"It's in the cloud" has become a phrase we don't think twice about, but less than a decade ago, you might have received some awkward looks using this kind of talk in the boardroom. Cloud-based software applications are heralding the fourth industrial revolution that will eventually lead to the industrial internet of things (IIOT). The reasons for this are because... more
In December 2005 the Australian Competition & Consumer Commission (ACCC) launched an inquiry into the future regulation of wholesale access on fixed networks. It has now announced a final decision, following a public inquiry, under section 152AL of the Trade Practices Act 1974 on six fixed-line services that had been due to expire at the end of this month. The following will remain declared services until July 2014... more
The introduction of New gTLDs has increased the rate at which individuals and businesses are getting online today and we're already seeing mainstream adoption of New gTLDs. By going the extra mile to spread awareness about their extensions among the masses, New gTLD Registries are bringing attention to their value propositions and, more importantly, are sharing the idea of 'getting online' to audiences. more
Intellectual property and computer law barrister Peter Dengate-Thrush has been elected as new Chairman of the Board of the Internet Corporation for Assigned Names and Numbers (ICANN). The former chairman of InternetNZ, the country-code top-level domain (ccTLD) registry for New Zealand (.nz), and cofounder of the Association of Asian Pacific ccTLDs, succeeds the legendary Vinton Cerf... more
If you are like the majority of Registry Operators we have spoken to, you may now be thinking that compliance with your new gTLD Registry Agreement is much more difficult than first envisaged -- especially if you are one of the lucky operators which have been chosen for ICANN's latest round of registry audits! You may also be surprised at the number of questions and requests that you need to respond to. more
For the WSIS community to be effective in meeting its ambitious goals adopted in December 2015, it will have to become more evidence-based and innovative. At the beginning of the new millennium -- before the arrival of Facebook and Twitter -- Kofi Annan, then Secretary General of the United Nations, called for the creation of an inclusive "information society" -- "one in which human capacity is expanded, built up, nourished and liberated, by giving people access to the tools and technologies they need, with the education and training to use them effectively." more
My first day back at the office after a summer of working remotely featured a traffic jam of the sort that reminds me why I hate commuting: one car crash, a key highway closed, and no reasonable surface road alternative routes. There's just nothing to do but suffer the consequences when that road backs up. I had an early team meeting and was already scrambling to leave the house with a buffer of half the regular commute time. It wasn't going to be enough. I dropped a note to my team, who'd all be participating from their locations (in other cities and countries), and warned them. more
During the last year, we saw a big change in the nature of our broadband usage in that many of us are connecting to remote work or school servers, or we are connecting to long Zoom calls. We already can see that these changes have accelerated the average home usage of broadband. OpenSignal reports that the average broadband usage per home grew from 274 gigabytes per month just before the pandemic up to 462 gigabytes per month measured at the end of the first quarter of this year. more
The UK cares about its citizens' privacy to the tune of a $229 million (US) fine of British Airways for a breach that disclosed information of approximately half a million customers. It's exciting -- a significant fine for a significant loss of data. I think GDPR will lead to improved security of information systems as companies scramble to avoid onerous fines and start to demand more from those who provide information security services and products. more
In the first part of this series on ICANN's impending Clarifying Questions period, I outlined what you can expect in terms of question structure. Here I would like to outline how the points work and provide some advice on how to answer questions for best success. more
We do live in turbulent times. There is such a lot happening, with many people feeling overwhelmed and lost. One of the reasons given why we do have these problems is technology. I would argue against that. In all reality, technology is a tool that we can use, and yes, we all know that we can use it for the wrong reasons (cars kill people, atom bombs, killer robots, chemical and biological warfare and so on). However, we have learned to live with it, and in general, the outcome from science, innovation and technology has been positive. more
As technology gets more and more sophisticated, tech-savvy cybercriminals are having a field day devising increasingly ingenious ways to steal confidential data from ill-prepared targets. What this means is that an equally sophisticated cybersecurity response is needed to keep attackers at bay. This would involve re-examining reactive cybersecurity practices and adopting a proactive approach towards an active search for risks and vulnerabilities with the help of threat intelligence (TI). more
With DNSSEC for the root zone going into production in a couple of weeks, it is now possible for Top Level Domain (TLD) managers to submit their Delegation Signer (DS) information to IANA. But what does this really mean for a TLD? In this post we're going to try to sort that out. more
In our globalized economy, it is vital that we do establish levels of fair trade, and the USA is right in addressing that issue. However, making technology a key element of the trade war will backfire. Let's take (again) the Huawei issue as an example. The company has admitted that the US boycott is hitting them severely with an estimated loss of $30 billion in revenues. One of the other elements of the trade boycott is that Google is no longer allowed to provide... more
Most service providers are aware that there needs to be a simple, fast way to identify subscribers. Unfortunately, in reality, mapping IP addresses back to subscribers for identification purposes - such as lawful interception requests or acceptable use policy violations - can be complicated. It usually involves analyzing data sets, completing manual audits, or reliance on multi-step solutions. more
Sponsored byDNIB.com
Sponsored byWhoisXML API
Sponsored byRadix
Sponsored byVerisign
Sponsored byVerisign
Sponsored byCSC
Sponsored byIPv4.Global