No, this topic hasn't yet been exhausted: There's still plenty more conversation we can and should have about the proposed sale of the .ORG registry operator to a private firm. Ideally, that conversation will add more information and more clarity about the issues at stake and the facts that underpin those issues. That's why I'm planning to attend today's event at American University where the sale's proponents, opponents and undecideds will have a tremendous opportunity to better understand one another. more
This week in Japan I have been invited to address the Multi-Stakeholder Conference that will officially open the G7 ICT Ministerial summit in Takamatsu. The focus of the ICT Ministerial will be on four distinct areas: (1) Innovation and economic growth; (2) Unrestricted flow of information, and ensuring the safety and security in cyberspace;
(3) Contributing to the resolution of global issues, including digital connectivity; (4) International understanding and international cooperation in the future. more
Over the past year, discussions around artificial intelligence (AI) have saturated media and policy environments. Perspectives on it vary widely: from boosterist narratives, which posit the limitless potential of AI-powered technologies to help overcome social inequalities and accelerate industrial development, to apocalyptic framings, which suggest that a (speculative) 'artificial general intelligence' could make humans extinct. more
It's often a clear signal that we're in deep trouble when politicians believe they need to lend a hand and help out with regulations. A bill has been passed by the US Congress, and now signed into law, that requires the National Institute of Science and Technology to work with other agencies in developing guidelines for the use of devices that manage security vulnerabilities, patching, together with configuration and identity management. more
A recent article in the Wall Street Journal discusses the possible contamination of copper telephone cables with outer lead sheathing. I'm not linking to the article because it is behind a paywall, but this is not a new topic, and it's been written about periodically for decades. The authors looked at locations around the country where lead cables are still present around bus stops, schools, and parks. more
The Caribbean can create a unique flavour on the Internet by using effectively managed and financially stable Country Code Top-Level Domains. Speaking after ICANN's first Caribbean edition of its Latin American and Caribbean Internet Roadshow (LAC-i Roadshow), recently held in Turks and Caicos Islands, Albert Daniels said the event yielded "very high interest" in the management and operations of the local ccTLD, .tc. Daniels is ICANN's senior manager of stakeholder engagement in the Caribbean. more
A lot of the money being spent on broadband infrastructure today is trying to solve the digital divide, which I define as a technology gap where good broadband is available in some places but not everywhere. The technology divide can be as large as an entire county that doesn't have broadband or as small as a pocket of homes or apartment buildings in cities that got bypassed. more
At a staggering $100 billion dollar valuation and reported 900 million users, Facebook represents a massive presence in the global economy. From an Internet infrastructure perspective, Facebook also ranks amongst the largest of the "hyper giants" generating a significant share of daily global Internet traffic. This blog explore Facebook's size in terms of its Internet traffic contribution. more
In response to Russia's horrific invasion and war against the Ukrainian nation ordered by Dictator Putin that will live in infamy, an array of nations, organizations, and companies have responded to shun and shut off Russia in every possible manner. The actions include no-fly zones, removal from ICT network services, and essentially universal declarations of condemnation. For the first time ever, all Russian proposals to the International Telecommunication Union (ITU) quadrennial standards body plenary known as the WTSA have been "bracketed"... more
Last month, application security provider Veracode came out with a study that stated that more than half of all enterprise applications aren't secure. The company tested approximately 2,900 applications over an 18-month period, and 57 percent failed to meet Veracode's "acceptable levels" of security. While this study gained a tremendous amount of traction in the media... it does not focus on the bigger issue... more
The Internet has evolved from a scarcity-driven system into one defined by abundance, reshaping infrastructure, governance, and economic models while challenging long-held assumptions about addressing, network roles, and the future of protocol design. more
Adjit Walia, a Global Technology Strategist at Deutsche Bank, suggested in a recent paper that it's in the best interest of U.S. tech companies to tackle the digital divide. He says that those companies rely on a computer-literate public and workforce and that they ought to take a small sliver of their earnings and invest in students today before they fall on the wrong side of the digital divide. more
The latest report from China's Ministry of Industry and Information Technology (MIIT) shows Huawei at the top of the list of 100 largest software companies in China. On reflection, that's not surprising. Half of Huawei's business is now phones, where chief rival Apple has long considered itself a software company. The great achievement of Huawei's phone division was to pull ahead of everyone in the quality of picture-taking. The hardware can be matched; Huawei's advantage comes from software. more
Ask ten people what privacy is, and you'll likely get twelve different answers. The reason for the disparity is that your feelings about privacy depend on context and your experience. Privacy is not a purely technical issue but a human one. Long before computers existed, people cared about and debated privacy. Future U.S. Supreme Court Justice Louis Brandeis defined it as "the right to be left alone" in 1890. Before the Web became a ubiquitous phenomenon, people primarily thought of privacy in terms of government intrusion. more
The information security industry, lacking social inhibitions, generally rolls its eyes at anything remotely hinting to be a "silver bullet" for security. Despite that obvious hint, marketing teams remain undeterred at labeling their companies upcoming widget as the savior to the next security threat (or the last one -- depending on what's in the news today). I've joked in the past that the very concept of a silver bullet is patently wrong... more
Sponsored byCSC
Sponsored byRadix
Sponsored byIPv4.Global
Sponsored byWhoisXML API
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byVerisign