In preparation for some upcoming long-haul international flights, I was looking for some "light" ICANN reading material. One document that came to mind was ICANN's 2010 Annual Report. Over the last four years ICANN has produced a year end report. While this document was probably originally conceived as a means to demonstrate ICANN's progress... more
The company has pledged that in the coming years, it will purchase the output of several new solar farms. more
I still run across articles that extol the supposed wonders of 5G. The most recent, published in Gizmodo asks "How 5G Could Replace Your Home Broadband Connection". I was surprised to see an article like this in a tech-oriented site because the article gets most of the facts wrong about 5G - facts that are not hard to verify. This article talks about 5G having "faster download speeds, faster upload speeds, more bandwidth, and lower latency" than landline broadband. more
The 2004 new sTLD round brought about a new type of TLD in the form of .asia and .cat. As we always struggle for words to capture their nature, I call them "geoTLDs". Culture, language and ethnicity are also part of geography. Contrary to ccTLDs, geoTLDs do not have a territorial meaning. They are a wonderful addition to the Internet as they provide a way to demonstrate one's commitment to a community that is not defined by borders, yet linked to where the individual chooses to be. ...Will they be? They will, unless we do the wrong thing now. more
A decade old guessing game finally came to an end during these 2012 summer months. America was supposed to be hopelessly behind while Europe had not much to show after a decade of spending lavishly EU money on IPv6 related projects. China and Japan were thought to be light years ahead of everybody else. But in the end, it was the might of the American Content Industry that tipped the scales. more
More and more information is becoming available about the breach of Optus (Australia's second-largest telco). It looks like the hacker is more of an amateur than a professional criminal or a "state actor." This makes the hack even more worrisome. It looks as though Optus didn't have its security house in order. This makes the issue all the more painful for the company. It will dent its reputation, and customers could become somewhat wary about dealing with the company. more
The African Union's Convention on the Establishment of a Credible Legal Framework for Cyber Security in Africa (AUCC) has been the focus of debate recently.To shed light on online security issues in Africa, CIO East Africa sought the views of Ms Sophia Bekele, an internet security expert and international policy advisor over internet and ICT. more
While developed and developing countries are fully aware of the importance of robust Internet infrastructure in the digital age, none have the same level of ambition that has fueled China's aggressive rollout strategy over the past seven years. more
According to news reports, the governor of Kentucky has filed a suit in state court to seize 141 gambling domain names. His claimed authority is a 1974 law against "gambling devices", on the theory that a domain is a "device", and online gambling is taking money away from in-state horse racing and the lottery. The judge sensibly has said that he doesn't understand all the issues, and has given all sides a week to submit briefs. more
In light of increasing reports of malicious activity targeting the DNS infrastructure, ICANN is calling for the full deployment of the Domain Name System Security Extensions (DNSSEC) across all unsecured domain names. more
The information in WHOIS database is very important to Law Enforcement Agencies, Intellectual Property Owners, and all Internet Users in general, who use this data to locate/contact domain name owners for various purposes including but not limited to enforcing laws or addressing grievances related to cybercrime and other cases of DNS abuse like Spam, Phishing, Malware etc. However, Privacy and Proxy Services are also available for many Top Level Domain Registries... more
The U.S. House Judiciary Committee is investigating Google's plans to implement DNS over HTTPS (DoH) in Chrome according to a report by the Wall Street Journal over the weekend. more
One of the most debated questions at the time of the opening of the .eu Top-Level Domain (TLD) was whether or not it was possible to register names on the basis of prior rights on signs which include special characters, such as an ampersand. The Advocate General of the Court of Justice of European Union has just published his opinion (4 years later...) more
Happy Early Memorial Day. Once an ESP or marketing automation company declares itself for sale, there seems to be a mass exodus by investors, which sends up a red flag, (well in this case, a red & white striped flag). This past week there were rumblings about the potential suitors for Marketo. While it is rumored that German company SAP is the front-runner, there are many other potential suitors circling the marketing automation software company. more
Distributed Denial of Service is a big deal -- huge pools of Internet of Things (IoT) devices, such as security cameras, are compromised by botnets and being used for large scale DDoS attacks. What are the tools in hand to fend these attacks off? The first misconception is that you can actually fend off a DDoS attack. There is no magical tool you can deploy that will allow you to go to sleep every night thinking, "tonight my network will not be impacted by a DDoS attack." more