/ Most Viewed

Open Broadband Infrastructure… And Why There’s No Business Case for FttH to Sell TV

Those advocates of a free market approach to fiber to the home (FttH), rather than a utilities-based one, often point to entertainment as the way to make that happen. And they then immediately point to the USA, where FttH rollouts have indeed been driven by competition between the cable TV companies... The telcos who were initially less enthusiastic about broadband (because it required them to abandon their lucrative ISDN services and replace them with the simpler and cheaper DSL technology) suddenly found themselves bested in the broadband market by the cable TV companies - a trend we also saw in some of the European markets - for instance, the Netherlands... more

Craig Moffett from Wall Street: Wireless Prices Should Go Up Through Mergers

Jules (Julius Genakowski) may soon have a stark choice: should U.S. wireless prices go up or down? Jules talks a good game about wanting more competition and the evidence is overwhelming that going from 6 to 4 majors resulted in higher prices. Merrill Lynch a while back calculated margins went up $billions each year because of the consolidation. You can hire an economist to say almost anything, and two at the University of Chicago happily stretched the truth on this in the past. But the evidence both academic and common sense is clear. more

Verizon, AT&T Speeds Slow After Unlimited Data Plans Launch

Verizon and AT&T re-introduced their unlimited data plans earlier this year, and as a result, studies show that the providers' 4G speeds and overall speeds have fallen due to increased data demand on their networks. more

European Standardization Organizations Discuss Role of Standards for EU Cybersecurity Strategy

Delegation from the European Standardization Organizations (ESOs) - CEN, CENELEC and ETSI - met with Neelie Kroes, the Vice-President of the European Commission responsible for the Digital Agenda, in Brussels yesterday (2 April 2014) discussing how to maximize the positive contribution that standards can make to enhancing internet security and protecting personal data, in order to support the successful implementation of the EU Cybersecurity Strategy. more

Unclear on the Concept, Sanctions Edition

United Against Nuclear Iran (UANI) is an advocacy group that, among other things, tries to isolate Iran by pressuring businesses and organizations to stop doing business with Iran. This week they turned their attention to ICANN and RIPE to try to cut off Internet access to Iranian organizations. Regardless of one's opinion about the wisdom of isolating Iran (and opinions are far from uniform), this effort was a bad idea in an impressive number of both technical and political ways. more

Cloud Versus Dedicated Data Centers: Rumble in the Virtual Jungle

Cloud or dedicated? That's the question companies face each time they need new storage space or resources -- is it better to build local or host off site? Both tech segments are performing strongly, with the global data center blade server market to reach more than $15 billion by 2019 at a compound annual growth rate of 10.25 percent and cloud computing sitting on a $16 billion market that's only trending up thanks to increased public and hybrid adoption. In other words, it's virtual war: Who wins the battle? more

Hewlett Packard and Other Companies Deploying Zero Carbon Data Centers

I am pleased to see that several companies are starting to recognize that building zero carbon data centers is a more sustainable direction rather than focusing on energy efficiency (i.e. PUE). As China, India and the rest of the developing world starts to deploy data centers, GHG emissions will continue to increase in portion to the number of data centers regardless of the PUE. But building zero carbon data centers powered only by renewable energy means that as the world deploys many more hundreds of data centers, GHG emissions will remain virtually unaltered and close to zero. more

Three Myths About DKIM

The DKIM standard has been out for two years now, and we're starting to see some adoption by large mail systems, but there's still a lot of misunderstanding about what DKIM does and doesn't do... Any a mail system can add a signatures to the messages it handles, and spammers can sign their mail, too. A DKIM signature contains, stripped down to its basics, the domain of the signer and a checksum of the message. more

New gTLD Comment Period Closes

Internet Corporation for Assigned Names and Numbers (ICANN) has been holding a public comment period on the second draft of the new generic Top-Level Domains (gTLD) handbook. This period was due to close yesterday. Prior to yesterday afternoon there was a healthy number of comments, but in the past 24 hours a significant number of new comments have been submitted... more

Canada Says Facebook Has Refused to Address Serious Privacy Deficiencies Concerning Its Local Laws

The Canadian government released a statement saying "Facebook committed serious contraventions of Canadian privacy laws and failed to take responsibility for protecting the personal information of Canadians." more

Exploiting the Firewall Beachhead: A History of Backdoors Into Critical Infrastructure

There is no network security technology more ubiquitous than the firewall. With nearly three decades of deployment history and a growing myriad of corporate and industrial compliance policies mandating its use, no matter how irrelevant you may think a firewall is in preventing today's spectrum of cyber threats, any breached corporation found without the technology can expect to be hung, drawn, and quartered by both shareholders and industry experts alike. more

Post JPA: Tempered Happiness

The Affirmation gladdens me. The Affirmation worries me. The Affirmation makes me wonder what is next. I am of course referring to the Affirmation of Commitments between the United States Department of Commerce (DoC) and ICANN. In the respect that the US is loosening its grip on ICANN a little, this is a good thing. Symbolically, of course it is gigantic... more

Working With ICANN’s IRT and Not Against is in Order

ICANN realized during the Mexico City public meeting that its draft proposals for new generic Top-Level Domains (gTLDs) did not take sufficient account of the trademark problems that might arise if the new top level domains become havens for cybersquatters. ICANN sensibly asked the trademark and brand owners to propose rules and procedures that might address these problems... more

Lawful Registrations of Domain Names

Doug Isenberg notes in a recent CircleID essay that two records in domain name disputes were broken in 2017, namely number of cybersquatting claims (3,036 in 2016, 3,073 in 2017) and number of domain names implicated (5354 in 2016, 6370 in 2017). Fairly consistently from year to year, approximately twenty percent of filings are terminated (withdrawn): whether by settlement or nolo contendere we don't know. (All of these statistics come from the World Intellectual Property Organization (WIPO). more

What’s the ROI on a $20m TLD Auction?

ICANN have taken a solid stance in regards to contention sets, with those yet to be resolved soon to be forced into auctions of last resort in the coming months. As expected, this has increased the velocity of private settlements between applicants, either via deals or private auctions. It seems like most applicants (wisely) don't want to see their funds going into ICANN coffers unnecessarily. more