Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

SpaceX Starlink Beta, Phase Two

According to an email, Starlink has moved into the second phase of its beta program, nicknamed the "better than nothing beta," which feels a bit like monopoly hubris to me. It may be better than nothing, but it is not as good as the initial beta, which was free. Participants will pay $99 per month for the service and pay $499 for a terminal, including a tripod and WiFi router. I wonder what the difference is between these "beta testers" and "customers." more

According to the Department of Homeland Security, Cybercrime Is a Bigger Threat Than Terrorism

An article in Forbes the other day reports on US Secretary of Homeland Security Janet Napolitano's comments that 'cybercrime represents the "greatest threat and actual activity that we have seen aimed at the west and at the United States" in addition to "or other than Al Qaeda and Al Qaeda-related groups."' ..."Napolitano cited a study commissioned by Symantec that put the total worldwide cost of cybercrime at $388 billion -- higher than the global market for heroin, cocaine and marijuana combined." more

Asserting but Not Proving Cybersquatting Under the UDRP

Having trademarks (registered or unregistered) is the prerequisite for maintaining a UDRP, but having one is not conclusive of either Respondent’s lack of rights or legitimate interests or that it registered and is using the domain name in bad faith. The cautionary tale in many of these cases, especially for the Complainant who has the burden of proof, is that it has to satisfy each of the elements in the three subsections... more

Summary Report Now Posted of W3C/IAB “Strengthening The Internet (STRINT)” Workshop

Given that I've written here about the original call for papers for the W3C/IAB "Strengthening The Internet Against Pervasive Monitoring (STRINT)" Workshop and then subsequently that the STRINT submitted papers were publicly available, I feel compelled to close the loop and note that a report about the STRINT workshop has been publicly published as an Internet-draft. more

Telecoms as a Spying Tool

With more and more stories coming in from all over the world about the prolific use of telecommunications to spy on what people are doing, the ball has been thrown back into the industry's court, to do something about it. In principle, ever since telecoms came into existence in the 1850s spying was high on the agenda of the people who started to use the new technology. In 1865 countries formed the International Telecommunications Union (ITU). This later became the first institution under the UN and all countries in the world are a member. more

Case Studies from the UN Broadband Commission

The Broadband Commission for Digital Development, in partnership with ITU, has released its first country case studies looking in-depth at the state of broadband development in four economies and examining links between broadband and the UN Millennium Development Goals. The case studies look at the effect of broadband connectivity on economic growth and access to basic services like education and health. They offer regulatory guidance and best practices, showcasing success stories and lessons learned. more

The Trouble with White Spaces

Like several other engineers, I'm disturbed by the white spaces debate because it focuses on what I regard as the wrong question. The White Space Coalition argues that showing that a system can be constructed that prevents interference between White Space Devices and television broadcast signals compels the Commission to offer up the White Spaces for unlicensed use. This is far from obvious. more

Why Attribution Is Important for Today’s Network Defenders

It makes me cringe when I hear operators or security practitioners say, "I don't care who the attacker is, I just want them to stop." I would like to believe that we have matured past this idea as a security community, but I still find this line of thinking prevalent across many organizations -- regardless of their cyber threat operation's maturity level. Attribution is important, and we as Cyber Threat Intelligence (CTI) professionals, need to do a better job explaining across all lines of business and security operations... more

Who Makes the Any Apps Any Handset Call?

The Wall Street Journal today reported that FCC Chairman Kevin Martin wants to reject a Petition for Declaratory Ruling filed by Skype that would establish a wireless Carterfone policy, i.e., that wireless carriers must allow subscribers to use any compatible handset to access any application, content or software. Chairman Martin has confidence that the marketplace solutions obviate any necessary FCC intervention. Such optimism must derive in part from the apparently newfound willingness of one major wireless carrier, Verizon, to support aspects of open access. Perhaps Chairman Martin has confidence in the marketplace based on the magnanimous offer of most wireless carriers to pro-rate their early termination penalties by $5 a month. But here's the rub... more

A Brave New World or Do We Need to Discuss IT and Ethics?

Every day comes with another digital security breach, surveillance disclosure and what not. The world seems to have grown used to it and continues its business as usual. It doesn't seem to be bad enough to really act. Every day comes with new stories about the end of the Middle Class, IT taking over jobs in places where up to very recently that was inconceivable, not in people's wildest dreams would these jobs disappear. more

Starlink Beta vs. Fiber

Last year we had terrible DSL from Consolidated Communications and much better, although not always consistent, service from wireless ISP GlobalNet. I signed up for fiber service from Stowe Cable for installation this year and also was accepted early as a Beta tester for Starlink. Now we have both Starlink and fiber and can compare the two. I was very happy to cancel my Consolidated service but felt bad about canceling GlobalNet, which was essential to me for many years. Most of the time, there are only two of us in the house. more

The Internet Portal Strategy, Circa 2011

Ev Ehrlich over at High Tech Forum wrote an excellent piece yesterday about some recent comments by Google's Eric Schmidt. According to Schmidt there are four megafirms right now executing well on what he calls "platform strategies" - Google (search), Apple (gadgets/ecosystem), Amazon (online retailing) and Facebook (social connectivity). more

The Business Of Domains: Shifting The Paradigm

For a business that started with few competitors and unlimited markets, the domain name registration trade has certainly become quite difficult and price sensitive. As the owner or manager of your firm, you have a basic choice to make: You can pull back and ride out this difficult period, or you can use this disruption to your advantage. Can a savvy owner or manager bring profitable growth to his or her company? One positive answer may not be in familiar spaces, but in new markets. more

Deadline of Dec 21 To Submit Nominations for 2016 Internet Society Board of Trustees

Are you passionate about preserving the global, open Internet? Do you want to help guide work to connect the unconnected and promote / restore trust in the Internet? Do you have experience in Internet standards, development or public policy? If so, please consider applying for one of the open seats on the Internet Society Board of Trustees.
The Internet Society serves a pivotal role in the world as a leader on Internet policy, technical, economic, and social matters, and as the organizational home of the Internet Engineering Task Force (IETF). more

Sovereign Nations on an Unseen Path at WCIT 2012 to Create a Super-Sovereign ITU

It puzzles me to watch Governments introducing or subscribing to proposals that would in effect smoothly concede part their sovereignty to the ITU -- in an area that is central -- Communications. The WCIT 2012, in the middle of its second week, would now discuss Document DT/51-E 11, which is said to be a "package" of not-yet-compromised draft proposal for revisions to the International Telecommunication Regulations, which inevitably makes ITU the control center of all communications in the known Universe. more

Topics

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days