This post is conjecture, but it is informed conjecture... Consider the following: When Google Fiber started in Kansas City, most people assumed that it was a demonstration project, intended to spur investment by the incumbent US Internet service providers (ISPs). Few thought that Google wanted to become a retail ISP. Google Fiber garnered a lot of publicity and Google, began speaking of it as a real, profit-making business. They announced other cities and started laying fiber in some of them. more
As the head of the registry for the .CA top-level domain, I can tell you that few things get Canadians riled up as much as the performance of their Internet service. Their concerns aren't entirely unfounded -- according to OECD data, Canada's ranking for broadband speed and price relative to its OECD counterparts has been on a downward trend over the past dozen years. And for those of us who travel overseas, especially to countries with advanced Internet infrastructure like South Korea and Sweden, we've experienced firsthand just how green the grass is on the other side of the fence. more
The ICANN latest reveal of the applications pending batching has shown a number of very crucial details of what the new domains system is like. The new system before batching presents new applications with the North Americas having the highest applications amounting to 911, Europe follows with 675, Asia pacific which already has one continental domain .asia has three hundred and three domains, Latin America which shares the same ecological niche with Africa has 24 new applications 7 domains higher than Africa which has presented 17 new domains. more
In my recent CircleID post, DNS, Domain Names, and Certificates: The Missing Links in Most Cybersecurity Risk Postures, I highlighted the importance of applying multiple layers of defense to secure these business-critical assets. Last Friday, Brian Krebs, the world-renowned cybersecurity journalist, reiterated the criticality of domain name security because the domain name "e-hawk.net" was stolen from the rightful owner using social engineering tactics targeting its domain name registrar. more
A few days ago, I sat in a meeting here in Ottawa with our IT Director and Director of Marketing and Communications. These are two highly intelligent people working on the same team, for the same company, talking about a common subject. And yet, something was amiss in achieving mutual understanding. Each was seeing things from his own distinct perspective and as such, speaking his own language. As I reflected on my team's internal dynamic, I began to see parallels in areas that have an even more direct impact on the Internet ecosystem. more
Every year those in the security industry are bombarded with various cyber security predictions. There's the good, the bad and the ugly. Some predictions are fairly ground breaking, while others are just recycled from previous years -- that's allowed of course if the threats still stand. In part one of my predictions I looked at the malware threats, so let's take a look at big data and the cloud for part two. more
A number of the new generic Top-Level Domains (gTLDs) have not fared well, as reflected in the dismal domain registrations. Most often we're told the problem is that end users don't know about the gTLDs, or that they don't understand or fully believe in the gTLDs' benefits, or that they demand a tremendous amount of benefits before giving up the familiar for something new (so-called .com-stickiness). My point: Behind all these explanations there may be another, the lack of decent sales force strategies. more
The Internet is currently full of news articles describing how the FCC will soon be putting to bed the last vestiges of its order a few years ago to eliminate net neutrality rules. The order that is widely being called the net neutrality ruling was a far-reaching change at the FCC that essentially wrote the FCC out of any role in regulating broadband. more
It's been a quarter of a century since the world's governments convened to draft up a common set of regulations about the conduct of international telecommunications. In December of 2012 the world's governments will convene to reconsider these regulations, to hopefully sign an updated set of regulations. This time around, this activity is generating considerable levels of public interest. Congressional hearings in the United States have been held, and various pronouncements of intent from various governmental, regional, and industry groups have been made. more
As I noted in my recent comments on CircleID, the recent resolutions from the Special Meeting of the ICANN Board held in Norway in late September left a few important new gTLD issues up in the air and created a little uncertainty in the marketplace. ... However, whilst sign-off on the program is still not guaranteed to occur in December, a recent interesting post on the GNSO mailing list from ICANN's Senior Vice President... more
This is the African Union Commission's formal objection, through the ICANN GAC Early Warning Process, to the DotConnectAfrica Trust's amended application 1-1165-42560 for the .africa TLD. Here, it objects to the DCA .africa bid as not having the requisite government support for a Geographic name, and further characterizes DCA's bid as an "Unwarranted Interference and Intrusion" more
The explosion in mobile communications in the developing world has created social and economic changes that have exceeded all expectations and predictions -- even those made as recently as five years ago. There are still countries lagging behind, but now is the time to move on to the next stage -- and that means broadband. Already the developed world is showing an enormous appetite for mobile broadband, so the demand is most certainly there. The rapid development of low cost Smartphone, projected to approach $50 soon... more
Time for another annual roundup from the world of IP addresses. What happened in 2015 and what is likely to happen in 2016? This is an update to the reports prepared at the same time in previous years, so let's see what has changed in the past 12 months in addressing the Internet, and look at how IP address allocation information can inform us of the changing nature of the network itself. more
More than 40 years ago, the FCC was worried about telephone companies using their power over communications to control the then-nascent (and competitive) data processing marketplace. The Bell System at that point was already banned from providing services that weren't common carriage communications services (or "incidental to" those communications services)... In a 1999 article in the Texas Law Review, Steve Bickerstaff pointed out that Computer 1 meant that no one could provide a "computer utility" service... Today, we'd call the "computer utility" something different -- we'd use the term "cloud computing." more
Bruce Schneier is a famous cryptography expert and Orin Kerr a famous cyberlaw professor. Together they've published a law journal article on Encryption Workarounds. It's intended for lawyers so it's quite accessible to non-technical readers. The article starts with a summary of how encryption works, and then goes through six workarounds to get the text of an encrypted message. more
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byWhoisXML API
Sponsored byIPv4.Global
Sponsored byCSC
Sponsored byVerisign
Sponsored byRadix