/ Most Viewed

Pulling the Trump Card on Cloud and SDN

Software-Defined Networking (SDN) and Network Functions Virtualization (NFV) have been picking up the pace as of late. A high percentage of communication service providers and large data centers have either added these technologies on their roadmaps, or are already doing small-scale Proof-of-Concepts (PoC) in their testbed environments. more

Nov 25th Deadline To Nominate Technical Community Reps for IGF Multistakeholder Advisory Group (MAG)

Would you (or someone you know) be interested in representing the "technical community" on the Multistakeholder Advisory Group (MAG) of the Internet Governance Forum (IGF)? If so, the deadline to nominate someone (including yourself) is Monday, November 25, 2013. Under-Secretary-General Wu Hongbo of UNDESA has issued a statement on the Internet Governance Forum (IGF) Multistakeholder Advisory Group (MAG) renewal process for 2014 with the stated aim of rotating one third of the MAG members. more

ICANN TMCH: The Haunted Trademark Clearance House

When the fantasy of a universal trademark clearance house was floated in the name of protecting existing trademark owners by the opposing lobbies against the global domain name expansion, particularly the gTLD programs, the domain name industry and ICANN quickly accepted the idea. A universal trademark clearance house is perhaps a greatest idea but in reality a fantasy. Today, at ICANN, the best minds are teamed-up and struggling to get the TMHC (Trademark Clearance House) constructed. more

Europe to Deploy Commercial Clouds to Support Big Science

It is good to see Europe take an important leadership role in recognizing the critical contribution that commercial cloud providers can play in providing solutions for big science through their recent Helix Nebula -- the Science Cloud announcement. It is estimated that 1/3 of the science applications running on expensive HPC facilities could easily run on commercial clouds, freeing up these facilities to focus on true high computational problems. more

In Broadband, China Is Definitely the Middle Kingdom - 270M In 2015

With a goal of 270M fixed broadband lines in 2015 and near-universal service by 2020, the new "Broadband China" strategy is extraordinary. OFweek, a valuable site in Chinese, breaks the plan into three phases. The first is a full speed stage, ending in 2013, that deploys basic broadband and 3G widely. The second stage, 2014-2015, is dedicated to a further takeup and wider deployment. That will include 400,000+ LTE cell sites. more

OpenFlow - The Programmable Network Revolution

Over the past few months I have made regular references to OpenFlow. This is an exciting new development that fits in very well with several of the next generation technology developments that we have discussed in some detail over the past few years -- new developments such smart cities and smart societies, the internet of things. Such networks need to operate more on a horizontal level, rather than the usual vertical connection between a computing device and the users. more

The Advanced Persistent Threats (APT) Deception

Most of the good thrillers I tend to watch have spies and assassins in them for some diabolical reason. In those movies you'll often find their target, the Archduke of Villainess, holed up in some remote local and the spy has to fake an identity in order to penetrate the layers of defense. Almost without exception the spy enters the country using a fake passport; relying upon a passport from any country other than their own... So, with that bit of non-fiction in mind, why do so many people automatically assume that cyber-attacks sourced from IP addresses within China are targeted, state-sponsored, attacks? more

More on ‘Researchers Hijack Storm Worm to Track Profits’

Always good for information on the spam economy, Brian Krebs of the Washington Post has just published a truly fascinating article: Researchers Hijack Storm Worm to Track Profits. Bottom line: a one-in-twelve-million conversion rate of spam to sales seems to be enough to keep the spam economy going. The article covers a project by researchers at UC San Diego and UC Berkeley, who managed to infiltrate the Storm Worm bot network and take over a small portion of it. more

On the Success of Malware

There's often a lot of discussion about whether a piece of malware is advanced or not. To a large extent these discussions can be categorized as academic nitpicking because, at the end of the day, the malware's sophistication only needs to be at the level for which it is required to perform -- no more, no less. Perhaps the "advanced" malware label should more precisely be reattributed as "feature rich" instead. more

Once Upon an EPDP

The new year has only just begun, but the work of ICANN's Expedited Policy Development Process for gTLD Registration Data (EPDP for short) is already in full swing. The team just wrapped up several days of meetings in Toronto and I thought it would be a good time for an update on where we are in the process. Before I go any further, I would be remiss if I didn't again take the opportunity to thank the ICANN team supporting our efforts. more

Internet Society Activities at EuroDIG 2016: Trust, Collaborative Security, Zero Rating and More…

Over the next two days (9-10 June), the European Dialogue on Internet Governance (EuroDIG) takes place in Brussels, Belgium. With a theme of "Embracing the digital (r)evolution", EuroDIG has a full agenda and Internet Society staff will be participating in many aspects of the programme. For us, a primary focus will be at 11:30 CEST (UTC+2) on Thursday, June 9, when our President and CEO Kathy Brown opens the first Plenary with a keynote speech. more

The Competition to Become the Next .eu TLD Registry Is Now Open

I am glad to announce that the European Commission has officially launched the process to select the next Registry for the .eu Top-Level Domain (TLD). This is done through a competitive procedure that will be concluded, by October 2021, with the signature of a service concession contract between the European Commission and the entity that will be entrusted with the organisation, administration and management of the .eu TLD. more

Don’t Make the Internet Safe for Monopolies

This week I'm going to Washington to argue against regulating Internet access as if it were phone service. Twenty years ago I was there for the same reason. My concern now as it was then is that such regulation will damage the economy and reduce opportunity by stifling innovation and protecting the current dominant players from the startups which would otherwise threaten them. more

April 8 2014: A World Less Secure

Not long after the message that Microsoft will stop updating Windows XP from 8 April onwards, after extending it beyond the regular life cycle for over a year already, came the soothing message that malware will be monitored for another year. That may be good news to some, but the fact remains that this is not the same as patching. Remaining on XP leads to a vulnerable state of the desktop, lap top and any other machine running on XP; vulnerable to potential hacks, cyber crimes, becoming part of a botnet, etc. more

Wi-Fi Alliance Launches Wi-Fi 6 Certification Program

Wi-Fi Alliance, the non-profit entity that oversees implementation of the Wi-Fi standard, officially launches the Wi-Fi 6 certification program. more