/ Most Viewed

China Issues New Rule Requiring Licence for People Live-Streaming News, Entertainment Content

China's most powerful internet regulator has formally set controls over the country's thriving online broadcasting sector, requiring people live-streaming news and entertainment content to have a licence, among other rules," Zhuang Pinghui reporting today in South China Moring Post. more

In AI, We Trust!?

When it comes to Artificial Intelligence (AI), there is a widespread fear that AI machines will "take over" and dominate humanity. Today, we should be concerned when governments and digital corporations use AI to replace trust as the fundamental value and principle in the digital domain. more

Stop Propagating False Information About the .ORG Transaction

We were disappointed to see The Pittsburgh Post-Gazette publish a recent editorial on February 13 about the sale of Public Interest Registry (PIR, the company that operates .ORG) that propagates false information about the transaction, including runaway prices, censorship and lack of experience. Runaway prices? Ethos Capital and PIR have committed to capping price increases to no more than ten percent per year on average. more

VeriSign Announces Increase in .com and .net Domain Name Fees

VeriSign today announced that effective July 1, 2010 there will be an increase in registry domain name fees for .com and .net, per its agreements with ICANN. According the press release, the registry fee for .com domain names will increase from $6.86 to $7.34 and the registry fee for .net domain names will increase, from $4.23 to $4.65. more

The 3 Keys to Unlock Your Operational Performance

Like any business, service providers must constantly evaluate the success of their operations. For implementations and installments, this is usually done by setting a strategic objective and then measuring progress made towards completion. But for operational teams, success is often measured by the repeated achievement of daily goals aligned to corporate objectives. Setting these benchmarks and collecting this data is accomplished by frequently running key performance indicators (KPIs). more

Google Data on State of Web Security

As part of its Transparency Report, Google recently released large amount of data related to unsafe websites. Google groups unsafe websites into two main categories: Malware and Phishing sites. more

Google to Distrust Symantec-Issued Certificates Amid Misuse

In a post on a developers’ forum, software engineer on the Google Chrome team Ryan Sleevi has announced Google’s plan to start gradually distrust all existing Symantec-issued certificates. more

Internet Society: ITU-T Failure to Adhere to Its Own Agreements With Respect to MPLS

Today, the ITU-T Study Group 15 determined a Recommendation that defines Y.1731 based operations, administration and management (OAM) for MPLS transport networks. This decision sets the stage for a divergence in MPLS development; it creates a situation where some vendors will use the IETF standard for MPLS OAM while other vendors implement the ITU-T Recommendation for OAM. This situation ensures that the two product groups will not work together. more

Facing the Future of ICANN’s Volunteer Recruitment

The musings of one volunteer summarize the problem: "As a newcomer to ICANN, I was always frustrated by the fact that I could never get a straight answer to the question 'How much time does it take?' There was always an awkward silence, a vaguely worded response. Now, years later, I know that no one in their right mind would sign up knowingly for the long hours and late shifts required to be a full participant in this game. It is a groundbreaking project that really matters. But you will get a lot more recognition and immediate satisfaction for volunteering far fewer hours at your local food bank." more

Am I Safer Within an Organization or by Myself?

An Internet Bill of Rights may or may not be a good idea. The point here is that, besides highly commendable topics such as net neutrality and privacy, some of them seem to mandate cybersecurity. Approved in Brazil last May, the Marco Civil includes the principle of preservation of stability, security and functionality of the network, via technical measures consistent with international standards.  more

TAS Outage Shows Tech Errors Can Happen in Any Organization

Last week, the Internet Corporation for Assigned Names and Numbers (ICANN) was forced to extend the deadline for the new gTLD application to April 20th, after the application system crashed and the technical issue which enabled some applicants to see file names and user names that belonged to other applicants. ... ICANN's decision to extend the deadline is reasonable in the circumstances. more

Market Flatlines After ICANN Introduces New gTLDs

The choices for consumers and business in Europe to get themselves online have never been so great. Social media, apps and blogsites all have made a lasting impression, and we are now in an increasingly crowded market with the addition of hundreds of new gTLDs. So how has all this affected growth and market shares among domain names in Europe? more

Why Mid-Sized Businesses That Embrace the Cloud See Improved Revenues

According to a recent study from IBM, mid-sized businesses that embrace cloud technology see nearly double the revenue and increased profit growth compared to their more hesitant peers. The study, which included 800 leading global IT professionals, found that the 20% of organizations that had committed more resources to the cloud were reaping significant cost-cutting advantages and improved levels of efficiency. more

The Domain Name System: A Cryptographer’s Perspective

As one of the earliest protocols in the internet, the DNS emerged in an era in which today's global network was still an experiment. Security was not a primary consideration then, and the design of the DNS, like other parts of the internet of the day, did not have cryptography built in. Today, cryptography is part of almost every protocol, including the DNS. And from a cryptographer's perspective, as I described in my talk at last year's International Cryptographic Module Conference (ICMC20), there's so much more to the story than just encryption. more

Google Set to Survive in Oz, but Far Bigger Threats Are on the Way

The signs are that the Australian Government and Google are close to a compromise. The Government's main demands stay in place, but some of the details will be changed. This allows the Government to claim victory, while the damage to Google will be limited... Publishers will, in one way, or another be paid for news, either through a payment based on the value of the news and the value of the Google search facility. more