Imagine living in a country where it was necessary to register with your community government by providing a copy of one of the following... This may be necessary in perhaps a large number of nations. However, as a United States citizen and resident, I was quite surprised when my local community issued the request. I investigated and found much to my dismay, that my community in fact was required by regulation to survey its residents on a biennial basis. more
With the explosion in mobile broadband, every mobile operator is scrambling to secure the spectrum capacity needed to stay ahead in the market. There is no doubt that spectrum management is one of the most critical elements of telecommunications policy. It is seen as the pathway to 21C infrastructure... It is interesting to see how the different countries handle their spectrum management policies. more
I kept wondering if all that I had said about Dr Toure was fair -- I hadn't met him before and had written so much to comment on the transcript of his speech at ICANN, Cairo . My discomfort was short-lived and even before a month elapsed I met him at the Internet Governance Forum, Hyderabad. Exchanged pleasantries before saying "I wrote some strong comments about your speech at Cairo". Dr Toure looked happy to see me, beamed with a bit of surprise and said he read my comment... more
On March 1, I wrote that a small number of SpaceX Starlink terminals had arrived in Ukraine, and they would be an important asset for distribution to selected government and resistance leaders and journalists. I didn't know who would get the terminals or how many there were, but it was a single truckload. A week or so later, we learned that two more shipments of terminals had arrived and fifty of them went to DTEK, a company struggling to repair Ukrainian electrical infrastructure. more
The Internet Association -- lobbying organization for Internet giants like Google, Amazon and Netflix -- is adamant that it is necessary to apply of 1935 phone regulation (Title 2) to the Internet to assure that there are no premium "fast lanes", that all bits are treated equally, that Internet access providers (ISPs) do not prioritize their own content over content from competitors. more
Approximately 3.1 million domain names were registered in the third quarter of 2015, bringing the total number of registered domain names close to 299 million worldwide across all top-level domains (TLDs) as of Sept. 30, 2015, according to the latest Domain Name Industry Brief by Verisign. more
As I'm sure you've heard by now, June 8, 2011 is World IPv6 Day. On that day, several major content providers will turn on IPv6 on their public-facing services for a 24-hour period and see what happens. For some time, there's been concern that turning on IPv6 on a web site's main URL would cause unacceptable levels of breakage. Nevertheless, forward-looking organizations realized that they needed to start deploying IPv6. more
Are you interested in sharing lessons you've learned in deploying DNSSEC or DANE with the wider community? Have you performed new measurements related to DNSSEC deployment that you want to share publicly? Do you have a new tool or service that you think people in the DNSSEC community would find interesting? Are you seeking feedback on some ideas you have to make DNSSEC better or easier to deploy? more
Google today announced an initiative called "Project Shield", aimed at using its infrastructure to protect free expression online. "The service currently combines Google's DDoS mitigation technologies and Page Speed Service (PSS), which allow websites to serve their content through Google to be better protected from DDoS attacks." Google is currently seeking "trusted testers" and people with sites that serve media, elections and human rights-related content. more
In the USA an interesting initiative has been taken by a number of leaders in the telco industry who are frustrated with the inability of the country to start building the high-speed broadband infrastructure that is needed for the development of its digital economy. While the Obama Administration has the right vision to make this happen - and the American National Broadband Plan is a good example of this - the dysfunctional political state of the country makes it impossible to establish the industry transformation needed to make this happen. more
Phishing is when bad guys try to impersonate a trusted organization, so they can steal your credentials. Typically they'll send you a fake e-mail that appears to be from a bank, with a link to a fake website that also looks like the bank. Malware offers another more insidious way to steal your credentials, by running unwanted code on your computer... I like VeriSign's characterization of this kind of malware as an insecure endpoint, the PC which is the endpoint of the conversation with the bank isn't actually under the control of the person who's using it. more
The sunrise period for Google Registry's .app new gTLD closed today with possibly the biggest sunrise of the 2012 round to date. more
Historically there has been nothing which gets Microsoft's attention as fast as a platform for applications which threatens Windows dominance. Google's Chrome is obviously such a platform; Google can afford to challenge Microsoft; it's healthy for innovation that it does. Can Microsoft still rise to the challenge? Way back when I was at Microsoft -- 1991 to 1994, Lotus Notes was the threat du jour... Since I was responsible for the development of what was to become Microsoft Exchange, I was in charge of that war for a while... more
It's often observed that the Internet was a direct outcome of the progressive liberalization of national telecommunications markets in the late twentieth century. This allowed the entry of a wave of Internet entrepreneurs into various national telecommunications markets that were historically dominated by incumbent telephone monopolies. The resultant transformation of telecommunications over the past two decades is as much a testament to the transformational power of open markets as it is to the prodigious ability of the Internet's technology base to service the ever increasing demands being made of it. more
The global deployment of Domain Name System Security Extensions (DNSSEC) is charging ahead. With ICANN 38 Brussels just around the corner, DNSSEC deployment will inevitably be the hot topic of discussion over the next few days. Case in point, today, ICANN hosted the first production key ceremony at a secure facility in Culpepper, Va. where the first cryptographic digital key was used to secure the Internet root zone. The ceremony's goal was simple: for the global Internet community to trust that the procedures involved with DNSSEC are executed correctly and that the private key materials are stored securely. more