The really important part of the World Conference on IT (WCIT) is not the internet battles that have caught the interest of the press - it is what will happen after the conference has ended. Membership of WCIT is on a per-country basis... Each country is free to make up its own delegation and these delegations can therefore represent a large variety of social, economic, business, legal, technical and other interests - as large and as wide as each country decides its delegation will be. more
I grew up in a utopian community in India.
I make this statement -- which may seem at best tangential to an article on the DNS -- at the outset because it suggests that I know something about ideology and ideologically charged debates.
Like the town where I grew up, the Internet was the product of dreamers, people who believed in the possibility of surmounting reality. In Code, Lessig compared early Internet euphoria to the euphoria that met the downfall of communism. He could just as well have compared it to the utopianism that accompanied the birth of communism. The point is that Internet pioneers were inspired by ideology, by a fervor to change the world. more
ICANN has published a short paper in advance of its 65th meeting in Marrakech which starts on 23 June 2019. Entitled, "ICANN Org's Readiness to Support Future Rounds of New gTLDs," it describes ICANN's working assumptions for "policy implementation and operational readiness for a subsequent round of new gTLDs". The document is necessary for ICANN to move forward with essential preparations for the next round. more
On March 20th, Wall Street Journal (WSJ) Op-ed writer L. Gordon Crovitz published an article titled "Stop Obama's Internet Giveaway". In his opinion piece Mr. Crovitz opposed any near-term transition of the IANA functions... In the course of his article Mr. Crovitz also stated, "Icann already has been kowtowing to authoritarian regimes," alluding to former CEO Fadi Chehade's December 2015 decision to become a Co-Chair of the Advisory Committee to China's World Internet Conference... more
It seems to me that too many people have focused government attention on intervening in the supply of broadband facilities. Let's face it, it is easier to look at a dozen or so suppliers to gather information and figure out who should receive a cheque to help direct their investment in broadband facilities. On the other side of the equation, it is hard work to stimulate demand. But this is precisely where our efforts should be focused, as was recommended by the recent report... more
With the loud crashing of a traditional drum ceremony and an impromptu electric guitar performance by a young Korean whose rendition of Pachabel has been downloaded sixty million times on YouTube, the 36th meeting of ICANN was kicked off this morning (Korean time) by new CEO Rod Beckstrom and his fellow Directors and assembled one thousand or so participants. ICANN has always been about change, but the atmosphere in Seoul this week is charged with a sense of new challenges and new opportunities. more
The Conficker worm will be active again on April 1st, according to an analysis of its most recent variant, Conficker.C, by the net security firm CA. This malicious piece of software, also known as Downup, Downadup and Kido, spreads among computers running most variants of the Windows operating system and turns them into nodes on a multi-million member ‘botnet’ of zombie computers that can be controlled remotely by the worm’s as yet unidentified authors. more
Apple Computer has received high praise for the diversity of applications available for the iPhone. The company shows great willingness to accept third party software innovations. But Apple also solely decides whether to accept and make available any application. Rejected software vendors for the most part do not exist if they do not have shelf space at the Apple store. more
It is no secret that both the US government, ICANN, and the global Internet community have argued and worked tirelessly for the past 15 odd years on the vexing issue of globalizing the US government's role in the IANA function. Despite the desire, long-held by many, for the US to relinquish its control of the IANA function, it is clear that getting to full multistakeholder control of the function is not going to be easy. more
The dividing line between developers and IT operations used to be distinct. Developers were responsible for adding new features securely, but it was IT operations who had responsibility for infrastructure and network security. For the most part, developers didn't have to think too much about the wider security context. With the advent of the cloud, and of devops, things changed radically. more
You might expect that the IT department or security team knows who's sending email using your company's domains. But for a variety of reasons these groups are often unaware of many legitimate senders -- not to mention all the bad actors. Fortunately you can get a more complete view by using DMARC's reporting features. How does it happen? Product teams managing a new product launch or customer survey hire marketing consultants and Email Service Providers (ESP)... more
So far, the debate on mass surveillance has dwelt on the immense resources made available to the agencies (NSA in the US, GCHQ in the UK), on the technological advantage that enables them to access any data and bypass encryption, and on the lack of proper oversight in those two countries. But in order to make their voices heard by their elected representatives, Internet users around the world need to have an even more complete view of the emerging reality. more
In the previous instalment we looked at the software changes needed for mail servers to handle internationalized mail, generally abbreviated as EAI. When a message arrives, whether ASCII or EAI, mail servers generally drop it into a mailbox and let the user pick it up. The usual ways for mail programs to pick up mail are POP3 and IMAP4. more
In an interview with GovInfoSecurity, Sen. Thomas Carper said that the U.S. Senate is considering attaching cybersecurity legislation to a defense authorizations bill. Though clearly a ploy to be able to say "we did something about those evil hackers" before the elections, CAUCE applauds the attempt. There can be no doubt that the United States (and many other countries) sorely needs better laws to deal with these threats. more
The broadband industry doesn't have an agreed-upon unit of supply and demand that meaningfully "adds up". This is rather odd for a service that aspires to be a utility. It is also a barrier to a much-needed transformation from "bit pipes" to "digital supply chain management". The chart here ought to be in every basic undergraduate textbook on packet networking and distributed computing. That it is absent says much about our technical maturity level as an industry. more
Sponsored byRadix
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byCSC
Sponsored byWhoisXML API