/ Most Viewed

WiMAX Will Be Successful, as a Fringe Technology

A recent Infonetics press release says "WiMAX has gained such momentum across so many regions that it is no longer sensible to suggest that WiMAX growth will be flattened by the emergence of LTE [Long Term Evolution] in the next few years." Probably true, but it's also clear WiMAX will never reach the scale of either mainstream wireless family, i.e., WiFi or GSM/3GSM. By comparison with these giants, WiMAX will be a fringe operation. The critical issue is volume, and what counts is the wireless technology brand, not the technology itself. more

Interconnection Disputes Are Network Neutrality Issues (of Netflix, Comcast, and the FCC)

A lot of people have been talking about the "interconnection" deal between Comcast and Netflix and whether that deal is related to network neutrality. (It is.) This question comes partly because the FCC's 2010 Open Internet Order (also known as the network neutrality order) was recently struck down. So network neutrality lands back at the FCC, with a new Open Internet proceeding, at the same time Netflix starts working so poorly on Comcast that Netflix had to cut a special deal with Comcast. more

Google’s Secret Strategy With the Kansas City Fiber Project

I have long been perplexed at how Google plans to make a profit with their Kansas City Fiber project. Originally the project was touted as an altruistic move by Google to really understand the underlying costs of deploying fiber in a large municipality. But as anyone who has been in the trenches can tell you, it is not the technology that determines the cost of a fiber deployment, but the tyranny of the take-up. more

Is ICANN’s .IR Response at Odds with the ACPA and ICE Domain Seizures?

An initial review of ICANN's response to litigation seeking it to turn over control of the ccTLDs of Iran, Syria and North Korea led to the conclusion that it had opened a "legal can of worms". A few more just wriggled out, and they threaten the basic assumption that underlies the U.S. statute governing cybersquatting and the practices engaged in by Federal officials seizing domain names engaged in intellectual property infringement. more

Please, Keep the Core Neutral

Many in the technical community attribute the rapid growth and spread of the Internet to innovation that took place at the "edge" of the network, while its "core" was left largely application neutral to provide a universal and predictable building block for innovation. It is this core neutrality that provides a basis for the security and stability of the Internet as a whole. And it is this same core neutrality that is critical to the continued spread of the Internet across the Digital Divide. Unfortunately, when the politics of censorship rather than solely technical concerns drive the coordination of these "core" Internet resources, it threatens the future security and stability of the Internet. This paper proposes a paradigm upon which all the governments of the world have equal access to these core Internet resources to empower them and their citizens with the rights acknowledged in the WSIS Declaration of Principles. more

ICANN New gTLD Program SWOT Analysis: STRENGTHS (Part 1)

The SWOT analysis (alternatively SWOT Matrix) is a structured planning method used to evaluate the Strengths, Weaknesses, Opportunities, and Threats involved in a project or in a business venture. The following is an attempt to apply the SWOT Analysis to ICANN's new gTLD program. more

WSIS Deal: Oversight

The UN Secretary-General has been invited to "convene a new forum for multi-stakeholder policy dialogue." Everyone can see his/her hearts' desires in the WSIS deal: ICANN can believe that it has survived for another day; governments can believe that they will have "an equal role and responsibility for international Internet governance"; and there will be an enormous meeting in Greece by the second quarter of 2006 to start the Internet Governance Forum going. more

Deep Sea Diving: The State of Submarine Cable Technology

There is something quite compelling about engineering a piece of state-of-the-art technology that is intended to be dropped off a boat and then operate flawlessly for the next twenty-five years or more in the silent depths of the world's oceans! It brings together advanced physics, marine technology, and engineering to create some truly amazing pieces of networking infrastructure. more

WHOIS Users Facing Serious Challenges Caused by Post-GDPR Fragmentation

On May 25, 2018, the European General Data Protection Regulation (GDPR) came into effect, meaning that European data protection authorities (DPAs) can begin enforcing the regulation against non-compliant parties. In preparation, the ICANN Board passed a Temporary Specification for gTLD Registration Data - essentially a temporary policy amendment to its registrar and registry contracts to facilitate GDPR compliance while also preserving certain aspects of the WHOIS system of domain name registration data. more

Who Contacts Whom: A Material Factor in Selling Domain Names Corresponding to Trademarks

Acquiring domain names for the purpose of selling them to complainants is the second most heavily invoked of the four circumstances that are evidence of abusive registration. Because no self-respecting domain name reseller will ever admit to acquiring domain names "primarily for the purpose" of selling them to complainants "for valuable consideration in excess of [their] documented out-of-pocket costs directly related to the domain name" evidence of bad faith is typically deduced by other factors. more

Google Received 65.9 Million Take Down Requests Last Month, Company Reports

As part of its transparency report, Google says Copyright removal requests continue to be on steady rise and that the company received a new record 65,923,523 requests just last month. more

How to Avoid Insider Threats Such as the Latest New York Post Hacking

New York Post has been "hacked" by an employee. To protect themselves from insider threats, companies can deploy zero trust and restrict access. On October 27, the New York Post published a string of racist and sexist articles on its website. Fabricated news about politicians, such as pieces concerning racist comments of a New York City mayor, has been headlining the publication. more

Thomson Reuters in Definitive Agreement to Sell Intellectual Property Unit Including MarkMonitor

The portfolio includes Web of Science, Thomson CompuMark, Thomson Innovation, MarkMonitor, Thomson Reuters Cortellis and Thomson IP Manager. more

We Must Keep Track of How Countries Will Confront Cybercrime in a New UN Convention

As a designated committee of experts prepares to draft a new treaty to combat the use of information and communications technologies in cybercrime at the UN in January 2022, it is paramount that other stakeholders oversee these discussions to avoid violating human rights on the Internet. This initiative was kickstarted by a 2019 resolution led by Russia and endorsed by other countries considered by many to behavior controversially on cybersecurity matters, such as China, Venezuela, Cambodia, North Korea, and others. more

More on Broadband Router Insecurity and Being Proactive

Fergie replied on NANOG to my recent post on the subject of broadband routers insecurity: "I'll even go a step further, and say that if ISPs keep punting on the whole botnet issue, and continue to think of themselves as 'common carriers' in some sense -- and continue to disengage on the issue -- then you may eventually forced to address those issues at some point in the not-so-distant future..." He is right, but I have a comment I felt it was important - to me - to make. Not just on this particular vulnerability, but on the "war"... more