A lot of the money being spent on broadband infrastructure today is trying to solve the digital divide, which I define as a technology gap where good broadband is available in some places but not everywhere. The technology divide can be as large as an entire county that doesn't have broadband or as small as a pocket of homes or apartment buildings in cities that got bypassed. more
Adjit Walia, a Global Technology Strategist at Deutsche Bank, suggested in a recent paper that it's in the best interest of U.S. tech companies to tackle the digital divide. He says that those companies rely on a computer-literate public and workforce and that they ought to take a small sliver of their earnings and invest in students today before they fall on the wrong side of the digital divide. more
Last fall, when we put forth our bid to acquire the Public Interest Registry (PIR), our announcement - made jointly with PIR and its parent, the Internet Society - was met with questions. We took them seriously and made a conscious effort to engage with representative members of the .ORG community to deepen our understanding. We found that a consistent message was that the commitments made by Ethos since this fall addressed most of the community's issues, but there was a question as to whether they were enforceable and if so, how? more
At a staggering $100 billion dollar valuation and reported 900 million users, Facebook represents a massive presence in the global economy. From an Internet infrastructure perspective, Facebook also ranks amongst the largest of the "hyper giants" generating a significant share of daily global Internet traffic. This blog explore Facebook's size in terms of its Internet traffic contribution. more
The Bug Bounty movement grew out a desire to recognize independent security researcher efforts in finding and disclosing bugs to the vendor. Over time the movement split into those that demanded to be compensated for the bugs they found and third-party organizations that sought to capitalize on intercepting knowledge of bugs before alerting the vulnerable vendor. Today, on a different front, new businesses have sprouted to manage bug bounties on behalf of a growing number of organizations new to the vulnerability disclosure space. more
Ask ten people what privacy is, and you'll likely get twelve different answers. The reason for the disparity is that your feelings about privacy depend on context and your experience. Privacy is not a purely technical issue but a human one. Long before computers existed, people cared about and debated privacy. Future U.S. Supreme Court Justice Louis Brandeis defined it as "the right to be left alone" in 1890. Before the Web became a ubiquitous phenomenon, people primarily thought of privacy in terms of government intrusion. more
In Systemantics: How Systems Really Work and How They Fail, John Gall says: "A complex system that works is invariably found to have evolved from a simple system that worked. A complex system designed from scratch never works and cannot be patched up to make it work. You have to start over with a working simple system." In the software development world, this is called Gall's Law... more
Large Communication Service Providers (CSPs) that provide transit to their customers need to pay special attention to those network segments to ensure that the IPs associated to them are actually being used. What happens should that customer move on or require more (or less) IP real estate? What do communication and management processes look like to ensure that all the various departments are aligned for rapid and seamless network configuration changes with no downtime? more
"I urge you: Do not give a gift to Russia and other authoritarian nations by blocking this transition," Lawrence Strickling, administrator of the U.S. Commerce Department's National Telecommunications and Information Administration, said on Wednesday at a Senate Judiciary Subcommittee Hearing Held on IANA Transition. more
The term Email Deliverability is used to describe how well a mail flow can reach its intended recipients. This has become a cornerstone concept when discussing quality metrics in the email industry and as such, it is important to understand how to measure it. Email Deliverability is considered to be affected by a mythical metric, the reputation of the sender, which is a measure of that sender behavior over time -- and the reactions of the recipients to his messages. more
Before the Holidays, Yahoo got a flurry of good press for the announcement that it would (as the LA Times puts it) "purge user data after 90 days." My eagle-eyed friend Julian Sanchez noticed that the "purge" was less complete than privacy advocates might have hoped. more
The Untied States Government Accountability Office (GAO) has concluded that the IANA transition is not a government transfer of property requiring congressional approval. more
The U.S. became the top attack traffic source in the second quarter of 2010, accounting for 11% of observed attack traffic in total, reports Akamai in its State of the Internet Report released today. According to the report, China and Russia held the second and third place spots, accounting for just over 20% of observed attack traffic. Attack traffic from known mobile networks has been reported to be significantly more concentrated than overall observed attack traffic, with half of the observed mobile attacks coming from just three countries: Italy (25%), Brazil (18%) and Chile (7.5%). more
Google Fiber is pushing the boundaries of internet speed with the testing of its 20 Gigabit product. After successful trials in domestic settings, the tech giant is now taking its ultra-fast service to educational and professional organizations to further test its capabilities. more
These days you can hardly talk about Internet governance without hearing about security. DNSSEC is a hot issue, ICANN's new president is a cyber-security expert, and cyberattacks seem to be a daily occurrence.
This reflects a larger shift in US policy. Like the Bush administration before it, the Obama administration is making security a high priority for the US. Only now the emphasis is on security in cyberspace. The outlines of the new policy were published in the recent US Cyberspace Policy Review, which even recommends a cyber security office directly in the White House. more