There has been considerable discussion over the last few years about the spectacular growth in mobile communications. Within a rather short period of time around five billion people have been connected, and growth continues unabated... The 2G and 3G networks and other telecommunications infrastructure such as satellites, fixed wireless technologies and fixed networks, linked to smart phones and other smart devices, can be used to provide basic internet services. However, it is important to acknowledge the affordability of these services. more
Like the Coronavirus, 5G Dementia seems to be spreading around Washington. The latest manifestation has appeared at the FCC -- which is trying its best to make U.S. 5G infrastructure as insecure and primitive as possible. But first, an explanation of how 5G Dementia begins at the top and spreads in the U.S. capitol. 5G Dementia begins with "The Genius" who lounges around White House quarters and emits spontaneous tweets on whatever motivates him at the moment. more
Today, June 26, is the final day that you can help the Internet Society with its "Future of the Internet" survey. It takes about 20-25 minutes and will help my colleagues at the Internet Society develop a number of scenarios about the possible future of the Internet. These scenarios can help all of us in talking to policy makers, leaders, media and the general user population about the choices we have before us for the future of the Internet. more
With Bill Clinton's appearance at ICANN San Francisco now confirmed to be more than mere rumor, the March meeting will be a very big event indeed. On its home turf, and under the glare of possibly unprecedented global attention, ICANN may feel some pressure to make sure it has some noteworthy news to announce at the end of the week, after its Board of Directors meets. more
I don't (and probably won't) have anything substantive to say about the technical details of the just-announced Meltdown and Spectre attacks. What I do want to stress is that these show, yet again, that security is a systems property: being secure requires that every component, including ones you've never heard of, be secure. These attacks depend on hardware features... and no, many computer programmers don't know what those are, either. more
The importance of engaging with all the necessary stakeholders in your .brand TLD and ensuring you have company-wide buy-in cannot be understated. But once you have all these players in a room together, what's next? Every brand launching its own TLD will move through the process differently. Unfortunately for those managing this project, there is no single, 'off-the-rack' strategy that will suit every .brand TLD's individual requirements. more
It is good to see Europe take an important leadership role in recognizing the critical contribution that commercial cloud providers can play in providing solutions for big science through their recent Helix Nebula -- the Science Cloud announcement. It is estimated that 1/3 of the science applications running on expensive HPC facilities could easily run on commercial clouds, freeing up these facilities to focus on true high computational problems. more
As part of a larger effort to make the internet more private, the IETF defined two protocols to encrypt DNS queries between clients (stub resolvers) and resolvers: DNS over TLS in RFC 7858 (DoT) and DNS over HTTPS in RFC 8484 (DoH). As with all new internet protocols, DoT and DoH will continue to evolve as deployment experience is gained, and they're applied to more use cases. more
The IGF has a tendency of slowly shifting from a place of a discussion about the way the world accesses information resources, into a place where only topics that make the headlines are being highlighted, with many of the same players being among the loudest speakers. We believe that due to cross-cultural reasons, these people are mainly coming from North America and Western Europe. We urge the IGF to allocate equal time for people from regions outside of those two. more
If current predictions are correct, 2009 will be a tougher year than 2008 in terms of the economy. In tough economic times such as these it becomes increasingly important for us to follow recommended safety practices when going online. As the numbers of Internet-related fraud and financial scams continue to increase we should expect the current economic situation to produce more victims of cybercrime. Knowledge and vigilance are the keys to remaining safe while online. more
The telecoms industry represents one of the most dynamic sectors in the world. Only 25 years ago 90% of all activities took place via telephone calls over fixed telephone lines. Now, within the broader ICT industry, telecoms is underpinning all of the new developments in relation to the digital, sharing and interconnected economies. It facilitates new social and economic developments in all sectors such as e-health, e-education, e-business, smart grids, smart cities, e-government, and so on. more
A preview of my upcoming presentation for the Digital Marketing and gTLD Strategy Congress on why your Top-Level Domain (TLD) strategy is paramount to making or breaking your .brand... Your strategy will be the most significant weapon in your Top-Level Domain arsenal to drive the launch of your .brand, and you'll only get there with preparation and engagement. For the vast majority of .brand applicants, ICANN has recently informed you that you have passed your application. You've come this far. more
Throughout the second half of 2012 many security folks have been asking "how much is a zero-day vulnerability worth?" and it's often been hard to believe the numbers that have been (and continue to be) thrown around. For the sake of clarity though, I do believe that it's the wrong question... the correct question should be "how much do people pay for working exploits against zero-day vulnerabilities?" more
The entire new gTLD applicant community is awaiting, patiently, the forthcoming Brussels meeting between the ICANN Board and the Governmental Advisory Committee (GAC) to take place from February 28th. After years of delays to the new gTLD process, ICANN and the GAC will try to reach an agreement on how and when to launch the new Generic Top-Level Domains (gTLD) programme. The expectations for the outcome of the Brussels meeting is huge among potential new gTLD applicants. Despite this, the media attention will be negligible when compared to the news coverage that the next ICANN public meeting in March will receive. more
Trademarks and brands are often among a company's most valued assets. Customers associate trademarks and brands with producer integrity. They engender consumer trust. Without TMs and Brands, companies struggle for attention and find it more difficult to link the company's integrity and trustworthiness in the marketing of its goods and services. Representing company promise and customer expectations, they are uniquely positioned to symbolize common values and aspirations. more
Sponsored byVerisign
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byRadix
Sponsored byCSC
Sponsored byDNIB.com