The U.S. Department of Agriculture has been measuring computer usage on farms and publishes the results every two years in its Farm Computer Usage and Ownership report. The most recently released report for 2019 was compiled by asking questions to 20,000 farmers. This is a large sample from the more than 2 million farms in the country. more
Ransomware is a huge problem for small and medium businesses, and the most important question is this: should you pay the ransom? Ransomware has proven a successful revenue generator for criminals, which means the risk to businesses will grow as ransomware becomes more sophisticated and increasing numbers of ethically challenged criminals jump on the bandwagon. more
Earlier this month, Elon Musk tweeted an invitation to a job fair at the new SpaceX production and launch facility near Boca Chica, Texas. As shown here, the tweet says they want hard-working, trustworthy people with common sense. They are not looking for specific skills or education, but certain character traits – "the rest we can train." That tweet reminded me of hiring practices when I graduated from college. more
Over the last ten years, Andrew Odlyzko has been writing about a pricing algorithm that would assure reasonable service levels at reasonable prices. If you're going to F2C, you might want to read that brief article or this slightly more complex one to learn (or refresh your sense of) PMP -- Paris Metro Pricing models to deal with network congestion. You'll also get a sense of why throwing bandwidth at the network will not be sufficient. Here's a great article from 1995... more
While the March report from ICANN's Domain Abuse Activity Reporting system show a general reduction in second-level gTLD domain names identified as being used in phishing, malware distribution, and botnet command and control, it has been widely reported that criminals are taking advantage of the global COVID-19 pandemic by launching malicious online campaigns. There have also been numerous reports of spikes in the use of COVID-19-related domain names for DNS Abuse. more
In these competitive times and with the holiday's looming, your Website experience needs to give customers a "warm and fuzzy" feeling. That is, it should be available and fast, with no major hiccups. Website monitoring is essential in delivering just that. How do you find a monitoring tool? Just set the monitoring budget, find a vendor, call the sales department and buy yourself some monitoring, right? Whoa, not so fast. more
This year, the 25th anniversary of the creation of ICANN was celebrated. The date carries a commemorative meaning, highlighting the trajectory of this institution that has been fundamental in the coordination and administration of Internet resources. However, this milestone also highlights the growing challenges facing Internet Governance in the current global landscape. more
The Washington Post wrote an article recently that talked about how poor rural connectivity cost lives during a tornado in Louisiana. Around the country, there are now elaborate alert systems in areas subject to tornados and other dangerous weather events. These alerts have been shown to save lives since they give folks enough time to seek shelter or get out of the path of a storm. more
In September 2020, I wrote a post on a proposed 56-kilometer link between the ARCOS undersea cable and the north coast of Cuba, near Havana. The Trump-appointed Justice Department Committee for the Assessment of Foreign Participation in the United States Telecommunications Services Sector was to conduct a 120-day security review of the proposal. more
The last Australian Internet Governance Forum (auIGF) was held in October 2016 before the annual event was cancelled as part of an auDA review. Three years on and the auIGF replacement – NetThing – was held in Sydney on 28 October 2019, though I was surprised to see that this Australian Internet event no longer had an associated .au domain name, instead choosing to go with NetThing.info. more
Seventy-five years ago today, on May 29th, 1934, Egyptian private radio stations fell silent, as the government shut them down in favor of a state monopoly on broadcast communication. Egyptian radio "hackers" (as we would style them today) had, over the course of about fifteen years, developed a burgeoning network of unofficial radio stations... It couldn't last. After two days of official radio silence, on May 31st, official state-sponsored radio stations (run by the Marconi company under special contract) began transmitting a clean slate of government-sanctioned programming, and the brief era of grass-roots Egyptian radio was over... more
ICANN's request for comment on amending the .com registry agreement to restore Verisign's pre-2012 pricing flexibility ended last Friday and, with 8,998 responses submitted by stakeholders, may have been a multistakeholder version of the St. Valentine's Day Massacre. Public interest in .com pricing is understandably high but the sheer volume of responses – nearly three times the number of comments submitted this summer on deregulating .org pricing – also suggests a show of force... more
After many months of hard work and preparation, the IGF community has published draft Best Practices on a range of key issues, complementing other intersessional efforts such as Policy Options for Connecting the Next Billion, and Dynamic Coalitions. Best Practices Forums (BPFs) offer the Internet governance community tangible ways to address Internet issues. more
In 2020, the ICANN Generic Name Supporting Organization (GNSO) Council approved a plan to revamp the WHOIS system as per the recommendations given by the ICANN Expedited Policy Development Process (EPDP). This plan directed ICANN to develop a centralized System for Standardized Access/Disclosure (SSAD) for WHOIS records. After much debate regarding the suitability and cost of such a system, ICANN brought together a group... more
There was a planning meeting for what became Usenet at Duke CS. We knew three things, and three things only: we wanted something that could be used locally for administrative messages, we wanted a networked system, and we would use uucp for intersite communication. This last decision was more or less by default: there were no other possibilities available to us or to most other sites that ran standard Unix. Furthermore, all you needed to run uucp was a single dial-up modem port. more
Sponsored byRadix
Sponsored byVerisign
Sponsored byCSC
Sponsored byWhoisXML API
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byDNIB.com