/ Most Viewed

Comparing the Spectrum Policies of America and China

With the explosion in mobile broadband, every mobile operator is scrambling to secure the spectrum capacity needed to stay ahead in the market. There is no doubt that spectrum management is one of the most critical elements of telecommunications policy. It is seen as the pathway to 21C infrastructure... It is interesting to see how the different countries handle their spectrum management policies. more

ITU: The Communication Wonderland

I kept wondering if all that I had said about Dr Toure was fair -- I hadn't met him before and had written so much to comment on the transcript of his speech at ICANN, Cairo . My discomfort was short-lived and even before a month elapsed I met him at the Internet Governance Forum, Hyderabad. Exchanged pleasantries before saying "I wrote some strong comments about your speech at Cairo". Dr Toure looked happy to see me, beamed with a bit of surprise and said he read my comment... more

Internet Fast Lanes - You May Be Surprised at Who Has Them

The Internet Association -- lobbying organization for Internet giants like Google, Amazon and Netflix -- is adamant that it is necessary to apply of 1935 phone regulation (Title 2) to the Internet to assure that there are no premium "fast lanes", that all bits are treated equally, that Internet access providers (ISPs) do not prioritize their own content over content from competitors. more

Thoughts on World IPv6 Day

As I'm sure you've heard by now, June 8, 2011 is World IPv6 Day. On that day, several major content providers will turn on IPv6 on their public-facing services for a 24-hour period and see what happens. For some time, there's been concern that turning on IPv6 on a web site's main URL would cause unacceptable levels of breakage. Nevertheless, forward-looking organizations realized that they needed to start deploying IPv6. more

Seeking Proposals for ICANN 53 DNSSEC Workshop on June 24, 2015, in Buenos Aires

Are you interested in sharing lessons you've learned in deploying DNSSEC or DANE with the wider community? Have you performed new measurements related to DNSSEC deployment that you want to share publicly? Do you have a new tool or service that you think people in the DNSSEC community would find interesting? Are you seeking feedback on some ideas you have to make DNSSEC better or easier to deploy? more

Are Phishing and Malware Separate Threats?

Phishing is when bad guys try to impersonate a trusted organization, so they can steal your credentials. Typically they'll send you a fake e-mail that appears to be from a bank, with a link to a fake website that also looks like the bank. Malware offers another more insidious way to steal your credentials, by running unwanted code on your computer... I like VeriSign's characterization of this kind of malware as an insecure endpoint, the PC which is the endpoint of the conversation with the bank isn't actually under the control of the person who's using it. more

Desperate Attempts to Drag the USA Into the Digital Economy

In the USA an interesting initiative has been taken by a number of leaders in the telco industry who are frustrated with the inability of the country to start building the high-speed broadband infrastructure that is needed for the development of its digital economy. While the Obama Administration has the right vision to make this happen - and the American National Broadband Plan is a good example of this - the dysfunctional political state of the country makes it impossible to establish the industry transformation needed to make this happen. more

IPv6 and the 5 Billionth Customer

The POPClock tells us that there are 6,807,230,170 of us on this planet when I looked it up at 22:26 UTC (EST+5) Feb 26, 2010. In the meantime we are about to connect the 5 billionth cell phone user this year according to ITU Secretary-General Dr. Hamadoun Toure.
 more

SpaceX Starlink Beta, Phase Two

According to an email, Starlink has moved into the second phase of its beta program, nicknamed the "better than nothing beta," which feels a bit like monopoly hubris to me. It may be better than nothing, but it is not as good as the initial beta, which was free. Participants will pay $99 per month for the service and pay $499 for a terminal, including a tripod and WiFi router. I wonder what the difference is between these "beta testers" and "customers." more

Biden Administration Probes Chinese Telecom Firms Over U.S. Data Security Concerns

The Biden administration is investigating China Mobile, China Telecom, and China Unicom over concerns that these companies could potentially exploit their access to U.S. data through their cloud and internet services, potentially sharing this data with the Chinese government. more

Google’s .APP TLD Sunrise Period Ends With Possibly a Record-Breaking Registration Numbers

The sunrise period for Google Registry's .app new gTLD closed today with possibly the biggest sunrise of the 2012 round to date. more

How Big Is That Network?

It's often observed that the Internet was a direct outcome of the progressive liberalization of national telecommunications markets in the late twentieth century. This allowed the entry of a wave of Internet entrepreneurs into various national telecommunications markets that were historically dominated by incumbent telephone monopolies. The resultant transformation of telecommunications over the past two decades is as much a testament to the transformational power of open markets as it is to the prodigious ability of the Internet's technology base to service the ever increasing demands being made of it. more

How to Dispute a Third-Level ‘Country-Code’ .com Domain Name (Such as nike.eu.com)

Shortly after I recently wrote about WIPO's new role as a domain name dispute provider for the .eu ccTLD, the Forum published its first decision on another type of "eu" domain name: eu.com. The decision involved the domain name nike.eu.com. What makes this case interesting is that it represents one of the few .com domain name disputes that includes a country-code in the second-level portion of the domain name. more

Chrome: Getting Microsoft’s Goat

Historically there has been nothing which gets Microsoft's attention as fast as a platform for applications which threatens Windows dominance. Google's Chrome is obviously such a platform; Google can afford to challenge Microsoft; it's healthy for innovation that it does. Can Microsoft still rise to the challenge? Way back when I was at Microsoft -- 1991 to 1994, Lotus Notes was the threat du jour... Since I was responsible for the development of what was to become Microsoft Exchange, I was in charge of that war for a while... more

New Publication on Updating the Anti-Cybersquatting Regime and Ad-Based Cybersquatting

Sealing the cracks: a proposal to update the anti-cybersquatting regime to combat advertising-based cybersquatting is the title of an article by Christopher Varas in the April issue of the Journal of Intellectual Property Law & Practice. In this article, the author labels "modern cybersquatting" the monetization of domain names through PPC advertisements, and says that brand owners lack effective tools to combat this practice... more