The internet has come to play a vital role in the social and economic development of the Caribbean. Yet, countries in the region are, in the main, relying heavily on external interests to make important decisions about the technical specifications and security of the technology and rules that impact how the Internet is governed. "We find that the Caribbean governments are abdicating their seats at the table in global fora where major decisions are made regarding the future of the Internet. more
If it feels like the work of the latest group addressing registration data within ICANN has been going on forever, try participating in it! Since the summer of 2018, the team has regularly been meeting for several hours each week, participating in numerous face-to-face meetings and exchanging thousands of emails. Last week in Los Angeles, the team got together once again to continue our Phase 2 work creating policy that will (among other issues) govern the disclosure of non-public registration data to third parties. more
Afnic, the Registry of the .FR Top Level Domain, published its annual review on .FR activity in 2023 and analysis of market trends. This growth was due in particular to a significant increase in the number of .FR domain name create operations in 2023 (+6.4%). A new all-time record was reached, with 801,427 create operations, the 800,000 threshold for the number of create operations in a year being passed for the first time. more
Cloud computing is on the rise. International Data Corp. predicts a $195 billion future for public cloud services in just four years. That total is for worldwide spending in 2020 - more than twice the projection for 2016 spending ($96.5 billion). As a result, companies are flocking to both large-scale and niche providers to empower cloud adoption and increase IT efficacy. The problem? Without proper management and oversight, cloud solutions can end up underperforming, hampering IT growth or limiting ROI. more
State and county election officials across the country employ thousands of computers in election administration, most of them are connected (from time to time) to the internet (or exchange data cartridges with machines that are connected). In my previous post I explained how we must audit elections independently of the computers, so we can trust the results even if the computers are hacked. more
In the world of DNS, there are two types of DNS servers, 'recursion disabled' and 'recursion enabled'. Recursion disabled servers, when asked to resolve a name, will only answer for names that they are authoritative for. It will absolutely refuse to look up a name it does not have authority over and is ideal for when you don't want it to serve just any query. It isn't, however, very useful for domains you don't know about or have authority over... more
As we have seen in the first installment of this series, TR-069 offers unprecedented visibility into the customer premises network to highlight devices beyond the gateway, and in the case of WiFi, the issues affecting service quality. Insights into the surrounding WIFI landscape alone provide ample data to provision the access point (AP) to operate in a part of the spectrum with the least amount of interference. more
Digital communications systems always represent a collection of design trade-offs. Maximizing one characteristic of a system may impair others, and various communications services may choose to optimize different performance parameters based on the intersection of these design decisions with the physical characteristics of the communications medium. more
The crucial importance of Iran Nuclear Deal and, hopefully, the imminent expectation, for reaching to an indisputable solution and agreement among 5+1+ Iran (as well as the other parties who claim to have interest in this matter) all have created a special climate and proper ground for all the activists and the observers in order to seriously sit and make a review of the actual situation and the potentials of the main player of the field, say Iran, or Civil Society of Iran... more
How bad is the human security weakness problem? Verizon's 2022 Data Breaches Investigations Report says 82 percent of data breaches have human involvement. This involvement can mean misconfigurations, poor security policy implementation, negligence, and falling prey to social engineering schemes. Essentially, a vast majority of data breaches have penetrated cyber defenses because of human carelessness, inconsistencies, and gullibility. more
The Coronavirus pandemic has profound impact on every aspect of every person's life. We all have turned to the Internet to stay informed on this one subject. Unfortunately, the Internet community is not equipped to organize the Internet around one subject. Governments and businesses are reorganizing their websites daily to make new paths to new coronavirus information on many topics suitable for their many audiences. more
Early action now on possible performance issues will "flatten the curve" of customer problems in the coming weeks and months. Here are three things technology and software vendors can do right now to get ahead of problems that may appear (if they are not already) with services such as development, implementation and support... Check your contracts to see whether there are any "material assumptions" that have failed or will fail - perhaps because of some governmental action or unavailability of personnel... more
Observers of IANA transition may have found a remarkably interesting fact that both supporters and opponents of the transition like citing China, along with a small number of other countries, as evidence in favor of their arguments. For supporters, take Larry Strickling as an example, blocking transition benefits China in that it will "intensify their advocacy for government-led or intergovernmental management of the Internet via the United Nations." On the contrary... more
Astronomy & Astrophysics published a research paper recently that looked at "Unintended Electromagnetic Radiation from Starlink Satellites." The study was done in conjunction with the Low-Frequency Array (LOFAR) telescope in the Netherlands. The LOFAR telescope is a network of over forty radio antennas spread across the Netherlands, Germany, and the rest of Europe. more
I just heard about a U.S. County that is using its American Rescue Plan Act (ARPA) funds to build fixed wireless broadband. This is a traditional fixed wireless broadband technology that will probably deliver speeds of 100 Mbps to those close to the towers, slower speeds to homes further away, and which will not reach all homes in the County. more
Sponsored byVerisign
Sponsored byWhoisXML API
Sponsored byRadix
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byCSC