With more than 100 countries now involved in the rollout of FttH there is increased evidence that commercial demand exists for this infrastructure. In developed economies FttH demand will, over the next 5 years, grow to between 30%-50% of the population. Competition aimed at the top end of this market will trigger a broader rollout. A Bernstein study of Google's rollout of FttH in Kansas City concluded that the penetration measured by them was much higher than they had expected. more
What does authorized access mean? If an employee with authorized access to a computer system goes into that system, downloads company secrets, and hands that information over to the company's competitor, did that alleged misappropriation of company information constitute unauthorized access? This is no small question. If the access is unauthorized, the employee potentially violated the Computer Fraud and Abuse Act (CFAA) (the CFAA contains both criminal and civil causes of action). But courts get uncomfortable here. more
Who would think that so much could go wrong with something as seemingly innocent as a domain name? As cybercrime continues to evolve, causing devastating reputational and financial losses to businesses and organizations, web addresses are used as a weapon -- and it's not always easy to notice their many faces. In this article, let's take a look at the domain name crime landscape, discuss the current challenges investigators and legitimate registrants face, and talk about some useful techniques. more
The quest for new top-level domains took an important step last spring with 1,930 applications to ICANN. 755 of these applications, from 145 different parties, are under contention. ICANN has encouraged these applicants to resolve the contention among them, and has established a last-resort auction in the event agreements among applicants cannot be reached. Here I describe a private auction model, the Applicant Auction, which is an efficient, fair and transparent approach to resolve contentions. more
The mobile phone market is growing exponentially and will continue to evolve for years to come. Why has the Cable Industry not moved into the lucrative mobile phone market? It could definitely be a revenue bonanza, as it currently is for telecom companies. ... Verizon and AT&T's revenues, as a percentage of stock price by division, attributes mobile phone service up to 40-42% of total revenues. more
Today NBC is streaming the NFL's Super Bowl live for free through mobile apps as well as their NBC Sports website. Given the number of "cord-cutters" and mobile users out there, I suspect there should be a good number of people watching the event through the live streams today. more
The recent declaration from the UK’s minister for communications that the Internet should be tiered, thereby allowing ISPs to charge for prioritised traffic (either rated by speed delivered or by content provider) is a knee-jerk response to network strain masking as a necessary network management tool, and is a potential threat to the concept of net neutrality. ...developments in the mobile data sector make it clear that capacity constraints are appearing on mobile networks as well, long before the anticipated launch of LTE-based services in the UK in 2013. more
On Monday, June 21, ICANN convenes in Brussels, hosting its "Welcome Ceremony" for attendees. In advance of the session, the agenda for the Board meeting on Friday, June 25 has been released. As is the fashion, it lists significant issues without being too specific or tipping the Board's hand. It also allows for matters that arise organically during the week of the meeting to (possibly) be heard. more
Are you passionate about preserving the global, open Internet? Do you have experience in Internet standards, development or public policy? If so, please consider applying for a seat on the Internet Society Board of Trustees. The Internet Society supports and promotes the development of the Internet as a global technical infrastructure, a resource to enrich people’s lives, and a force for good in society. Our work aligns with our goals for the Internet to be open, globally connected, secure, and trustworthy. more
In World of Ends, Doc Searls and Dave Weinberger enumerate the Internet's three virtues: 1. No one owns it. 2. Everyone can use it. 3. Anyone can improve it. ... Online services and interactions are being held back by the lack of identity systems that have the same virtues as the Internet. This post describes what we can expect from an Internet for identity. more
As we all know by now, last week, on Thursday, August 7, Twitter was hit with a denial-of-service attack that took it down for several hours. Other social networking sites like Facebook, LiveJournal, Youtube and Blogger were also hit. They managed to repel the attack although Facebook was not quite as successful as the other larger players. The theory floating about at the moment is that this was a politically oriented play designed to target one guy: a blogger. We are nearing the 1-year anniversary of a the Russian/Georgian 2008 war. There is a pro-Georgian blogger by the username of "Cyxymu" who had accounts on all of these services. more
The European Commission is apparently considering the promulgation and adoption of a directive that would, at least in part, criminalize botnets. As I understand it, the premise behind adopting such a directive is that since botnets are capable of inflicting "harm" on a large scale, we need to separately criminalize them. I decided to examine the need for and utility of such legislation in this post. more
The impact of new generic Top-Level Domains on the price of existing gTLDs and ccTLDs is likely to be limited, Tim Schumacher, CEO of leading domain name marketplace Sedo, told the the Domain Pulse conference in Vienna, held on 17 and 18 February. "I don't think the new gTLDs will have a major impact on pricing of existing TLDs. If you start a company or a product, you will always need to have your 'dotcom' or respective ccTLD in the market you operate in," said Schumacher in an interview following the conference. more
??Dynamics at the Internet's core erode stakeholder legitimacy and aid Sino-Russian efforts for multilateral control. ???At the beginning of what became a prolonged process for privatization, the U.S. Government established a framework of fundamental guiding principles for governance of the Internet's root. These principles were designed to work to preserve a free and open nature for a global network that was to be elastic, extensible, and – at more than two decades – enduring. more
The Commercial Stakeholder Group and Non-Commercial Stakeholder Group (together, the Non-Contracted Party House, or NCPH) met for a daylong Day 0 session on 8 November 2024, immediately prior to the opening of the ICANN81 meeting in Istanbul. This meeting follows one of a similar nature conducted prior to ICANN78 in Hamburg, which was the first joint NCPH meeting following the pandemic. more
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byCSC
Sponsored byDNIB.com
Sponsored byRadix
Sponsored byWhoisXML API
Sponsored byVerisign