Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

A Netmundial+10 Could Help Redefine Pathways for Internet Governance in the Global South

The original Netmundial was a unique Internet governance event that took place in 2014 and set out to map new avenues for global cooperation around the theme, uniting diverse stakeholders to discuss the future of IG in a broad manner. It was initially convened by the Brazilian government and ICANN as an answer to the Snowden revelations of global Internet espionage performed by various nations (primarily the USA), in part due to these two actors being directly affected by the implications of the revelations. more

In Defense of Process: Identifying the Problem Before Seeking Solutions

You don't necessarily need to walk before you can run, but you should probably look where you are going before you do either. The U.S. Government's announcement that it would transition out of its unique legacy role in ICANN set off a powder keg at ICANN, as stakeholders from every corner of the community rushed to offer their recommendations on how to fill the impending contractual vacuum with something, new, better, and appropriately reflective of the multi-stakeholder model. more

About That Second, Third and Fourth Wireless “Attachment”

There is some good news about the decision by Verizon Wireless to offer shared monthly data plans. But there could be a lot more if the FCC applied its Carterfone policy. That policy gave consumers the power to decide what and how many devices to attach to a network connection. If Carterfone applied, consumers could use multiple devices to access a network subscription, albeit perhaps not at the same time. more

Privacy Becoming Very Public Matter

At the round tables on privacy held by the Federal Trade Commission, Indiana University law school professor and member of the board of the Privacy Projects, Fred Cate said out loud what long has been silently known about consumer protections based on the notices web sites post to describe their data protection practices and the consumers' choice to click on or away. Cate said: "Choice is an illusion." There is more than a bit of substance behind the bumper sticker... more

Y2038: It’s a Threat

Last month, for the 20th anniversary of Y2K, I was asked about my experiences. (Short answer: there really was a serious potential problem, but disaster was averted by a lot of hard work by a lot of unsung programmers.) I joked that, per this T-shirt I got from a friend, the real problem would be on January 19, 2038, and 03:14:08 GMT. Why might that date be such a problem? On Unix-derived systems, including Linux and MacOS, time is stored internally as the number of seconds since... more

Bandwidth is Bust - Managing True Fundamental Network Resources, Not Fantasy Ones

I recently shared the idea that there is a new category of network architecture, the Network of Probabilities. This differs from classical circuits (Network of Promises) or best-effort packet data (Network of Possibilities). I personally believe it's the next revolution in telecoms. What's new is that it provides a trading space for allocating contention between flows, and does this with some novel applied mathematics. more

SpaceX Starlink Is on a Roll

The last two months have seen a flurry of Starlink activity, including the following: Bill Gates has a history of interest in satellite Internet and in September, Microsoft announced their Azure Obrital ground station service, which enables satellite access to its Azure cloud services. SES, Viasat, and Intelsat were announced as initial partners and SpaceX just signed up. Starlink+Azure Orbital will compete with Amazon's satellite constellation and its ground-station service... more

US Policy Container: Depoliticizing the Global Internet

One of fastest growing trends of electronic communications is digital identity. The simplest way of establishing digital identity is to get a domain name and create a web site and email accounts. While this might have been a fairly complex undertaking some ten years ago, today it is a trivial matter. So trivial in fact that spammers and phishers can ply their trade with very low costs of entry. These low cost of entry have made the Internet a commodity business as traffic is handled in the aggregate and competitive pricing has made being an ISP a difficult business model. It also has created aggressive growth and adoption curves. The Internet is also the lowest common denominator... more

Cryptographic Catastrophe Theory

Technologists and law enforcement have been arguing about cryptography policy for about 30 years now. People talk past each other, with each side concluding the other side are unreasonable jerks because of some fundamental incompatible assumptions between two conceptual worlds in collision. In the physical world, bank branches have marble columns and granite counters and mahogany woodwork to show the world that they are rich and stable. more

Websites Are Dead. Long Live Websites.

Remember not very long ago when social media experts were preaching the value of a Facebook page over a website? It was not uncommon to be told to dump your website altogether in favor of a Facebook page and Twitter feed. Why bother with HTML when you could simply hashtag your way to global success? My how times have changed. more

What If They Simply Made Communications Technology Better?

Rob Hyndman has a pointer to Mark Cuban's latest: Think the Internet Will Replace TV? Think Again. Cuban's post can be summarized as: Today's broadband networks are too slow. The insatiable appetite for on-demand rich media content will soon overwhelm them. Telco's aren't putting in upgraded networks quickly enough to meet that demand. Cuban also provides some facts and figures to back up that claim. In the comments, readers have a number of viewpoints, including the view that Mark has ignored cable, and that cable can provide the required speeds and feeds... more

Privacy Rules to Change in the EU, But What If ...?

In a presentation EU Commissioner Viviane Reding gave a preview of the new Privacy regulation her DG is preparing. As she states, privacy rules need to be brought up to date and harmonized. With all 27 member states having the same rules and tools to enforce, a company only will deal with one privacy commissioner... So, what if we, for the sake of this blog, take this initiative towards spam and cyber crime. What would this do to spam enforcement? more

Network Neutrality Upsetting Worldviews?

With everyone talking about network neutrality, with all the heat, it didn't feel good to have to be in NY today and miss the goings-on in Washington. I watched part of the late afternoon markup session online, with Rep. Barton sounding awfully effective as he marched steadily through Title III -- quickly taking votes, soothing congress people who were suggesting soon-to-be-rejected amendments, and sounding confident. The only substantive work I heard was the rejection of an amendment that would have left in place all state laws that regulate the subjects of the bill -- like mini wireless networks. But the real news had already happened... more

5G/F5G Cloud Announcements: NFV Game-Changing Confirmations

Over the past few days, Microsoft made two major announcements. One was a "playbook [for] providing a carrier-grade platform for edge and cloud computing to help network operators realize the full potential of 5G technology" using its it Azure cloud data centres. The second announcement was a new platform that enables satellite-based access to those same cloud data centres designated Azure Orbital. Coupled with these announcements was another one by Samsung... more

More Provocative Reasons for a Mandatory National Breach Disclosure

I read, with some small amount of discomfort, an article by Bill Brenner on CSO Online, wherein he interviewed several other CSOs and other "Security Execs" on their opinions on the firing of Pennsylvania CISO Robert Maley. For those who haven't heard about this, Mr. Maley was fired for talking about a security incident during the recent RSA conference without approval from his bosses. more

Topics

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

DNS Security

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days