Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

“Net Neutrality” Protects New Monopolies from Old

Over the next decade which companies do you think will be better able to exercise monopoly power? Amazon, T&T, Comcast, Facebook, Google, Regional phone companies, or Verizon? If you'd asked me this question in 2000, I would've picked AT&T, Comcast, Verizon, and regional phone companies. They are part of local duopolies for wired infrastructure. more

When It Comes to gTLDs, Follow the Money (Part 2)

In my previous article I showed that ICANN expects to recover a lot of money from the first round of applications for new generic Top-Level Domains (gTLDs) -- $92.5 million, to be exact -- and that even that dramatic figure is probably substantially underestimated. For that reason, I argued that ICANN probably will recoup a windfall from the first round of gTLD applications and pointed out that ICANN's promise to consult with the Internet community before spending such a windfall is unsatisfactory because it has failed to say beforehand what surplus revenues might be spent for. more

Improvements in Undersea Fiber

We often forget that a lot of things we do on the web rely on broadband traffic that passes through undersea cables. Any web traffic from overseas gets to the US through one of the many underwater fiber routes. Like with all fiber technologies, the engineers and vendors have regularly been making improvements. The technology involved in undersea cables is quite different than what is used for terrestrial fibers. A long fiber route includes repeater sites where the light signal is refreshed. Without repeaters, the average fiber light signal will die within about sixty miles. more

Uncivil Society: The NETmund*al *n*t*at*ve’s Missing I’s

When I last wrote about the NETmundial Initiative (NMI) project developed by the World Economic Forum (WEF) in conjunction with ICANN it was noted that its August 28th announcement event "ended with significant dissent from the broad groups comprising "civil society", and only lukewarm support from the business sector". Indeed, during the concluding session on that late summer day, "NTIA head Larry Strickling appeared to startle the participants when he intervened to observe that perhaps the event was over-engineered... more

Wait and See Approach on Abuse

Wait and see approach on abuse attracts ICANN Stakeholder attention: A few weeks ago I made a detailed argument as to why product safety applies to domains, just like it does to cars and high chairs. I also argued that good products equal good business or "economically advantaged" in the long run. Then I really made a strong statement, I said if we don't actively engage other Internet stakeholders -- those that interact with our products, we would eventually lose the opportunity to self-regulate. more

Verizon iPhone, AT&T Androids - Mobile Data is the Winner

Announcement of the Verizon Wireless (VZW) iPhone and last week's announcements of Androids for AT&T mean that we're going to have better mobile data networks at lower prices. That's the most important consequence of being able to choose your phone and your network separately. We in North America have a long way to go to have the mix and match choices of phones and service that most of the world has... more

Back to the Future for Broadband in America

With countries like Australia and New Zealand implementing infrastructure that can deliver 100Mb/s for their next generation broadband -- and with most Europeans not too far behind this -- it is quite shocking to see that the $7.2 billion economic stimulus package in the USA (under the RUS Broadband Initiatives Program (BIP) and the NTIA Broadband Technology Opportunities Program (BTOP)) requires nothing more than 768 kilobits per second (kb/s) downstream and 200 kb/s upstream. more

Why I Wrote ‘Thinking Security’

I have a new book out, Thinking Security: Stopping Next Year's Hackers. There are lots of security books out there today; why did I think another was needed? Two wellsprings nourished my muse. (The desire for that sort of poetic imagery was not among them.) The first was a deep-rooted dissatisfaction with common security advice. This common "wisdom" -- I use the word advisedly -- often seemed to be outdated. Yes, it was the distillation of years of conventional wisdom, but that was precisely the problem: the world has changed; the advice hasn't. more

In Which We Consider the Meaning of ‘Authorized’: GIVAUDAN FRAGRANCES CORPORATION v. Krivda

What does authorized access mean? If an employee with authorized access to a computer system goes into that system, downloads company secrets, and hands that information over to the company's competitor, did that alleged misappropriation of company information constitute unauthorized access? This is no small question. If the access is unauthorized, the employee potentially violated the Computer Fraud and Abuse Act (CFAA) (the CFAA contains both criminal and civil causes of action). But courts get uncomfortable here. more

The Other Side of Security

The Denver edition of Security BSides took place a few weeks ago in a garage turned art gallery on the far end of Denver's emerging Santa Fe Arts District, right on the border between historic working-class neighborhoods and a rambling wasteland of building supply warehouses. ... The presentation I enjoyed most was "Top 10 Ways IT is Enabling Cybercrime," presented by Daniel J. Molina from Kaspersky Labs. He described how quickly threats are evolving, how many new threats are appearing every day, and explained that the targets aren't always who you'd expect. more

Access to Safe and Affordable Prescription Medications Online is a Human Right

I recently served on a panel at the Toronto RightsCon 2018 conference (Making Safe Online Access to Affordable Medication Real: Addressing the UN Human Rights resolution for access to essential medicines), where I represented the perspective of Americans struggling to afford their daily medications and desperate to have safe, affordable Internet access to their prescriptions. more

Proving and Rebutting Respondent Lacks Rights or Legitimate Interests in Accused Domain Names

Paragraph 4(a)(ii) of the Uniform Domain Name Dispute Resolution Policy requires complainants to offer evidence conclusive by itself or sufficient from which to infer that respondents lack rights or legitimate interests in the accused domain names. As I've pointed out in earlier essays (here and here) the standard of proof is low and relies on inference, for good reason; beyond the visual proof and what may be obtainable from on- and offline research, respondents control evidence of their choices. more

Achieving Connectivity vs. More “Broadband”

Our problem isn't the lack of capacity -- it's our inability to achieve simple connectivity. We have abundant capacity but can’t use it because we have gatekeepers who set a price on our ability to communicate and innovate. If we were able to take advantage of what we already have we would find ourselves with a wealth of opportunities rather than having to pay billions to "stimulate" the gatekeepers into letting us create new value. more

Time to Look Past ‘Net Neutrality’. Let’s Start a Fresh Post-Neutrality Debate…

Yesterday, as many of you heard, the European Parliament voted to reject the 'net neutrality' fundamentalist amendments to the already flawed proposals they had helped to create. That's the good news. The bad news is that the law that we now have is merely ludicrous, rather than insane. Furthermore, it doesn't properly protect end users, hold ISP feet to the service delivery fire, or truly encourage broadband ecosystem innovation. more

Another G Generation: The Promise of 5.5G

I've read several articles coming out of the Mobile World Congress trade show in Barcelona, Spain, and one of the common threads is that there was a lot of talk about 5.5G (or 5G Advanced) - the next iteration of 5G. My first question on reading about this was to ask what new features are being discussed that were not part of the original announced promises of 5G. I went back and read a few of my blogs and other articles that were written when 5G was first announced. more

Topics

Brand Protection

Sponsored byCSC

DNS Security

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days