ICANN and the mobile network operators trade body, GSM Association (GSMA) today signed a Memorandum of Understanding (MoU) at the Mobile World Congress being held this week in Barcelona. more
U.S. National Security Agency Director, Army Gen. Paul M. Nakasone, has announced the formation of the AI Security Center, a new entity designed to oversee the development and integration of artificial intelligence within the nation's security systems. more
I am often asked by cities about the option of building a municipal fixed wireless broadband network. As a reminder, fixed wireless, in this case, is not a cellular system but is the point-to-multipoint technology used by wireless Internet service providers (WISPs). My response has been that it's possible but that the resulting network is probably not going to satisfy the performance goals most cities have in mind. more
I run a business. For years I've been in the ICANN Business Constituency, holding a series of different positions including Chair. Suffice it to say, I'm absolutely ok with making money and generally speaking, letting markets work. I also care about NGOs. For years our firm worked with PIR on the .NGO project. We got to see up close the role PIR has played as a supporter of NGOs online -- encouraging best practice, helping push out DNSSEC to a global audience, working on DNS abuse issues, supporting the sector. more
It might be hard to imagine but we were already talking about fibre to the home networks back in the 1970s and 1980s. This was in the early days of interactive TV and pay TV and fibre optics were already at that time seen as the next level of telecoms infrastructure needed for such services. The first residential fibre pilot networks were built in Berlin and Nagasaki. One of the most ambitious projects was in Columbus Ohio, but in the end they decided to continue with their HFC network. more
The only Cyber law passed in Pakistan till date is the famous ETO-2002 (Electronic Transaction Ordinance - 2002). It required Ministry of IT&T to set up a Central Repository for all digital certificates and in addition to set up a body to be named as Electronic Certification Accreditation Council (ECAC) to accredit Electronic Certification Authorities to be established in the country... In this regard, government has not only closed its eyes and has blindly trusted the only certificate authority (CA) in the country operated by a private business group, it has also mandated the citizens and business to trust it. Case in point is Central Board of Revenue (CBR) that has told all taxpayers to digitally sign the emails using the certificates issued by this private party... more
Users of LinkedIn were unable to access the site for several hours due to what the company has reported to have been a DNS issue. The site is claimed to have been accidentally pointed to a domain name parking page and some users were greeted with a domain for sale page when trying to access LinkedIn's homepage. According to downrightnow, LinkedIn's outage began around 6 pm PST on Wednesday and is continuing, though website has gradually resumed for some users. more
In the absence of data on renewals and deletions which are yet to happen, it can be enlightening to compare the domain names from the zone files of a year ago to the domain names in the current zones. The first group is the legacy gTLDs. The "Retained" domain names are those still in the December 2019 zone files. The "Deleted" domain names are those which are no longer in the current zones. Some of the retained domain names may have been reregistered, but these are not renewals charts. more
The .ORG sale has placed Maureen Hilyard – ICANN's At-large Chair – squarely between the largest outpouring of individual user sentiment that the Internet community has ever seen, and the people who can do something about it. For At-large, the stakes are high. ICANN has spent years building up a user organization to balance corporate and government interests. At-large could be a key bulwark against the capture of Internet resources by those with capital and political power. more
More than two months after authorities shut down a massive Internet traffic hijacking scheme, the malicious software that powered the criminal network is still running on computers at half of the Fortune 500 companies, and on PCs at nearly 50 percent of all federal government agencies, new research shows," reports Brian Krebs. more
Community new gTLD applications were one of the three options offered by version one of ICANN new gTLD applicant guidebook. It was also possible to submit a "generic" or a "geographic application." I dug the ICANN website and found out that, in the end - and according to me only - it was a bad choice to submit such application...
I went through the 52 delegated applications to investigate which ones have lots of domain name registrations and which ones don't. more
Facebook's Internet.org has launched a free Internet application in Colombia as part of a drive to bring developing markets online. Colombia is the first nation in Latin America and the fourth in the world to receive the new Internet.org service, in partnership with local mobile phone provider Tigo, but the aim is to push the app globally. The mobile app, aimed at low income and rural users, offers more than a dozen tools via the Android operating system... more
Tom Wheeler, the new Chairman of the Federal Communications Commission, gave a speech today at Ohio State University. It was a good speech on his regulatory philosophy. But that's not so interesting. There's nothing out of the ordinary about a government official giving a speech. The unusual development was that the Chairman also released an ebook, called Net Effects. Even more unusual, it's not a bland ghostwritten policy whitepaper; it's a deeply researched work of history. more
Orin Kerr recently blogged about a 9th Circuit decision that held that scraping a public web site (probably) doesn't violate the Computer Fraud and Abuse Act (CFAA)... On its surface, it makes sense – you can't steal something that's public – but I think the simplicity of the rule is hiding some profound questions. One, I believe, can most easily be expressed as "what is the cost of the 'attack'"? That is, how much effort must someone expend to get the data? Does that matter? Should it? more
Last Thursday, during VeriSign's Q3 2019 quarterly earnings call, CEO Jim Bidzos offered statements that seemed to be carefully calibrated to satisfy Wall Street's curiosity about protracted negotiations with ICANN on a Third Amendment to the .com Registry Agreement while also appearing to distance the company from the soon-to-be forthcoming product of that year-long effort. more