The widely publicized auction of the domain name KerryEdwards.com ended Saturday night, but the search for a new owner continues. According to Matt Bentley, CEO of Sedo.com, the domain name brokerage managing the sale, a key bidder withdrew at a late stage in the auction, leaving the domain up for grabs among the dozen or so parties who had expressed a serious interest in purchasing the domain. more
With the final Industry Committee review of C-27, Canada's anti-spam legislation, set for Monday afternoon, lobby groups have been increasing the pressure all week in an effort to water down many of the bill's key protections. Yesterday, the Canadian Marketing Association chimed in with an emergency bulletin to its members calling on them to lobby for changes to the bill. While the CMA was very supportive of the bill when it appeared before the committee in June, it now wants to kill the core protection in C-27 - a requirement for express opt-in consent. more
The approach is growing in popularity, and Google, Microsoft and Amazon are among the many large companies working on ways to attract users to their offerings, with Google Apps, Microsoft's Live Mesh and Amazon S3 all signing up customers as they try to figure out what works and what can turn a profit... In the real world national borders, commercial rivalries and political imperatives all come into play... The issue was recently highlighted by reports that the Canadian government has a policy of not allowing public sector IT projects to use US-based hosting services because of concerns over data protection. more
I've been ruminating on this for a while, this follow-up that was a decade in the offing. My article Trench Warfare in the Age of The Laser-Guided Missile from January 2007 did pretty good in terms of views since I wrote it. Less so in terms of how well the ideas aged or didn't, but that's the nature of the beast. Everything gets worse, and simultaneously, better, and so here we are: Using embarrassingly ancient approaches to next-generation threats. Plus ça change. more
Around the world, communities are racing to close the digital divide. From fiber deployments in rural areas to affordable smartphones and digital skills training, the goal is clear: connect the unconnected. But as we pursue that goal, a deeper question emerges that demands just as much urgency as infrastructure: When people get online, can they actually participate in the digital world? more
The ICANN latest reveal of the applications pending batching has shown a number of very crucial details of what the new domains system is like. The new system before batching presents new applications with the North Americas having the highest applications amounting to 911, Europe follows with 675, Asia pacific which already has one continental domain .asia has three hundred and three domains, Latin America which shares the same ecological niche with Africa has 24 new applications 7 domains higher than Africa which has presented 17 new domains. more
We're edging closer every day to seeing WiFi 6 in our homes. WiFi 6 will be bolstered by the newly approved 6 GHz frequency, and the combination of WiFi 6 and 6 GHz spectrum is going to revolutionize home broadband. I don't think many people understand how many of our home broadband woes are caused by current WiFi technology. WiFi has been an awesome technology that freed our homes from long category 5 wires everywhere, but WiFi has a basic flaw that became apparent when homeowners started to buy hordes of WiFi-enabled devices. more
Cloud computing is not a new concept. Having gotten its start back in the 1960s, when computation was first envisioned as a public utility, it has been in development ever since. However, the past few years have seen more significant changes than we have seen in the entire history of the technology. In an age with ever increasing digitization of data and records, the cloud and cloud software have become unavoidable for virtually every business from small start-up initiatives to large multibillion-dollar corporations... During the past three years, we have seen the following significant developments relative to the cloud. more
The United States and its allies are in a technology cold war with China and its allies. This is evidenced by major battles like the US ban on Huawei and China's drive for technological independence and their global infrastructure program to create a digital silk road. (The cold war began under Trump, but President Biden is continuing it). There are other, less well-known battles like the battle over optical communication in space. more
Network neutrality is important in the context of assuring the opportunity to innovate in how we communicate and connect. We can't define it in terms of specific outcomes but rather in terms of what we enable. The Internet is just one example of what we can do when given the opportunity to use software to fashion our own solutions... I thought about this more when I found myself in my hospital room (after knee surgery) unable to open and close the shades by myself. But yet I could control the lights in my house! more
2015 was a challenging yet exciting year for brand owners. While new gTLDs continue to consume much of the news in the domain industry, there were other notable highlights. Global domain registrations reached nearly 300 million; ICANN had several initiatives in motion that were of particular concern to brand owners; and companies continued to face threats to their brand reputation, revenue and customer trust. Here's my top 5 domain highlights from 2015. more
This year's Cisco Collaboration Summit was a step up from last year, and I say that for good reason. Last year's event was good -- all of Cisco's events are good -- but the venue was too small and it took away from the messaging. For 2010, Cisco went out of town to the classy and classic Arizona Biltmore in Phoenix. They don't build them like this anymore, and to me, this setting did far more justice for what Cisco has to say about collaboration. more
People are growing increasingly alarmed by recent examples of bad actors abusing proxy services offered by registrars. While proxy services are designed to protect the privacy of legitimate domain name users - they do the opposite when abused by cybercriminals. Responsible Proxy providers play a key role in mitigating abuse. When they don't act responsibly - it's clear they contribute to the problem. more
The world is abuzz this week with some flaming malware - well "Flame" is the family name if you want to be precise. The malware package itself is considerably larger than what you'll typically bump into on average, but the interest it is garnering with the media and antivirus vendors has more to do with the kinds of victims that have sprung up - victims mostly in the Middle East, including Iran - and a couple of vendors claiming the malware as being related to Stuxnet and Duku. more
A map released by Information Geographies at the Oxford Internet Institute illustrates the total number of Internet users in a country as well as the percentage of the population that has Internet access. "The distortion in the map paints a revealing picture about human activity on the Internet. China is now home to the world’s largest Internet population at over half a billion. The United States, India, and Japan then follow as the next most populous nations of Internet users." more