Many of us are familiar with network effects within telecommunications. Fundamentally, the notion is that as the number of participants in a network increases, the value of that network increases superlinearly. Though many different theories exist about how best to value these networks, the general idea is that the more people on a network, the more benefits accrue to everyone on the network... more
The Shimkus Amendment to the $601 billion National Defense Authorization Act (HR 4435) passed the House of Representatives on May 22nd by a mostly partisan vote of 245–177. While all 228 Republicans present and voting supported the amendment only 17 Democrats voted "aye", with 177 in opposition. Final passage on the entire bill was a bipartisan vote of 325–98. The Senate has not yet passed its version of a FY 2015 Pentagon funding bill, and once it does all the differences between the two versions must be reconciled before it can be sent to President Obama for his signature. more
The international press is alight with reports of various countries considering privacy and anti-spam legislation. It appears that many countries have arrived at the logical conclusion that after years of supposed 'self regulation'; some marketers must be brought to heel by way of regulation and law, to stop abusive practices. more
In one of the email conversations with my expert colleagues from around the globe, an interesting article was discussed written by Bruce Scheier in Wired: When it comes to security, we're back to feudalism. An interesting aspect of the discussion was the conclusion that Google's and Facebook's consumers are not their customers. The distinction is important, because consumers are the product being sold to their actual customers who are their advertisers. more
Really ICANN? The Trademark Clearinghouse provides unprecedented protection. According to your recent announcement it does. Do tell, ICANN -- in what way does the Trademark Clearinghouse protect anything? more
Congratulations on your appointment as the next CEO of ICANN, and welcome to our little rogues' gallery. Some denizens of this domain (your humble author included) may strike you as a little odd at first, but we're mostly harmless. We usually steer first-timers onto the Newcomers track, but in your case, that may be... inadequate. And while we would never presume to tell you how to do your job -- which may be one of the world's hardest - we thought we might offer a few pieces of friendly advice, based on our time here. more
Earlier this month, Avaya held a new type of customer event in Toronto, called Evolutions. They have been looking for better ways to bring customers together, so aside from their global event, they've put together Evolutions, which has a regional focus. The first one was recently held in Mexico to great success, and my understanding is that Canada was the next trial event, and that's what I attended in downtown Toronto... I'm almost certain I was the only Canadian analyst invited, so this may well be the only place you'll hear about Evolutions. more
Proposals to enhance online property protection have received a lot of attention lately. Brand managers, goods manufacturers, and content distributors strenuously argue that current law enforcement mechanisms are inadequate to meet the challenges of today's fast-paced marketplace. They specifically note that foreign-based "rogue websites" continue to distribute unlicensed products and content despite existing rules; they maintain that new legislation is needed to empower intellectual rights holders to counter such cyber-criminals more effectively. more
The Wall Street Journal has an interview with the outgoing head of the FBI's cyber crime investigation Shawn Henry. In it, he has a blunt assessment of the US's capabilities when it comes to combatting online crime, especially data theft and hacking... The more I read around the Internet, the more clear it's becoming at how cyber security is becoming a central focus. This has pretty big implications for the cloud. more
We are at the height of vacation season here in the Netherlands, and the RIPE NCC headquarters in Amsterdam are quieter than usual. The downtime has given me a chance to reflect on how the recent economic downturn has affected our membership growth. The good news is that it hasn't. more
As the fall of 2012 begins the implementation of rights protection mechanisms (RPMs) for new gTLDs is reaching a critical stage... Given the half year interval between the upcoming Toronto ICANN meeting and the following Beijing meeting in April 2013, it is highly desirable, and perhaps essential, that community discussion in Toronto result in a clear consensus on how RPM implementation should proceed if new gTLDs are to launch without further delay and if potential registrants are to perceive them as acceptable platforms for speech and commerce. more
Ukrainian authorities have arrested a 28-year-old man in Khmelnytskyi for running an illicit virtual private network (VPN) service that enabled access to the Russian segment of the internet, known as Runet. more
Carlos Slim of Telmex tells me the world is about to change. "Two billion more people will connect to the Internet when smartphones cost $50. The phone makers are promising me a $50 phone in 2014." If Spreadtrum and Firefox deliver a $25 smartphone, as promised, that could accelerate takeover. ~310,000,000 Africans will be connected to the Internet in 2017, Arielle Sumits of Cisco predicts... It's inevitable that the U.S. will be dwarfed by the rest of the world. more
The Internet Routing Registry (IRR) is a globally distributed routing information database. The IRR consists of several databases run by various organisations in which network operators can publish their routing policies and their routing announcements in a way that allows other network operators to make use of the data. In addition to making Internet topology visible, the IRR is used by network operators to look up peering agreements, determine optimal policies and, more recently, to configure their routers. more
The weighing of evidence involves the connecting of dots, which involves drawing inferences. However, just as there can be false positives, there can be false inferences. The tendency may be to think of inferences as coming in one size, but not all inferences are logically correct. Some are weak and others strong. The reason for talking about both kinds is that so much depends on the quality of their making. more