On many occasions I have written about the dangers of electronic communications in relation to data retention laws, government e-spying and other activities undermining our democracy and our liberty. To date governments still have to come up with evidence that all of this spying on their citizens has prevented any terrorist attacks. Terrorism has been given as the key reason for the government's spying. more
Africa's digital ecosystem is growing rapidly, with internet access becoming a central driver for innovation, business, and socio-economic development. As this digital adoption expands, so too does the importance of domain governance, particularly the effective management of Top-Level Domains (TLDs). Unfortunately, over the years, African registries have struggled to manage their TLDs, often leading to missed opportunities, inefficiencies, and a loss of competitive edge in the global domain market. more
There has been a significant focus over the past two years on the vulnerability and cyber threat risks faced for voting systems at the local level. That focus has typically been on State and local jurisdictions like cities, counties and towns, and resulted in the creation of the DHS Elections Infrastructure Information Sharing and Analysis Center (ISAC) to assist. However, there are other local governance entities at significant risk as well. more
New gTLD Applicants now have a more fair and reasonable ICANN auction framework. A collaborative negotiation between the New TLD Applicant Group (NTAG) Auctions Working Group and ICANN Staff resulted in changes that improve the auction rules and bidder agreement. The indemnification and waivers in the agreement are now aligned with breaches that applicants can control. Applicants also now have an indemnification from Power Auction for third party claims related to IP infringement. more
I work with a lot of ISPs that own rural fiber. Some rural network owners have been successful in providing fiber to cell sites near their networks over the last decade. A few sell directly to a cellular carrier, but most of these connections are sold to an intermediate carrier that bundles together cellular connections across a large geographic area. more
Decentralization is a big trend in IT, and everyone has their own definition of what "decentralization" really means. With more organizations fully embracing a work-from-anywhere culture, decentralization has moved past being a fad and turned into a necessity. Decentralized cybersecurity is nothing new. Many of us have been doing it since before the pandemic. more
In today's digital age, the Internet is a ubiquitous presence in our lives, playing a pivotal role in how we communicate, work, learn, and entertain ourselves. However, the convenience and benefits of the Internet come with a hidden cost to the environment, which is often overlooked by end users. This article explores the environmental impact of online activities and highlights the importance of adopting more sustainable digital practices. more
Three months after implementation of the European Union's (EU) General Data Protection Regulation (GDPR), the World Intellectual Property Organization's (WIPO) Arbitration and Mediation Center has expanded and updated its already helpful web page with important questions and answers about how the GDPR is impacting the Uniform Domain Name Dispute Resolution Policy (UDRP). more
Measuring the performance of broadband networks is an important area of research, and efforts to characterize the performance of these networks continues to evolve. Measurement efforts to date have largely relied on inhome devices and are primarily designed to characterize access network performance. Yet, a user's experience also relies on factors that lie upstream of ISP access networks, which is why measuring interconnection is so important. more
It seems that this last holiday season didn't bring much cheer or goodwill to corporate security teams. With the public disclosure of remotely exploitable vulnerabilities and backdoors in the products of several well-known security vendors, many corporate security teams spent a great deal of time yanking cables, adding new firewall rules, and monitoring their networks with extra vigilance. more
When a tax is too high people avoid it, and when the political cost of supporting the US government becomes too high, foreign governments will avoid it too. Add to that cost America's new inclination to withdrawal, and consider the muddy tidal flat on which could soon list the hull of what used to be American technological primacy... When countries try to develop technology policies to compete with the United States, they often begin with rules over immigration. more
For decades, the US government has fought against widespread, strong encryption. For about as long, privacy advocates and technologists have fought for widespread, strong encryption, to protect not just privacy but also as a tool to secure our computers and our data. The government has proposed a variety of access mechanisms and mandates to permit them to decrypt (lawfully) obtained content; technologists have asserted that "back doors" are inherently insecure. more
In our globalized economy, it is vital that we do establish levels of fair trade, and the USA is right in addressing that issue. However, making technology a key element of the trade war will backfire. Let's take (again) the Huawei issue as an example. The company has admitted that the US boycott is hitting them severely with an estimated loss of $30 billion in revenues. One of the other elements of the trade boycott is that Google is no longer allowed to provide... more
With the prospect of broadband networks becoming more and more of a reality, it appears that concepts such as eHealth are not too far away. Digital healthcare describes the whole system of GPs, hospitals and regional healthcare centres, while eHealth describes the many health applications which will become available for people to use at home. more
J. Gordon Crovitz is making his case against the IANA transition again today, in the pages of the Wall Street Journal. I think it's useful to once again go on record opposing his flawed logic against the transition. i2Coalition was among those that publicly praised the IANA transition report when it arrived this week. When the Washington Post covered our announcement, I was frustrated by a commenter who has a different take on the transition than I. more
Sponsored byIPv4.Global
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byVerisign
Sponsored byRadix
Sponsored byCSC
Sponsored byDNIB.com