Dr. Bento J. Lobo, an economist at the University of Tennessee at Chattanooga undertook a study to quantify the benefits of the municipally-owned fiber network in Chattanooga. Any citywide fiber network brings economic development to a community, but a municipally-owned system brings additional benefits because of the way that the business is more deeply integrated into the community. more
There are now more than a thousand new Internet suffixes alongside "the originals" (not talking vampires here, but rather .COM et al). These additional web address endings are called "new gTLDs". Since Internet technical coordinator ICANN's 2012 call for applications for the creation of new gTLDs, and their roll-out starting in 2014 when suffixes such as .BARCLAYS (brand TLD), .NYC (geo TLD) and .SKI (generic TLD) became active, the question of another round of applications has been asked repeatedly. more
During his presentation at IGF on 7 December in Guadalajara, Akram Atallah, President of ICANN's Global Domain Division, said the following: So when you look at that, you'll see that we are left with only 20 to go. There are a few that need to be withdrawn that haven't withdrawn... This surprised me, but since the meeting was about possible new application procedures and not the handling of the last round's persistent problems, I decided not to ask at that point. more
The recent discovery of the goto fail and heartbleed bugs has prompted some public discussion on a very important topic: what advice should cryptologists give to implementors who need to use crypto? What should they do? There are three parts to the answer: don't invent things; use ordinary care; and take special care around crypto code. more
WIPO's newest overview of the Uniform Domain Name Dispute Resolution Policy (UDRP) succinctly states what decisions have made clear through the years: The UDRP's first test is only a "standing requirement." Standing, under the law, simply means that a person or company is qualified to assert a legal right. It does not mean or imply that one will necessarily prevail on any claims. The UDRP includes a well-known three-part test that all trademark owners must satisfy to prevail, but the first element has a low threshold. more
Would you like to understand the major highlights of the 96th meeting of the Internet Engineering Task Force (IETF) last month in Berlin? What were some of the main topics and accomplishments? How many people were there? What else went on? If so, you can watch a short video interview I did below with IETF Chair Jari Arkko. more
During the last few months the US's main DSL providers AT&T and Verizon have begun retracting from the DSL and landline market in many rural and less commercially viable areas while concentrating on their wireless LTE ambitions. DSL and voice telephony provide relatively low returns, which can be whittled away through network maintenance costs, while LTE promises to deliver proportionately higher profits, based on exorbitant charges by data volume. more
ICANN has its 34th international public meeting in Mexico City on 1-6 March i.e. in just over a fortnight. One of the consistent concerns I hear in my role as general manager of public participation for the organization is that there is not a way for people to ask questions to the staff and the Board. I don't think that's really true but I do accept that the formats used are not liked by a large number of people... more
It has been a busy week in U.S. communications policy, with an FCC meeting adopting important spectrum policy reforms, an FCC complaint about Comcast's approval policies for cable modems, and a dispute between Comcast and Level 3 over fees for Internet backbone traffic. And late last night, it got even more interesting. more
The Internet Society's NY Chapter (ISOC-NY) is delighted to present Milton Mueller's first full exposition of his new book Networks and States: The Global Politics of Internet Governance at NYU on Tuesday December 14 2010. Prof. Mueller is a co-founder of ICANN's NonCommercial User's Constituency and a renowned cyberlibertarian. more
Many readers will have seen recent news that the aurora borealis, or northern lights, were visible deep into the South for several days. This phenomenon is caused by a geomagnetic storm that is caused by strong solar flares. Solar flares can cause problems on Earth by emitting clouds of magnetized particles and hot plasma. more
It must be tricky to be an advocate of transparency when your job involves selling serious encryption tools to government departments, large and small companies, hospitals and people who are concerned about having their bank account details hijacked from a home PC. After all, the point about good encryption software and the systems that surround it is that they provide a way to keep your secrets secret, while open government and the effective regulation of financial services would seem to require the widest possible dissemination of all sorts of operational data... more
I came across an interesting article on Reuters today: "U.S. securities regulators formally asked public companies for the first time to disclose cyber attacks against them, following a rash of high-profile Internet crimes..." This is a pretty big step for the SEC. Requiring companies to disclose when they have been hacked shifts the action on corporations from something voluntary to something that they have to do. The question is do we want to hear about everything? more
The Council Working Group on international Internet-related public policy issues (CWG-Internet) was established as a result of resolutions at the 2010 ITU Plenipotentiary to discuss a wide range of Internet issues that had public policy implications... These are all issues that concern all stakeholder groups in the Internet ecosystem. And, indeed, these are all issues being discussed in varying levels of detail by all stakeholder groups. The difference with the CWG-Internet, however, is that both its documents and meetings are closed to all non-Member State representatives. more
In simple terms, Meltdown and Spectre are simple vulnerabilities to understand. Imagine a gang of thieves waiting for a stage coach carrying a month's worth of payroll. There are two roads the coach could take, and a fork, or a branch, where the driver decides which one to take. The driver could take either one. What is the solution? Station robbers along both sides of the branch, and wait to see which one the driver chooses. more
Sponsored byVerisign
Sponsored byCSC
Sponsored byWhoisXML API
Sponsored byIPv4.Global
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byRadix