As we have previously observed, the efforts undertaken by ICANN, the World Economic Forum (WEF), and CGI.BR to launch a NETmundial Initiative (NMI) to follow up on last spring's NETmundial meeting in Sao Paulo has encountered heavy skepticism and substantial resistance from the major civil society and technical groups from which endorsement and participation was sought. more
The global public cloud services market revenue is expetec to grow by 18.5 percent in 2017 reaching $260.2 billion, up from $219.6 billion in 2016, according to the latest report from Gartner, Inc. more
A series of attacks on the Email Service Provider (ESP) community began in late 2009. The criminals spear-phish their way into these companies that provide out-sourced mailing infrastructure to their clients, who are companies of all types and sizes. ... On March 30, the Epsilon Interactive division of Alliance Data Marketing (ADS on NASDAQ) suffered a massive breach that upped the ante, substantially. Email lists of at least eight financial institutions were stolen. more
Even as we increasingly discover that every facet of our modern lives now revolve around, and are dependent on the Internet, for which reason its availability, functionality, safety, stability and security are now of great and continuing concern to all of us. These issues have a profound impact on its overall governance. To most of us, during the past three decades, the Internet has always been available, stable, affordable and open; and it should continue this way even as it is controlled and administered in a secure manner... more
Reporting from Brussels, Belgium. Since January KnujOn has been conducing its own audit of ICANN Registrar contractual compliance and illicit commerce within the generic Top-Level Domain (gTLD) space. Our findings are shocking. more
Today, one of the world's largest Internet companies, Alibaba, together with a compelling array of other providers, vendors, and government bodies for the first time called for a visionary multilateral technical and operational "framework for a Blockchain of Things." The exceptionally thorough and comprehensive 23-page document, SG20-C.008, was submitted into the upcoming ITU-T SG20 Internet of Things (IoT) Study Group meeting at Dubai, 13j23 March -- the first group gathering in the organization's new 2017-2020 study period. more
Last Friday, Microsoft made an unsolicited offer to buy Yahoo for $31 per share, representing over a 50% premium from Yahoo's then-share price. As an employee working for Microsoft in Exchange Hosted Services (i.e. spam filtering), I'd like to comment on this buyout offer. Leaving aside the question of whether or not this is a good deal for shareholders and what Microsoft's true motivations are for buying Yahoo (namely, to become the number 2 player in the search market), I'd like to look at it from an anti-spam point of view. more
Happy Holidays. In September 2021, Apple rolled out iOS 15. For high volume email senders, Apple Mail now essentially tracks every email sent as an "open." Seemingly if you are a campaign engineer, high volume sender or ESP, this change can radically affect 25% - 45% of your email subscriber base, across both B2B, B2C or D2C. Inside your email analytics platform, you should see the specific percentage of Apple Mail users in your database, thus a significant rate of change ( delta) regarding inflated "open rates." more
New research indicates Thailand as being the world's number one hotspot for cryptocurrency mining malware. more
The internet is abuzz with commentary about a recent case in the United States District Court for the Northern District of California concerning the web site wikileaks.org, a "website dedicated to leaking documents that are "anonymous, untraceable, uncensorable." Time Magazine allegedly described the site by stating that it "could become as important a journalistic tool as the Freedom of Information Act." The case certainly raises important issues concerning First Amendment Rights, censorship and freedom of speech. The case involves the alleged posting of private internal documents of Bank Julius Baer & Co and its bank customers... more
The Internet of Things (IoT) is on an explosive growth trajectory. According to Transforma Insights, the number of IoT-connected devices is projected to increase to 24.1 billion worldwide by 2030. That's almost a three-fold increase from 2019. Much of this growth will be fueled by the coming 5G revolution, which will enable businesses and consumers to take advantage of a wide range of increasingly sophisticated connected devices. more
In a blog post, Sandvine announced that for the second year in a row, the Super Bowl was seen as an event that led to a 15% reduction in overall internet traffic, despite being available as a streaming video feed for United States viewers. The blog says "Sandvine's traffic statistics have showed continued growth in adoption of live streamed sports events, but for the time being it is no threat to replace viewing via traditional broadcast methods." more
The DNS Operations, Analysis, and Research Centre (DNS-OARC) convened OARC-35 at the start of May. Here are some thoughts on a few presentations at that meeting that caught my attention... These days it seems that the term "the digital economy" is synonymous with "the surveillance economy." Many providers of services on the Internet spend a lot of time and effort assembling profiles of their customers. These days, it's not just data in terms of large-scale demographics but the assembling of large sets of individual profiles. more
Bill Sweetman from NameNinja has released a handy little guide to domain name pricing for startups. While the guide is aimed at businesses starting out, the information around domain name pricing is applicable to anyone who wants to either "upgrade" their online brand or launch a new one. The guide focusses primarily on .com domain names, but also mentions both ccTLDs, alternative domains and new gTLDs. more
The front page story of the September 13 2011 issue of the International Herald Tribune said it all: "Iranian activists feel the chill as hacker taps into e-mails." The news story relates how a hacker has "sneaked into the computer systems of a security firm on the outskirts of Amsterdam" and then "created credentials that could allow someone to spy on Internet connections that appeared to be secure." According to this news report this incident punched a hole in an online security mechanism that is trusted by hundreds of millions of Internet users all over the network. more