/ Most Viewed

Microsoft Reveals Gen 4 Modular Data Center Strategy, Calls it Most Revolutionary in 30 Years

In a blog post today, Microsoft has provided details of its Generation 4 Modular Data Center plan, which the company believes to be the foundation for its cloud data center infrastructure in the next five years. Michael Manos, Microsoft's General Manager of Global Foundation Services, responsible for the global data center design writes: "We believe it is one of the most revolutionary changes to happen to data centers in the last 30 years..." more

Survey Indicates Fair Demand for Brand Based Top-Level Domains

Kevin Murphy reporting in DomainIncite.com: "Almost half of trademark-conscious companies are considering a '.brand' top-level domain, according to a survey carried out by World Trademark Review magazine. The survey also found that there is much more interest in new TLDs among marketing folk than lawyers, which is perhaps not surprising. So far, only a few potential .brand applicants have been revealed..." more

When It Comes to gTLDs, Follow the Money (Part 2)

In my previous article I showed that ICANN expects to recover a lot of money from the first round of applications for new generic Top-Level Domains (gTLDs) -- $92.5 million, to be exact -- and that even that dramatic figure is probably substantially underestimated. For that reason, I argued that ICANN probably will recoup a windfall from the first round of gTLD applications and pointed out that ICANN's promise to consult with the Internet community before spending such a windfall is unsatisfactory because it has failed to say beforehand what surplus revenues might be spent for. more

The State of RPKI as We Enter 2022

Resource Public Key Infrastructure (RPKI) is a method to secure internet routing traffic by cryptographically verifying routes. As we begin 2022, we look back at 2021 and see how the year saw another significant step towards its adoption. High-profile issues with the old trust-based model of Border Gateway Protocol, designed several decades ago, have shown the continued importance of protecting popular networks from mistakes or hackers. more

Computer Transactions, Not People, Are Driving the Need for All-Fibre Networks

Ever since we first became involved in developing policies and strategies for countries relating to what are now known as national broadband networks, we have argued that those taking part in the strategic decision-making processes of designing these networks should look, not at what broadband can do now, but at what high-speed broadband can do to assist countries to create the best opportunities for future developments. more

In Which We Consider the Meaning of ‘Authorized’: GIVAUDAN FRAGRANCES CORPORATION v. Krivda

What does authorized access mean? If an employee with authorized access to a computer system goes into that system, downloads company secrets, and hands that information over to the company's competitor, did that alleged misappropriation of company information constitute unauthorized access? This is no small question. If the access is unauthorized, the employee potentially violated the Computer Fraud and Abuse Act (CFAA) (the CFAA contains both criminal and civil causes of action). But courts get uncomfortable here. more

Internet Access and the Missing Institutional Design

It's Friday, a day to tie some threads together. There were three announcements/events this week that are connected in a non-obvious way... These three elements go together in creating a picture of US policy towards Internet access at the beginning of 2008. Rather than seeing the Internet as an engine for economic growth, creativity, innovation, and new jobs -- and as the converged communications medium for the next generation -- current policy is to wait for private companies to decide when investment in access makes sense for them. Those private companies have plenty of incentives to shape access to suit their own business plans. more

Cast Your .vote for the Most Interesting New gTLD Development in Q4

2020 has been extremely eventful, so it follows that the domain industry has continued to experience perpetual change, progress and uncertainty in the last three months of the year. In our Q4 New gTLD Quarterly Report, MarkMonitor experts analyze topical registration activity, launch information, .brand growth and DNS abuse, and share a list of upcoming industry meetings for 2021. more

Back to the Future for Broadband in America

With countries like Australia and New Zealand implementing infrastructure that can deliver 100Mb/s for their next generation broadband -- and with most Europeans not too far behind this -- it is quite shocking to see that the $7.2 billion economic stimulus package in the USA (under the RUS Broadband Initiatives Program (BIP) and the NTIA Broadband Technology Opportunities Program (BTOP)) requires nothing more than 768 kilobits per second (kb/s) downstream and 200 kb/s upstream. more

Hackers in Possession of Over 312K Files, 516GB Financial Data of Some of World’s Largest Companies

A report broke today revealing hackers have successfully breached a German internet infrastructure firm that provides services to several large companies, including Ericsson, Leica, Toshiba, UniCredit, British Telecom, Hugo Boss, NH Hotel Group, Oracle, Airbus, Porsche, and Volkswagen. more

Thumb on the Scales

Does the ICANN Board putting its thumb on the scale, change the status quo assumption of a Policy Development Process (PDP)? The primary assumption of most PDPs is that, in the absence of consensus for change, the status quo remains. Otherwise, Policy would be made by fiat by the PDP's Chair or Co-Chairs and there would be a mad rush to occupy those unpaid, thankless positions. more

Call for Participation: Registration Operations Workshop at IETF-92

The next Registration Operations Workshop will take place at the start of IETF-92 on Sunday, March 22, 2015, at The Fairmont Dallas Hotel. The workshop will start at 12:30 p.m. CDT and will finish at 4:30 p.m. CDT. We are seeking proposals for Extensible Provisioning Protocol (EPP) extensions to be featured as part of the workshop, including existing extensions that people wish to register with the Internet Assigned Numbers Authority (IANA)... more

Time to Look Past ‘Net Neutrality’. Let’s Start a Fresh Post-Neutrality Debate…

Yesterday, as many of you heard, the European Parliament voted to reject the 'net neutrality' fundamentalist amendments to the already flawed proposals they had helped to create. That's the good news. The bad news is that the law that we now have is merely ludicrous, rather than insane. Furthermore, it doesn't properly protect end users, hold ISP feet to the service delivery fire, or truly encourage broadband ecosystem innovation. more

Microsoft’s Datacenter in Wyoming Powered Entirely by Wind Energy

Microsoft has announced the purchase of its largest wind energy to date -- 237 megawatts of wind energy -- which will in turn allow its datacenter in Cheyenne, Wyoming to be powered entirely by wind power. more

Why I Wrote ‘Thinking Security’

I have a new book out, Thinking Security: Stopping Next Year's Hackers. There are lots of security books out there today; why did I think another was needed? Two wellsprings nourished my muse. (The desire for that sort of poetic imagery was not among them.) The first was a deep-rooted dissatisfaction with common security advice. This common "wisdom" -- I use the word advisedly -- often seemed to be outdated. Yes, it was the distillation of years of conventional wisdom, but that was precisely the problem: the world has changed; the advice hasn't. more