This essay discusses recent findings on the difficulty of overcoming decision bias, and it argues that this factor, when combined with a diverse and fragmented demand for new gTLDs, makes a focused marketing strategy crucial to the success of the program. In addition, success requires cooperation among registries and resellers when it comes to sales and marketing. Impulse buying aside, a product's sales are driven by the product's utility... more
The telecom industry five years from now will be unrecognizable. The creative destruction of the Internet broadly writ will be even greater than it has been in the last decade. The major telcos, the major television networks, and the major cablecos -- if they still exist at all -- will have very different revenue models than they have today. That's the good scenario... more
You won't go far with your cybersecurity when you're relying on the wrong intelligence. This is simply because not all types of threat intelligence are equal. You might have experienced this yourself; investing time and resources into just one only to receive meagre results in the end. Sadly, many organizations fail to realize that depending on just a single source of information is a big mistake. more
Potential trademark Rights Protection Mechanisms (RPM) at the 2nd level can be divided into three main areas -- each defined by their time relative to Top-Level Domain (TLD) launch... Of these, we believe the third, "After Launch," is the most fruitful path to explore. We believe it offers the most potential to protect the rights of trademark holders, the best balance between TM rights and the legitimate rights of others who may want to register names , and the most benefit to the trademark community at the lowest cost to them... more
Someone asked me a question today about Google's new partnership with Sprint. Sprint/Nextel is the third largest wireless carrier in the U.S., falling far behind Verizon and AT&T -- who together control 51% of the wireless market. (Sprint services are also resold by Comcast and Time Warner as part of their packages.) Sprint has announced it won't bid in the 700 MHz auction. Sprint has other plans... more
Even though 5G hasn't yet made it onto any cellphone, the wireless vendor industry is already off and running looking at the next generation of wireless technology that has been dubbed as 6G. This recent article describes the European Union Hexa-X project that started in January to look at developing specifications for next-generation wireless technology using terahertz spectrum. more
When I was in the military, we were constantly drilled about the problem of Essential Elements of Friendly Information, or EEFIs. What are EEFis? If an adversary can cast a wide net of surveillance, they can often find multiple clues about what you are planning to do or who is making which decisions. For instance, if several people married to military members all make plans to be without their spouses for a long period of time, the adversary can be certain that a unit is about to be deployed. more
Studies have found only limited, insufficient agency adherence with FISMA's (Federal Information Security Management Act) continuous monitoring mandates. One survey found almost half of federal IT professionals were unaware of continuous monitoring requirements. A recent GAO report found that two-thirds of agencies "did not adequately monitor networks" to protect them "from intentional or unintentional harm." more
The FCC lawfully fined U.S. facilities-based wireless carriers nearly $200 million for selling highly intrusive location data about subscribers without their "opt-in" consent. In Section 222 of the Communications Act, Congress comprehensively specified how the carriers bore an affirmative duty of care not to disclose clearly defined Customer Proprietary Information ("CPNI"). The Act explicitly required the FCC, and no other agency, to protect telecommunications consumers. more
Schneier's insight is considered particularly important according to EFF, as more and more is learnt "about the unconstitutional surveillance programs from the National Security Agency and the depth and breadth of data the NSA is collecting on the public." more
Skype's official explanation. Phil Wolff has a good set of interpolated comments on the official explanation. There are two things to add... As the Register points out, last Tuesday was Microsoft's monthly patch day and those patches required a re-boot. If we believe Skype that their problem started with excessive login attempts, this is the only plausible explanation on the table... more
The Optus outage in Australia from last year was immediately on my mind when on Friday afternoon a similar event swept, this time, across the world. Also, in this case it was a software update that caused the problem. This time from global security software provider CrowdStrike. The culprit appears to be an update to the CrowdStrike Falcon platform, a security monitoring tool widely deployed by businesses and organisations on Microsoft desktop computers and notebooks. more
A lawsuit filed by Meta has led to a significant decrease in phishing websites tied to the domain name registrar Freenom. Cybersecurity expert Brian Krebs in a report on Friday said that Freenom, which provides free domain name registration services, was a favored resource for cybercriminals due to its policy of protecting customer identities. more
Something has been bothering me for several months, and that usually manifests in a blog at some point. During the COVID-19 crisis, the FCC and big ISPs have repeatedly said that the only reason our networks weathered the increased traffic during the pandemic was due to the FCC's repeal of net neutrality and deregulation of the broadband industry. Nothing could be further from the truth. more
Today, we are in a way naturally connected to automation and robotics. In the industrial revolution, people realized that many tasks could be performed better and more efficiently by a machine. The rise of our dependence on technology has greatly risen since then, and thanks to scientific and technological advancements, we are on the breach of a new era. more