In a blog post today, Microsoft has provided details of its Generation 4 Modular Data Center plan, which the company believes to be the foundation for its cloud data center infrastructure in the next five years. Michael Manos, Microsoft's General Manager of Global Foundation Services, responsible for the global data center design writes: "We believe it is one of the most revolutionary changes to happen to data centers in the last 30 years..." more
Kevin Murphy reporting in DomainIncite.com: "Almost half of trademark-conscious companies are considering a '.brand' top-level domain, according to a survey carried out by World Trademark Review magazine. The survey also found that there is much more interest in new TLDs among marketing folk than lawyers, which is perhaps not surprising. So far, only a few potential .brand applicants have been revealed..." more
In my previous article I showed that ICANN expects to recover a lot of money from the first round of applications for new generic Top-Level Domains (gTLDs) -- $92.5 million, to be exact -- and that even that dramatic figure is probably substantially underestimated. For that reason, I argued that ICANN probably will recoup a windfall from the first round of gTLD applications and pointed out that ICANN's promise to consult with the Internet community before spending such a windfall is unsatisfactory because it has failed to say beforehand what surplus revenues might be spent for. more
Resource Public Key Infrastructure (RPKI) is a method to secure internet routing traffic by cryptographically verifying routes. As we begin 2022, we look back at 2021 and see how the year saw another significant step towards its adoption. High-profile issues with the old trust-based model of Border Gateway Protocol, designed several decades ago, have shown the continued importance of protecting popular networks from mistakes or hackers. more
Ever since we first became involved in developing policies and strategies for countries relating to what are now known as national broadband networks, we have argued that those taking part in the strategic decision-making processes of designing these networks should look, not at what broadband can do now, but at what high-speed broadband can do to assist countries to create the best opportunities for future developments. more
What does authorized access mean? If an employee with authorized access to a computer system goes into that system, downloads company secrets, and hands that information over to the company's competitor, did that alleged misappropriation of company information constitute unauthorized access? This is no small question. If the access is unauthorized, the employee potentially violated the Computer Fraud and Abuse Act (CFAA) (the CFAA contains both criminal and civil causes of action). But courts get uncomfortable here. more
It's Friday, a day to tie some threads together. There were three announcements/events this week that are connected in a non-obvious way... These three elements go together in creating a picture of US policy towards Internet access at the beginning of 2008. Rather than seeing the Internet as an engine for economic growth, creativity, innovation, and new jobs -- and as the converged communications medium for the next generation -- current policy is to wait for private companies to decide when investment in access makes sense for them. Those private companies have plenty of incentives to shape access to suit their own business plans. more
2020 has been extremely eventful, so it follows that the domain industry has continued to experience perpetual change, progress and uncertainty in the last three months of the year. In our Q4 New gTLD Quarterly Report, MarkMonitor experts analyze topical registration activity, launch information, .brand growth and DNS abuse, and share a list of upcoming industry meetings for 2021. more
With countries like Australia and New Zealand implementing infrastructure that can deliver 100Mb/s for their next generation broadband -- and with most Europeans not too far behind this -- it is quite shocking to see that the $7.2 billion economic stimulus package in the USA (under the RUS Broadband Initiatives Program (BIP) and the NTIA Broadband Technology Opportunities Program (BTOP)) requires nothing more than 768 kilobits per second (kb/s) downstream and 200 kb/s upstream. more
A report broke today revealing hackers have successfully breached a German internet infrastructure firm that provides services to several large companies, including Ericsson, Leica, Toshiba, UniCredit, British Telecom, Hugo Boss, NH Hotel Group, Oracle, Airbus, Porsche, and Volkswagen. more
Does the ICANN Board putting its thumb on the scale, change the status quo assumption of a Policy Development Process (PDP)? The primary assumption of most PDPs is that, in the absence of consensus for change, the status quo remains. Otherwise, Policy would be made by fiat by the PDP's Chair or Co-Chairs and there would be a mad rush to occupy those unpaid, thankless positions. more
The next Registration Operations Workshop will take place at the start of IETF-92 on Sunday, March 22, 2015, at The Fairmont Dallas Hotel. The workshop will start at 12:30 p.m. CDT and will finish at 4:30 p.m. CDT. We are seeking proposals for Extensible Provisioning Protocol (EPP) extensions to be featured as part of the workshop, including existing extensions that people wish to register with the Internet Assigned Numbers Authority (IANA)... more
Yesterday, as many of you heard, the European Parliament voted to reject the 'net neutrality' fundamentalist amendments to the already flawed proposals they had helped to create. That's the good news. The bad news is that the law that we now have is merely ludicrous, rather than insane. Furthermore, it doesn't properly protect end users, hold ISP feet to the service delivery fire, or truly encourage broadband ecosystem innovation. more
Microsoft has announced the purchase of its largest wind energy to date -- 237 megawatts of wind energy -- which will in turn allow its datacenter in Cheyenne, Wyoming to be powered entirely by wind power. more
I have a new book out, Thinking Security: Stopping Next Year's Hackers. There are lots of security books out there today; why did I think another was needed? Two wellsprings nourished my muse. (The desire for that sort of poetic imagery was not among them.) The first was a deep-rooted dissatisfaction with common security advice. This common "wisdom" -- I use the word advisedly -- often seemed to be outdated. Yes, it was the distillation of years of conventional wisdom, but that was precisely the problem: the world has changed; the advice hasn't. more