/ Most Viewed

Broadband Stymied

Unfortunately, no matter what else the stimulus bill may or may not have done, it's slowed down the rate of broadband deployment in the US over the last year. The Rural Utility Service (part of the US Agriculture Department) and NTIA (part of the US Commerce Department) have awarded only 15% of the first round money they promised to make available. To be blunt, they failed in their mission. more

The Appeal Against Broadband Reclassification

A British perspective on a very American process... As a new member of the the "Tech Elders", I was invited to join yesterday's hearing in Washington, DC on the reclassification of broadband Internet access services. The US Federal Communications Commission (FCC) has decreed that Internet access should switch from being lightly regulated as an 'information service' (Title I) to a more heavily regulated as 'telecommunications service' (Title II). I'd first like to say that the process and content was a credit to the rule of law in the United States. more

The Real Deployment Issue

When I see glib talk about the inevitable transition to IPv6 or DNSSEC, I have to wonder what industry people think they are working in. Let me give an example that has nothing to do with networking: storage capacity. Now if there is one constant that everyone in the computing industry can agree on it is that they expect storage media capacity to increase. more

Privacy is a Growth Market in Search of Leadership

Within a single month, privacy has moved to the top of the "to-do" list for government, business and consumers. In fact, the confluence of activity is the best indication in the last ten years that the will exists to establish regulatory and self-governance programs that complement consumer protection. Privacy is a growth market. more

The ICANN Registrar Community

It started way back in 1993 with a Cooperative Agreement with the US Government and Network Solutions, making them registrar 'numero uno'. At that time, they enjoyed a monopoly of the market and the much envied ability to charge $70 for a 2 year registration. As all good things come to an end (for NetSol), the agreement was amended in October 1998 to introduce a more competitive spirit. more

New Research Predicts 1B Mobile Cloud Computing Subscribers by 2014

Over the next five years, the number of mobile cloud computing subscribers worldwide are expected to grow rapidly, "rising from 42.8 million subscribers in 2008, (approximately 1.1% of all mobile subscribers) to just over 998 million in 2014 (nearly 19%)," according to the latest study by ABI Research. "From 2008 through 2010, subscriber numbers will be driven by location-enabled services, particularly navigation and map applications. A total of 60% of the mobile Cloud application subscribers worldwide will use an application enabled by location during these years,” says senior analyst Mark Beccue. more

Three Myths About DKIM

The DKIM standard has been out for two years now, and we're starting to see some adoption by large mail systems, but there's still a lot of misunderstanding about what DKIM does and doesn't do... Any a mail system can add a signatures to the messages it handles, and spammers can sign their mail, too. A DKIM signature contains, stripped down to its basics, the domain of the signer and a checksum of the message. more

Unclear on the Concept, Sanctions Edition

United Against Nuclear Iran (UANI) is an advocacy group that, among other things, tries to isolate Iran by pressuring businesses and organizations to stop doing business with Iran. This week they turned their attention to ICANN and RIPE to try to cut off Internet access to Iranian organizations. Regardless of one's opinion about the wisdom of isolating Iran (and opinions are far from uniform), this effort was a bad idea in an impressive number of both technical and political ways. more

U.S. Health Agency Suffers From Cyberattack, COVID-19 Disruptions by Foreign Actors Suspected

The U.S. Health and Human Services Department (HHS) is reported to have suffered from cyberattacks on its computer system believed, by those familiar with the incident, to be a disruption and disinformation campaign aimed at undermining the response to the coronavirus pandemic. more

Big Data for the Common Good of Local Communities

There is no doubt that big data is going to be one of the most important tools that will assist human society in the future. Our increasingly complex society has been able to move forward, and it will continue to do so, based on rational, scientific facts and figures within the context of the needs of humanity. As an example, neuroscience is giving us more insight into ourselves, and we are learning that many of the elements that we have always thought of as being uniquely human are based on neurological/biological processes that can be put into algorithms. more

Microsoft Sees Serious Appetite for Revised Privacy Laws in US, Says It’s Time to Match EU’s GDPR

With the first anniversary of the European Union's General Data Protection Regulation (GDPR) approaching in just a few days, Microsoft's Corporate Vice President and Deputy General Counsel, Julie Brill says GDPR has been an important catalyst for progress in privacy protection around the world. more

The Essential Ingredient of Politics Is Timing

The transition of the IANA contract oversight is, of course, the topic du jour at ICANN 50 in London. From the sessions to the hallway banter, it's the hottest topic I can recall in ICANN's history. It's an inherently over-the-top political topic, merging partisan politics in Washington with Internet governance. On numerous occasions in Singapore, Larry Strickling raised the domestic politicking on the part of the Republican Party regarding the IANA oversight transition, cautioning us of the discourse fuelled by opportunism. more

Is Laser Going to Be the Next Telecoms Frontier?

When I became involved in the telecoms industry back in the late 1970s, we were just seeing fiber optic cables being commercially developed by Corning. Over the following decades, I have been asked many, many times -- do we need fiber cables or wireless technologies, and what is next? During all that time, my answer has been that there was no other communication technology available in any commercial sense that would make either fiber optical or mobile technologies obsolete. more

More on ‘Researchers Hijack Storm Worm to Track Profits’

Always good for information on the spam economy, Brian Krebs of the Washington Post has just published a truly fascinating article: Researchers Hijack Storm Worm to Track Profits. Bottom line: a one-in-twelve-million conversion rate of spam to sales seems to be enough to keep the spam economy going. The article covers a project by researchers at UC San Diego and UC Berkeley, who managed to infiltrate the Storm Worm bot network and take over a small portion of it. more

Exploiting the Firewall Beachhead: A History of Backdoors Into Critical Infrastructure

There is no network security technology more ubiquitous than the firewall. With nearly three decades of deployment history and a growing myriad of corporate and industrial compliance policies mandating its use, no matter how irrelevant you may think a firewall is in preventing today's spectrum of cyber threats, any breached corporation found without the technology can expect to be hung, drawn, and quartered by both shareholders and industry experts alike. more