The Internet has done as much as the jet engine to shrink the distance between where we are and where we want to go. Even the propeller-type connectivity of dial-up was a giant leap forward. But as much as the technology has allowed us to go with ease to any place we choose - to learn, to be heard, to promote - equally powerful is the platform's ability to help us gather. The phenomena of social media services like LinkedIn and Facebook are present day proof of this human urge. more
I have a hypothesis: The Bush administration came to power in December 2000. American telcos were on the precipice about to go into Free fall. We have seen how Bush politicized the Justice Department and are much more aware thanks to John Dean's Broken Government and Charlie Savage's Take Over of the intense desire to aggregate executive power to feed the Addingtons belief in the Unitary Executive. We now know that Cheney was meeting with the energy industry in early 2001 promising them whatever they wanted. We may begin to ask what the domestic telecoms industry was being promised? more
Google announced Friday that it would now be "personalizing" all searches, not just those for signed-in users. If your browser has a Google cookie, unless you've explicitly opted out, your search results will be customized based on search history. Danny Sullivan, at Search Engine Land, wonders why more people aren't paying attention. more
Lastly, and certainly not the least, part four of my security predictions takes a deeper dive into mobile threats and what companies and consumer can do to protect themselves. If there is one particular threat category that has been repeatedly singled out for the next great wave of threats, it has to be the mobile platform -- in particular, smartphones... The general consensus of prediction was that we're (once again) on the cusp of a pandemic threat. more
There is an interesting new trend in fiber construction. Some relatively large cities are getting fiber networks using microtrenching. Just in the last week, I've seen announcements of plans to use microtrenching in cities like Mesa, Arizona, and Sarasota Springs, New York. In the past, the technology was used for new fiber networks in Austin, Texas, San Antonia, Texas, and Charlotte, North Carolina. more
Today at 5:10pm EDT the IETF 90 Technical Plenary will be streamed live out of Toronto, Canada... After some initial reports, the technical focus will be on "Network topology and geography." The session will be recorded for later viewing. The slides are online and from what I can see it should be a very interesting talk for those of interested in the underlying infrastructure of the Internet. more
Well amazingly, it's that time again. Next week, individuals from around the world with a keen interest in Internet policy will head to Panama City, Panama for the second ICANN meeting of the year. As always, Brandsight will be attending to follow all of the important policy work being carried out by the community. Before I head off to the meeting (which based on my research will actually be my 32nd ICANN meeting!), I'd like to share a preview of the major topics slated for discussion. more
The latest report on young people's online music-finding habits from consumer research company The Leading Question has attracted a fair amount of coverage for its headline finding that UK teenagers use of filesharing services has dropped by a third... Music industry pollsters will inevitably look for a silver lining in the cloud of consumer behaviour, and a focus on the growth of legal services is to be expected. But even with that caveat in mind, there has clearly been a shift in behaviour as more young people find licensed ways to listen to the music they want, watching YouTube videos, streaming songs through MySpace and Spotify and generally using legal avenues to find and enjoy the music of new bands like Florence and the Machine. more
The National Arbitration Forum has just handed down its decision in respect to the three domain names locked down at Public Domain Registry in response to the City of London Police Intellectual Property Crime Unit takedown requests. The decision is in favour of easyDNS and orders the three names to be transferred to us. more
Ed Felten has posted a nice taxonomy of the several meanings people take when they use the term Network Neutrality, briefly: End-to-End Design; Nonexclusionary Business Practice; Content Nondiscrimination ... I've been developing a taxonomy of issues that interact with and are bound with Network Neutrality. So far there are six items... more
The big wireless companies have been wrangling for years with the issues associated with placing small cells on poles. Even with new FCC rules in their favor, they are still getting a lot of resistance from communities. Maybe the future of urban/suburban wireless lies with the big cable companies. Cable companies have a few major cost advantages over the wireless companies, including the ability to bypass the pole issue. The first advantage is the ability to deploy mid-span cellular small cells. more
Back when I started working in this industry in 2001, ICANN was small, the industry was tight, and things moved slowly as interest groups negotiated a balance amongst the impacts of change. Change often meant added overhead and, at the very least, a one-time cost effort to implement on the commercial side. Registries and registrars preferred to be hands-off when it came to how their domains were being used. But e-crime became big business during the 2000s. more
Phishing researcher Gary Warner's always interesting blog offers some fresh perspective on clicking links on emails, as the crux of the phishing problem. Gary writes: "There is a saying 'if you give a man a fish, he'll eat for a day, but if you teach a man to fish, he can feed himself for a lifetime.' In the case of the Epsilon email breach the saying might be 'if you teach a man to be phished, he'll be a victim for a lifetime.' In order to illustrate my point, let's look at a few of the security flaws in the business model of email-based marketing, using Epsilon Interactive and their communications as some examples." more
It's still early days, but Singapore's approach to fiber deployment is beginning to pay off. In December 2007, Singapore announced a major program to get fiber deployed throughout their city state. A critical advantage of their approach was government mandated structural separation between the dark fiber layer deployed in the public right-of-way (a natural monopoly) and higher layer services (where competition is possible and highly desirable. more
In my comments on the draft Cross-Community Working Group (CWG) on Naming Related Functions proposal for the IANA transition, I expressed my overall support, albeit somewhat reserved, for the proposal... but with the ICG's deadline of January 15 having come and gone, and the informal deadline of January 31 looming for the revised proposal from the Names community to be submitted, I'd like to shed some light on what I believe the role and reasoning for some of the mechanisms identified by the CWG, specifically the Contract Co., to be. more
Sponsored byCSC
Sponsored byWhoisXML API
Sponsored byRadix
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byVerisign