With 5G earmarked as a game-changer for cities, wireless technologies are already widely deployed by leading smart cities, including those here in Australia. However, cities do not want to be locked into proprietary technology solutions, rather seeing themselves as a platform on which many organisations can build infrastructure, applications, and services to benefit all citizens and all local businesses. more
The general run of Uniform Domain Name Resolution Policy (UDRP) decisions are unremarkable. At their least, they are primarily instructive in establishing the metes and bounds of lawful registration of domain names. A few decisions stand out for their acuity of reasoning and a few others for their lack of it. The latest candidate of the latter class is NSK LTD. v. Li shuo, FA170100 1712449 (Forum February 16, 2017)... It is an example of inconsistency in the application of law. more
As Chairs of ICANN's Registries and Registrar Stakeholder Groups, we are proud to announce that we have initiated a new practice for the Contracted Parties Summits: the publication of our Contracted Parties Summit Statement. As you may (or may not) know, Contracted Parties get together periodically to interact and work together on issues that we care about, and which impact our businesses as registries and registrars. more
I have bad news for anybody still clinging to their flip phones. All of the big cellular carriers have announced plans to end 3G cellular service, and each has a different timeline in mind... The amount of usage on 3G networks is still significant. GSMA reported that at the end of 2018 that as many as 17% of US cellular customers still made 3G connections, which accounted for as much as 19% of all cellular connections. more
WannaCry, or WannaCrypt, is one of the many names of the piece of ransomware that impacted the Internet last week, and will likely continue to make the rounds this week. There are a number of takeaways and lessons to learn from the far-reaching attack that we witnessed. Let me tie those to voluntary cooperation and collaboration which together represent the foundation for the Internet's development. more
Many previous pieces of research have focused on the desirability of a comprehensive scoring system, to be used for ranking results identified as part of a brand-protection solution, according to their potential level of threat. Such scoring systems offer the capability for identifying prioritised targets for further analysis, content tracking or enforcement actions. more
Over the past two years, governments and foreign intelligence agencies around the world have tried to understand the inexplicable, chaotic, irrational, indeed maniacal 5G policies of the Trump Administration. Revelations by former Trump administration officials and most recently Trump's niece confirm that there is no rational basis for Trumpian positions and policies and that the best response is to recognize that Washington is no longer capable of playing a meaningful role... more
To understand some of our implementation choices, it's important to remember two things. First, the computers of that era were slow. The Unix machine at UNC's CS department was slower than most timesharing machines even for 1979 – we had a small, slow disk, a slow CPU, and – most critically – not nearly enough RAM. Duke CS had a faster computer – they had an 11/70; we had an 11/45 -- but since I was doing the first implementation, I had to use what UNC had. (Log in remotely? more
Are you passionate about ensuring the Internet remains open, globally-connected, secure and trustworthy - for everyone? Do you have experience in Internet standards, development or public policy? If so, please consider applying for one of the open seats on the Internet Society Board of Trustees. The Board of Trustees provides strategic direction, inspiration, and oversight to advance the Society's mission. more
Do you know how big your web site will be in a year? You probably can guess, or even estimate how much traffic will hit your site in a year. You can also use millennia proven methods such as Crystal Balls, Animal Entrails or even Coffee Stains. But seriously, it is no easy task evaluating site growth in this volatile, ever changing economy. A key element in the scaling of any web site is the Application Delivery Controller (ADC). more
Most engineers focus on purely technical mechanisms for defending against various kinds of cyber attacks, including "the old magic bullet," the firewall. The game of cannons and walls is over, however, and the cannons have won; those who depend on walls are in for a shocking future. What is the proper response, then? What defenses are there The reality is that just like in physical warfare, the defenses will take some time to develop and articulate. more
In August 1858, Queen Victoria sent the first transatlantic telegram to U.S. President James Buchanan. The cable system had taken a total of four years to build and used seven copper wires, wrapped in a sheath of gutta-percha, then covered with a tarred hemp wrap and then sheathed in an 18-strand wrap, each strand made of 7 iron wires. It weighed 550kg per km, with a total weight of over 1.3Mkg. more
The French are good at 'doing' infrastructure. The country takes pride in a civil service which has been progressively centralised since the efforts of Cardinal Richelieu in the mid-17th century. The well-funded health system is among the best in Europe. The generously subsidised rail service, the SNCF, also rates highly. These and other components of the modern French State cost money, and the government has rarely proven shy in supporting big ideas, particularly if they are so readily equated with public welfare and benefit. more
The term "counterfeit" is defined under U.S. trademark law as "a spurious mark which is identical with, or substantially indistinguishable from, a registered mark." 15 U.S.C. § 1127 (Lanham Act, Sec. 45). Used as a noun, domain names ultimately found to have been registered in bad faith make their registrants cybersquatters by definition. But more commonly we encounter counterfeiting as an adjective as it applies to spurious goods (counterfeit goods) -- "made in exact imitation of something valuable or important with the intention to deceive or defraud." more
Many CircleID readers have been watching the acceleration of DNSSEC adoption by top level domains with great interest, and after many years the promise of a secure and trustworthy naming infrastructure across the generic and country-code domains finally seems within reach. While TLD DNSSEC deployments are major milestones for internet security, securing the top level domains is not the end goal - just a necessary step in the process. more
Sponsored byDNIB.com
Sponsored byCSC
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byRadix
Sponsored byVerisign
Sponsored byWhoisXML API