/ Most Viewed

Threats to Internet Oversight Mount as Key Protection Expires

Before the US Government abdicates its oversight of the Internet Corporation for Assigned Names and Numbers (ICANN) it should take a long, hard look at the mounting efforts by world governments to assume greater power over the Internet's addressing system. If those efforts meet no further resistance, the once-theoretical threat of "capture" could become a reality. At the end of September, the Joint Project Agreement (JPA) between ICANN and the US Government is set to expire. The JPA is part of a decade-long agreement where the US transitions control of Internet addressing to ICANN. more

European Commission on the Future of the Internet

The European Commission has just published a communication which describes the broad lines of its Internet policy in the coming years. Vint Cerf, on the Google Public Policy blog sees this as a very interesting vision. Indeed, it closely links the issue of openness of the Internet to several obvious and not-so-obvious factors. more

The Digital Decade – A Look Back

With 2019 coming to a close, we're not just saying goodbye to the past 365 days, we're also saying goodbye to an entire decade. As we bid farewell to the 2010s, we're taking this opportunity to look back and reflect on the digital decade as well as consider what the future might have in store for us all. The past ten years were a whirlwind of change, with new advances in technology exploding onto the market at a faster pace than ever before. more

BITAG Outlines Steps to Dramatically Improve the Security and Privacy of IoT Devices

Broadband Internet Technical Advisory Group (BITAG) today released a report outlining a set of guidelines it believes could dramatically improve the security and privacy of IoT devices and minimize the costs associated with the collateral damage that would otherwise affect both end users and ISPs. more

Thinking Carefully About New gTLD Objections: Legal Rights (4 of 4)

This last article on the four new gTLD objections will look at the Legal Rights Objection ("LRO"). While other articles in this series have touched on trademark concepts at certain points, issues from that area of the law predominate in LRO. Here we review the pertinent LRO-related trademark concepts, with which many readers likely will have some familiarity from working with domains and the UDRP. Still, the theme of the first three articles applies here: Potential objections are more involved and complicated than they may seem, and require careful thought if they are to be made. more

Green Dam is Breached… Now What?

As a number of China hands predicted, the Chinese government has postponed its mandate requiring that all computers sold in China must include the Green Dam -Youth Escort censorware by today. Yesterday after the news broke I told the Financial Times: "There's been this impression in the internet industry that when the Chinese government makes a demand, they have to roll over and play dead. The lesson here is that's not necessarily the case." more

Cyber Crime: It’s All About Data (Part 1)

Cyber crime = crime. How do we make police forces understand this and how to get it prioritized? In this series of blogs I am looking into whether aggregating data can change the way cyber crime is approached and prioritized. At a seminar at the IT Security trade fair in Utrecht detective super intendant Charlie McMurdie, head of the cyber crime unit of the London Metropolitan police, said that cyber crime was recently prioritized by the UK government. She also said the following and I'm allowed to quote this... more

The Great Inevitable: From Broadband Internet to Cloud Application Access

Some inevitable changes are hard to see in prospect, yet are 'obvious' in retrospect. The next communications revolution is 'made for cloud' access. A colleague pointed me to a Forbes article "For Today's Telecoms Companies, Customer Experience Is Just As Important As Download Speeds". It was written by Huawei's global president of assurance and managed services. Well, I told you so! more

Global Payments Breach Confirmation

This morning, Global Payments held a conference call with investors and analysts covering their earlier breach announcement and projected earnings. Global Payments had also released an update advisory yesterday stating that "the company believes that the affected portion of its processing system is confined to North America and less than 1,500,000 card numbers have been exported" and that only Track 2 card data may have been stolen. more

Sprint’s Big Deal: New Life for WiMax

The Wall Street Journal is reporting the terms of a yet unannounced deal which will finance a massive rollout of WiMax by a Sprint-Clearwire joint venture. Outside funding is to be provided by Intel, Google, Comcast, and Time Warner Cable as well as Bright House, a small cable company. Assuming the deal is for real, this is good news for US users of broadband and, indirectly, other users around the world. more

CAN SPAM Applies Even Within a Single Provider

I recently came across a copy of a ruling in the bizarre case of MySpace vs. theglobe.com. Theglobe.com was the ultimate dot.com bubble company. It started up here in Ithaca, and went public at the peak of dot.com hysteria with one of the the greatest one-day price runups ever. Since then they bought and sold a variety of busineses, none of which ever made any money, including the Voiceglo VoIP service which appears to be what the spam was promoting. more

Don’t Fall for This Domain Name ‘Expiration’ Scam

If, like me and my clients, you ever receive an email about a domain name expiration, proceed with great suspicion -- because many of these "notices" are a sham. They're designed to sell you services you don't need or to trick you into transferring your domain name to another registrar. Usually, the emails can safely be ignored. Here's an example: As shown, an important-looking email from "Domain Service" refers to a specific domain name in the subject line. more

Telegeography’s Submarine Cable Map Now Lets You Link to Specific Cables or Landing Points

Want to easily show people where a specific submarine cable goes? Or what cables terminate in a particular location? Last year I wrote about Telegeography's cool interactive submarine cable map and how useful it is to understand the submarine cable side of Internet infrastructure. In that article I mentioned how great it would be if you could get a link for a particular cable or location that you could pass along to other people. more

The Central IPv4 Pool is Gone

Yesterday, the Asia-Pacific registry got the last two blocks in the central IPv4 pool. The IANA has been sitting on five /8s (one per regional registry), and these will be handed out (along with the fragments from the legacy class B space), one to each registry. The IANA IPv4 registry doesn't yet reflect this. more

A Modest Proposal for ICANN

When it comes to accountability, ICANN would rather be compared to other U.S. nonprofit companies than to the regulatory bodies it more closely resembles. If they truly wish to be treated like a nonprofit, rather than a regulator, there is a very simple solution: make all contributions strictly voluntary. more