On 8 April 2014, ICANN released the "Call for Public Input: Draft Proposal, Based on Initial Community Feedback, of the Principles and Mechanisms and the Process to Develop a Proposal to Transition NTIA's Stewardship of the IANA Functions." more
The crucial importance of Iran Nuclear Deal and, hopefully, the imminent expectation, for reaching to an indisputable solution and agreement among 5+1+ Iran (as well as the other parties who claim to have interest in this matter) all have created a special climate and proper ground for all the activists and the observers in order to seriously sit and make a review of the actual situation and the potentials of the main player of the field, say Iran, or Civil Society of Iran... more
The U.S. Federal Trade Commission (FTC) has named Edward Felten, a Princeton professor of computer science and public affairs, as its Chief Technologist, effective January 1. Felten's main role will be to provide advice on technology policy issues. more
resident Obama announced today that he has reached a "common understanding" with Chinese President Xi Jinping on curbing economic cyber espionage, but threatened to impose U.S. sanctions on Chinese hackers who persist with cyber crimes. more
At the ninth Internet Governance Forum (IGF) in Istanbul, the International Chamber of Commerce (ICC) and the Business Action to Support the Information Society (BASIS) have welcomed the reaffirmation of the IGF's relevance and continued importance as well as the opportunity to work collaboratively with other stakeholders to further improve it. more
The internet activity of everyone in UK will have to be stored for one year by Internet service providers, under the new surveillance law plans. "This duty would include forcing firms to hold a schedule of which websites someone visits and the apps they connect to through computers, smartphones, tablets and other devices. Police and other agencies would be then able to access these records in pursuit of criminals -- but also seek to retrieve data in a wider range of inquiries, such as missing people." more
The Anti-Phishing Working Group (APWG) recently reported that the number of sites infecting PCs with password-stealing crimeware reached an all time high of 31,173 in December 2008 - an 827 percent increase from January. And according to a report just released by Trend Micro's Focus Report, 93 percent of data-stealing malware have been identified as Trojans in the first quarter of 2009. more
In a post last week, I advised Cuban President Díaz-Canel that investment in fixed broadband Internet would benefit both the Cuban people and his regime. This week, I've got advice for US President Biden -- don't try to out-pander the Republicans and call President Díaz-Canel's bluff by offering support for fixed broadband. What won't work... more
AFNIC recently conducted a test examining validity of the claim that the number of domain names registered by the end of the 1st day of the public opening of a TLD amounts to 50% of the stock that the TLD will achieve by the end of its 1st month, and that the latter number will represent 50% of the stock at the end of the 1st year. more
The draft String Similarity Evaluation Guidelines risk entrenching past failures of Internet governance. With opaque algorithms and no right of appeal, ICANN's credibility hangs on whether transparency and fairness are restored before final adoption. more
Eutelsat Communications and Facebook announced today their partnership on a new initiative that will leverage satellite technologies to get more Africans online. "Under a multi-year agreement with Spacecom, the two companies will utilize the entire broadband payload on the future AMOS-6 satellite and will build a dedicated system comprising satellite capacity, gateways and terminals," according to the official announcement. more
Unlike past technological shifts, artificial intelligence is automating high-skilled professions before low-skilled ones. This reversal challenges long-held assumptions about job security, expertise, and governance, forcing policymakers to rethink regulation, trust, and digital sovereignty. more
You don't always need to dazzle consumers -- but you do need to deliver what they want, when they want it, or else risk being left behind. The crux of service activation is to provide requested services to the subscriber in the shortest possible timeframe. The rise in multi-play service offerings can sometimes make this goal difficult, with service fulfilment involving multiple back-end components, including billing, provisioning, activation, monitoring, and diagnostics, as well as different technology types. more
The Berkman Center for Internet & Society at Harvard University announced today that it "will conduct an independent, exploratory study analyzing ICANN's decision-making processes and communications with stakeholders." The study is aimed at developing a framework and recommendations for understanding and improving ICANN's accountability and transparency. "The Berkman Center's final report will be made publicly available after ICANN's Accountability and Transparency Review Team has had the opportunity to utilize its findings in recommendations to the ICANN board." more
What defines a stakeholder in Internet governance? Is it a professional occupation, an ideology, or a specific methodology? One of the key themes emerging in the Netmundial+10 event has been that of stakeholder involvement, participation and representation in different IG mechanisms. The numeric increase in contributors to these processes since the original Netmundial is palpable. However, questions remain about the definition of a stakeholder and the premises under which these actors should engage in policy work together. more