/ Featured Blogs

An Interview With Richard Whitt, Google’s Washington Telecom and Media Counsel

I recently had the opportunity to interview, Richard Whitt, Google's Washington Telecom and Media Counsel, who will be one of the keynote speakers at the upcoming Emerging Communications Conference (eComm 2009) being held on March 3-5 at the San Francisco Airport Marriott. The following is the transcript of our phone conversation and the audio recording of the interview.

Extra Details on the Measurement Lab Launch

Well if you've been following tech news today, you probably already know -- after month (years, really) of work, the MeasurementLab.net (M-Lab) initiative has now officially launched. Given how many people have been working on this project, I'm amazed it didn't leak. Having just launched, I've been stunned by the immediate outpouring of interest — not only did it peg our servers, taking a couple of the research tools momentarily offline, but my inbox has been entirely flooded by correspondences.

VoIP Security Predictions for 2009

Here are my VoIP and Voice security predictions for 2009, limited to just a few, key predictions... The poor economy will slow the adoption rate for VoIP and Unified Communications (UC). This will continue to limit the size of the enterprise VoIP deployments for potential hackers to exploit. VoIP/UC will continue to be mostly an internal/campus application where the threat level for attack is low, so deployments will be largely secured along the same lines as other data network applications.

Top Ten List of Needed FCC Regulatory Reforms

Honesty is the best policy. At the risk of anthromorphizing a regulatory agency, at the very least the FCC has not told the complete truth, or put itself in a position not to know the truth. The FCC has contributed to debates about what constitutes credible facts and statistics, and what this data means. For example, soon-to-be former FCC Chairman Kevin Martin asserted as the gospel truth his factual conclusion that cable television operators collectively have a 70% market share... The FCC should acknowledge that it may not know all the facts.

Domain Name Brand-Sharing Starts With Embracing Web 2.0

Irrespective of which solution to the current domain name brand-sharing impasse ends up being adopted by brand owners (option 1, option 2, or a combination), the owners must first understand and embrace current trends in online communications, information gathering, and entertainment. Thus, for a solution to succeed the corporate mindset toward new technologies needs to change; after that brand owners can work cooperatively with the domain name industry (owners and institutions) to increase the aggregate pie.

Law Requiring Sex Offenders to Hand Over All Internet Passwords Going Too Far?

Maybe you've seen one of the news stories about the revised Georgia statute (Georgia Code ยง 41-1-12) that now requires sex offenders to turn their Internet passwords, screen names and email addresses over to authorities. The purpose of the revised statute is to give authorities the ability to track what sex offenders are doing online, to, in the words of one news story, "make sure" they "aren't stalking children online or chatting with them about off-limits topics."

A Noteworthy Report on Fast Flux Hosting

This very interesting document was released by ICANN's Generic Names Supporting Organization (GNSO) for public comment yesterday. And it asks some fundamental questions while at the same time pointing to sources such as the Honeynet Alliance's reports on fast flux.

Obama’s Tech Stimulus Plan: Health IT, Broadband, and Smart Grid

Steve Lohr has a nice piece in the New York Times ('Technology Gets a Piece of Stimulus,' 26 Jan 2009, p. C1) this morning about the role that technology and innovation will play in the economic recovery (aka stimulus) bill supported by the Obama Administration. In the past, health IT deployment has been approached as an engineering problem: what computers have to be part of which networks exchanging which types of data? This loses sight of the purpose of electronic medical records...

Monster.com Response to Security Breach Unacceptable

As some of us are continuing to learn this week the Monster.com service has again been successfully hacked. According to a security bulletin posted on Monster.com on January 23rd, 2009, the intruder gained access to the user database, while no resumes were apparently compromised... As a user of Monster.com what I find incredibly upsetting about this situation is that I had to find out about this through a security blog.

Security Psychology

I just came across a post telling of the Security and Human Behavior workshop. As some of you may be aware, I've been researching this subject for about two years now, and I am very excited that a conference has now happened! It means I did not waste the last two years of my life after all!