/ Most Viewed

Facts & Tips for Consumers About the Epsilon Breach

There has been a lot of talk, blogging, tweeting and press reportage about the Epsilon breach, but little in the way of concrete information to consumers as to where they stand, if their personal information (PII) such as their name and email address has been lost to criminals. The CAUCE Board of Directors have developed the following FAQ that provides facts and guidance for those affected by the breach. more

The FttH Versus Cable Debate Misses the Point

I recently followed an interesting international discussion on FttH vs. cable. With the fiber to the home (FttH) debate hotting up, driven by the possibility of using FttH as the new infrastructure for the digital economy, the cable companies are putting up a stiff fight, both in Europe (Netherlands) and the USA, claiming FttH is not necessary, and that DOCSIS 3.0 can do the job just as well. In these debates the longer-term national interest is often disregarded. The debate is confined to the technology -- what it can and cannot do -- and it also concentrates on a rather short-term timeframe, say of the next five years. more

ICANN Says Registerfly Domains Moving to Another Registrar

In an entry in the ICANN blog, Paul Levins says they've arranged to move Registerfly's domains to another registrar. They won't say who the other registrar is beyond "an existing accredited Registrar with a demonstrated record of customer service" which could be just about anyone other than Registerfly. They have "most" of the registrant data. All is to be unveiled next week. In the meantime, read the comments on the blog... more

Can Large Language Models Use the Contents of Your Website?

Large Language Models (LLM) like GPT -- 4 and its front-end ChatGPT work by ingesting gigantic amounts of text from the Internet to train the model and then responding to prompts with text generated from those models. Depending on who you ask, this is either one step (or maybe no steps) from Artificial General Intelligence, or as Ted Chiang wrote in the New Yorker, ChatGPT Is a Blurry JPEG of the Web. more

Questions and No Answers to US Oversight transition, ICANN’s Role and Future of Internet Governance

Traditionally, the Internet Corporation for Assigned Names and Numbers (ICANN) coordinates the Internet Assigned Numbers Authority (IANA) functions, which are key technical services critical to the continued operations of the Domain Name System (DNS)... ICANN has also evolved in its structures to use the 'Multistakeholder Model' in the dissemination of some of its functions and this has seen the creation of working groups and constituencies. more

Communications Policy for 2006 and Beyond: VoIP as a Case in Point

In this article, published in the Federal Communications Law Journal (FCLJ), the authors (Reed E. Hundt and Gregory L. Rosston) have proposed sweeping changes to the current telecommunications regulatory regime. With impending reform in telecommunications laws, the authors argue that an important first step is the creation of a bipartisan, independent commission to examine and recommend implementation of more market-oriented communications policy. The following excerpt from the article looks into service competition with respect to VoIP... more

Wrap-up: ICANN 46 in Beijing

Earlier this April, the largest ICANN meeting ever -- more than 2,500 attendees -- kicked off in Beijing. Given the imminent addition of hundreds of "dot Brands" to the Internet, the topic of new gTLDs was at the top of the discussion list for all attendees. So far, well over 100 new gTLD applications have passed the Initial Evaluation stage, meaning they're on their way to becoming live domains. more

The Sysadmin’s Guide to Securing Your SaaS Apps

As an admin, app security should be a top priority - but SaaS apps represent a difficult challenge in that regard. How can you protect your business from their risks, while enjoying all their rewards? Within the average enterprise, there are 508 unique cloud applications in use. That number's overwhelming enough on its own without considering that 88% of those applications aren't enterprise ready, or the fact that one in five cloud applications has data sharing as a core functionality. more

Microsoft Announces $5 Billion Investment in IoT Over the Next Four Years

Microsoft will invest $5 billion in the Internet of Things over the next four years, said Julia White, Corporate Vice President, via a blog post today. more

Why Do We Accept $10 Security on $1,000,000 Data?

Last week we heard of yet another egregious security breach at an online provider, as crooks made off with the names, address, and birth dates of eBay users, along with encrypted passwords. They suggest you change your password, which is likely a good idea, and you better also change every other place you used the same password. But that's not much help since you can't change your name, address, and birth date, which are ever so handy for phishing and identity theft. more

Fiber to the Home: ‘Awesome’ - But What Is Its Purpose?

Two approaches can be taken towards the development of Fiber to the Home (FttH). One is all about its commercial potential - the sale of the most awesome commercial applications in relation to video entertainment, gaming and TV. The other is a perhaps more sophisticated approach - from the perspective of social and economic development. Of course the two are not mutually exclusive. more

Internet: Quo Vadis (Where are you going?)

Articles, blogs, and meetings about the internet of the future are filled with happy, positive words like "global", "uniform", and "open". The future internet is described in ways that seem as if taken from a late 1960's Utopian sci-fi novel: the internet is seen as overcoming petty rivalries between countries, dissolving social rank, equalizing wealth, and bringing universal justice. If that future is to be believed, the only obstacle standing between us and an Arcadian world of peace and harmony is that the internet does not yet reach everyone... more

Do “brandsucks.com” Names Really Have a “Destructive Potential”?

"'Sucks.com is the rightmost anchor of nearly 20,000 domains registered today. Two thousand domains have 'stinks.com' on the right and about the same number of domains begin with the term 'boycott'," write the authors of the recently released paper The Power of Internet Gripe Sites. According to their (interesting) study, 35% of the "brandsucks" domains are owned by the brand while 45% are available for registration. They thus advise brand owners "to take a serious look at the traffic that these names garner and the kind of unique marketing opportunity they can afford." ...I do not fully agree with their conclusions... more

Ending Cyber-Hubris

Hurricane Katrina will lead the endless finger pointing about what should have been done to strengthen the levees before the storm. However, as a former senior FEMA official under the Clinton Administration explained, "There's only two kinds of levees. Ones that have failed and those that will fail." The same is true for cyber-levees.  more

How the Growth of AI May Drive a Fundamental Step-Change in the Domain Name Landscape

As artificial intelligence reshapes how users navigate the web, domain names may undergo explosive growth, potentially reaching tens of billions. A new infrastructure of trusted digital identities could become essential for AI agents. more