousing of domain names for speculative purposes. more

Remediating U.S. 5G Global Supply Chain Security Engagement

For nearly the past four years, the Trump Administration has purported to treat 5G supply chain security through empty political gestures such as network equipment banning. The disinformation reached its absurd zenith subsequent to the election with the Q-Anon myth of the Kraken. (The Myth advanced by Trump attorneys asserted the long-deceased Hugo Chavez working with China was corrupting voting machine software to deprive Trump of another term.) more

Mend, Don’t End, the IETF

Is it time for the IETF to give up? Martin Geddes makes a case that it is, in fact, time for the IETF to "fade out." The case he lays out is compelling -- first, the IETF is not really an engineering organization. There is a lot of running after "success modes," but very little consideration of failure modes and how they can and should be guarded against. Second, the IETF "the IETF takes on problems for which it lacks an ontological and epistemological framework to resolve." In essence, in Martin's view, the IETF is not about engineering, and hasn't ever really been. more

New gTLD Target Date is April 23? Or is it?

I detect some delight in the domain name community today resulting from Video interview with ICANN CEO Fadi Chehadé. In that interview Chehadé states "We are now targeting to be able to recommend for delegation the first new gTLD as early as the 23rd of April..." On the surface this sounds like very good news. more

I Needed Music ‘cos I Had None…

The latest report on young people's online music-finding habits from consumer research company The Leading Question has attracted a fair amount of coverage for its headline finding that UK teenagers use of filesharing services has dropped by a third... Music industry pollsters will inevitably look for a silver lining in the cloud of consumer behaviour, and a focus on the growth of legal services is to be expected. But even with that caveat in mind, there has clearly been a shift in behaviour as more young people find licensed ways to listen to the music they want, watching YouTube videos, streaming songs through MySpace and Spotify and generally using legal avenues to find and enjoy the music of new bands like Florence and the Machine. more

Securing a Cloud Infrastructure

George Reese (author of the new book Cloud Application Architectures: Building Applications and Infrastructure in the Cloud) is talking at Gluecon about securing cloud infrastructures. Two recent surveys found "security" was the number one concern of companies considering a move to the cloud. George says the key to making customers comfortable with cloud security is transparency... more

Dear U.S.A. – Observations on the Cyber Solarium Commission Report

I am writing to you as someone who is not your citizen, (although I had the fortune to wed the most beautiful of your daughters), to share my thoughts about the recent US Government Cyber Solarium Commission report. U.S.A. We owe you one! Without you and your citizens there would be no free Internet as we know it. Thank You! Your constitution is our inspiration. We, the global digital citizenship want to be "the people", in order to "secure the Blessings of Liberty to ourselves and our Posterity..." more

Topics

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days