/ Most Viewed

Facebook and Privacy

Mark Zuckerberg shocked a lot of people by promising a new focus on privacy for Facebook. There are many skeptics; Zuckerberg himself noted that the company doesn't "currently have a strong reputation for building privacy protective services." And there are issues that his blog post doesn't address; Zeynep Tufekci discusses many of them While I share many of her concerns, I think there are some other issues - and risks. more

FCC Chair Releases Draft to Abandon Net Neutrality, Says Gov’t Must Stop Micromanaging the Internet

Federal Communications Commission Chairman Ajit Pai today released a statement on his draft "Restoring Internet Freedom Order", circulated to Commissioners this morning and will be voted on at the FCC's Open Meeting on December 14 more

Hong Kong ISPs Oppose Government Plans for Internet Restrictions Without Industry Consultation

A statement released by the Hong Kong Internet Service Providers Association (HKISPA) denouncing any plans that would restrict Hong Kong's open internet network. more

Software-Defined Networking: What’s New, and What’s New for Tech Policy?

The Silicon Flatirons Conference on Regulating Computing and Code is taking place in Boulder. The annual conference addresses a range of issues at the intersection of technology and policy and provides an excellent look ahead to the tech policy issues on the horizon, particularly in telecommunications. I was looking forward to yesterday's panel on "The Triumph of Software and Software-Defined Networks", which had some good discussion on the ongoing problem surrounding security and privacy of the Internet of Things (IoT)... more

Governments Increasingly Trying to Control the Internet, Warns New U.S. Report

The U.S. Sate Department annual human rights report released on Friday has expressed concerns over the increasing trend among governments spending more time, money and attention in efforts to control their citizens access to the Internet and other communication means. To aid people seeking to speak out, the U.S. government is helping to finance circumvention technologies to avoid firewalls, reports the Associated Press. "To deal with governments hacking computers or intimidating dissenters, the U.S. government has trained 5,000 people from around the world on how to leave less of a trace on the Internet." more

2020’s New Internet Success – Rejoinder

The posting with a similar name seems a bit contrived by anonymous in some strange attempt to enhance its significance. Many others, including myself, have been discussing this subject for some time. Indeed, a concerted lobbying effort and anti-competitive efforts by legacy TCP/IP internet stakeholders have been really ramped up over the past year to mischaracterize what is occurring. more

How Domain Data Helps Thwart BEC Fraud

It's true, domain data has many practical uses that individuals and organizations may or may not know about. But most would likely be interested in how it can help combat cyber threats, which have been identified as the greatest risks businesses will face this year. Dubbed as the greatest bane of most organizations today, cybersecurity can actually be enhanced with the help of domain data. How? more

White Space in the Great White North

There is growing interest in the US for the FCC to look at White Space to enable more options for broadband wireless in rural areas. What is White Space? Last weekend, the Sunday NY Times published an article about wireless services that included this description: "In many areas, not all broadcast [television] channels are in use. The unused channels are "white spaces" of high-quality spectrum that could be made available to local Internet service providers. Unlike the much higher frequency of Wi-Fi, television broadcast frequencies can travel for miles and penetrate walls, providing a much broader range for Internet service." There is a coalition of eight technology companies driving the discussion in the US... more

Fairness & Due Process Require Changes to ICANN’s “Updated Supplementary Procedures” to the IRP

The Updated Supplementary Procedures for Independent Review Process ("IRP Supplementary Procedures") are now up for review and Public Comment. Frankly, there is a lot of work to be done. If you have ever been in a String Objection, Community Objection, or negotiated a Consensus Policy, your rights are being limited by the current way the IRP Supplementary Procedures proposal is structured. With timely edits, we can ensure that all directly-impacted and materially-affected parties have actual notice of the IRP proceeding... more

Web Application Delivery: The Challenge of Managing Thousands of Web Applications in the Cloud

Cloud Computing is a hot topic. Some say it is already here, most agree that it will be much bigger in the coming years. It is pushed forward by the economic benefits of virtualization and consolidation. Take a heterogeneous data center, full of many kinds of servers, running a myriad of applications and consolidate it into a uniform farm of virtual machines, where each application is services by one or more VMs and you have a cloud, what is called a private cloud. more

Once Begun is ONLY Half Done

In the brief history of Internet governance, few initiatives have been greeted with wider support than the recently signed Affirmation of Commitments between the U.S. Department of Commerce and the Internet Corporation for Assigned Names and Numbers (ICANN). The praise is well deserved, but now it's time to remind ICANN of the problems that the AOC did not solve, most importantly ICANN's ongoing accountability gap. more

Cybersecurity Standards Practices as Cyber Threats

One of the most embarrassing and pernicious realities in the world of cybersecurity is the stark reality that some industry cybersecurity standards practices are themselves cyber threats. How so? Most industry and intergovernmental standards bodies serve as means for assembling the constantly evolving collective knowledge of participant experts and package the resulting specifications and best practices as freely available online documents to a vast, diverse universe of users. more

Building a Case for Cybersquatting Under the UDRP

A number of recent UDRP decisions remind trademark owners (and counsel) that cybersquatting cases have to be built from the ground up. Each stage has its evidentiary demands. The first two demand either/or proof; the third, the most demanding, requires proof of unified or conjunctive bad faith registration and bad faith use of the accused domain name. Priority, which intuitively would be thought a factor under the first stage (as it is under the ACPA) is actually a factor under the third stage. more

DDoS Awareness Day - Oct 23, Register Today for Live Virtual Event

In support of National Cyber Security Awareness Month, DDoS Awareness Day is a virtual, global event focused on raising awareness and education around the threat of DDoS attacks. Hosted by Neustar with and exclusive media partner CSO, DDoS Awareness Day brings together top experts in global security to share their views, technical tips and from-the-trenches experience. Attendees will also be given access to a wealth of DDoS materials: white papers, surveys, presentations, best practices and more. more

Trump’s Strange WRC-19 Letter

The 2019 World Radiocommunication Conference (WRC-19) is underway. It is the latest in a continuum of treaty-making gatherings that began in 1903 and is devoted to the now 116-year-old art of globally carving up the radio spectrum among designated uses that is instantiated in the Radio Regulations treaty agreement. Not unexpectedly, the event includes designation of 5G spectrum that flows from the requirements long set in 3GPP and GSMA. more