/ Most Viewed

DOJ to Cruz: .Com Price Freeze Can Be Extended to 2024

On August 31st the Department of Justice (DOJ) sent a response to the August 12th letter from Senator Ted Cruz and some Congressional colleagues to the head of the Antitrust Division. In that letter Cruz et al asserted that if the pending extension of the .Com registry Agreement (RA) was granted in combination with the consummation of the IANA transition, that DOJ could be prevented from having "meaningful input into the prices that Verisign charges for registering a domain name within the .com domain for an extended period". more

The ITU Busan Plenipotentiary

The ongoing ITU Plenipotentiary Conference in Busan South Korea is the quadrennial gathering where its Nation State Members gather to elect new leadership of its four permanent secretariats and populate a few other of its assorted bodies. The next two weeks are spent in endless sessions where several regional blocs of Members still enamored with pre-liberalization telecom models complain about the new world of telecommunications that they did not invent -- while engaging in copious use of their new smart phones and online services. more

Leading a Horse to Water

It is one thing to bring broadband internet to the masses, but how do we make them drink from the fountain of knowledge? One of the challenges, of course, is that the industry has not yet sold turn-key applications that capture the imaginations of the unconnected. Surprising as it seems, email, Facebook, file swapping and web surfing have not yet attracted 100% of the population. Are there some applications that might lend themselves to a toll-free model in order to reach the rest of the market? more

Designing Secure Networks with Cisco Technology, Part 1

In this multipart series I will be presenting some of the leading industry-standard best practices for enterprise network security using Cisco technologies.... "Wisdom consists in being able to distinguish among dangers and make a choice of the least harmful." That quote is quite possibly the most accurate depiction possible of the never-ending struggle between network security and corporate budget. Providing a mechanism to defend the enterprise network from every conceivable threat is impossible in terms of both technology and funding. more

Bypassing Geo-Locked BYOD Applications

In the wake of increasingly lenient bring your own device (BYOD) policies within large corporations, there's been a growing emphasis upon restricting access to business applications (and data) to specific geographic locations. Over the last 18 months more than a dozen start-ups in North America alone have sprung up seeking to offer novel security solutions in this space - essentially looking to provide mechanisms for locking application usage to a specific location or distance from an office, and ensuring that key data or functionality becomes inaccessible outside these prescribed zones. more

The Hague to Probe Cyberwarfare Under Existing International Law

In a recent article published by WIRED Magazine, a significant shift in international law regarding cyberwarfare has been brought to light. The International Criminal Court (ICC) at the Hague has signaled its intention to investigate and prosecute hacking crimes that breach existing international law without the need for new regulations. more

Akamai: DDoS Attacks Increased 71 Percent in Q3 2016 as Compared to Q3 2015

Akamai releases its Third Quarter, 2016 State of the Internet / Security Report, providing analysis of the current cloud security and threat landscape, including insight into two record setting DDoS attacks caused by the Mirai botnet. more

Spam from Mobile Networks? Who Woulda Thought…

Mobile networks aren't usually thought of as sources of spam, but a quick look at some of the resources that track spam reveals they actually are. This is counter intuitive at first glance because when most people think of mobile they think of smartphones, and those aren't known to be sources of spam (at least not yet). What's really going on is PCs connected to mobile networks with air cards, or tethered with a smartphone where it's permissible, are the culprits more

Ten Years of UDRP

In 1999, the Internet Corporation for Assigned Names and Numbers (ICANN) developed a policy to resolve disputes between trademark owners and registrants of domain names. This policy, the Uniform Domain-Name Dispute Resolution Policy (UDRP) was made available for disputes concerning an alleged abusive registration of a domain name. In the past 10 years alone, more than 16,000 disputes have been filed resulting in more than 10,000 domain name transfers. more

Digital Governance Discussion Group (DGDG): One World, One Internet, Many Voices

On February 12–13, 2024, the first round of the final consultations for a Global Digital Compact (GDC) took place online and offline at the UN Headquarters in New York City. Around 50 governments and 50 speakers from non-governmental institutions took the floor. It was not really a dialog; it was a formal presentation of three-minute statements. more

Major ISPs to Roll Out P4P Over the Next Two Months

Some of the largest ISPs in US, including phone and cable companies, plan on updating their networks over the next two months with a new technology that promises to accelerate P2P distribution. According to reports, recent trials have demonstrated 59% increase in download delivery speeds on average -- and up to 150% for the fastest class of users. more

A Tipping Point for the Internet: 10 Predictions for 2018

The year 2018 represents a tipping point for the Internet and its governance. Internet governance risks being consumed by inertia. Policy decisions are needed if we want to prevent the Internet from fragmenting into numerous national and commercial Internet(s). Geopolitical shifts, in particular, will affect how the Internet is governed. The Internet is made vulnerable by the fragmentation of global society, which is likely to accelerate in response to the ongoing crisis of multilateralism. more

Know Someone Who Has Made the Internet Better? Postel Award Nominations Deadline May 18

Do you know of someone who has made the Internet better in some way who deserves more recognition? Maybe someone who has helped extend Internet access to a large region? Or wrote widely-used programs that make the Internet more secure? Or maybe someone who has been actively working for open standards and open processes for the Internet? more

Mass Surveillance: A Turning Point in Internet History

So far, the debate on mass surveillance has dwelt on the immense resources made available to the agencies (NSA in the US, GCHQ in the UK), on the technological advantage that enables them to access any data and bypass encryption, and on the lack of proper oversight in those two countries. But in order to make their voices heard by their elected representatives, Internet users around the world need to have an even more complete view of the emerging reality. more

“Restoring” Internet Freedom for Whom?

Recently, a colleague in the Bellisario College of Communications asked me who gets a freedom boost from the FCC's upcoming dismantling of network neutrality safeguards. He noted that Chairman Pai made sure that the title of the FCC's Notice of Proposed Rulemaking is: Restoring Internet Freedom. My colleague wanted to know whose freedom the FCC previously subverted and how removing consumer safeguards promotes freedom. more