Another day, another data breach, and another round of calls for companies to encrypt their databases. Cryptography is a powerful tool, but in cases like this one it's not going to help. If your OS is secure, you don't need the crypto; if it's not, the crypto won't protect your data. In a case like the Anthem breach, the really sensitive databases are always in use. more
Paul Budde writes: "Two relatively new mobile market entrants, Mobyland and Centernet, have launched Poland and Eastern Europe's first commercial LTE network. Vendor Huawei provided the equipment for the network, which operates in the 1800MHz frequency band. Both Mobyland and Centernet previously offered GSM services in the frequency band before refarming the spectrum to offer LTE. The operators aim to expand coverage to 20% of the population by 2011 by deploying 700 base stations." more
In early February, free hosting provider Freedom Hosting II, known as one of the largest hosting providers for anonymous websites, was compromised along with all the websites it hosted. The takedown was estimated to have impacted 15-20% of all websites on the Dark Web, however, the actual impact is now reported to have been much larger. more
It is great to see US and European governments undertake initiatives to promote the development of research into Big Data utilizing commercial clouds. Many cloud providers are offering free resources to support these initiatives. R&E networks will play a critical role in linking researchers to the commercial clouds and developing collaboration platforms and portals. more
The Great Renaming was a significant event in Usenet history since it involved issues of technology, money, and governance. From a personal perspective -- and remember that this series of blog posts is purely my recollections – it also marked the end of my "official" involvement in "running" Usenet. I put "running" in quotation marks in the previous sentence because of the difficulty of actually controlling a non-hierarchical, distributed system with no built-in, authenticated control mechanisms. more
Every few months, an important ceremony takes place. It's not splashed all over the news, and it's not attended by global dignitaries. It goes unnoticed by many, but its effects are felt across the globe. This ceremony helps make the internet more secure for billions of people. This unique ceremony began in 2010 when Verisign, ICANN and the U.S. Department of Commerce's National Telecommunications and Information Administration collaborated... more
Three recent developments make me wonder whether we are on the cusp of a shift in satellite ground station technology from parabolic to electronically steered antennas (ESAs). The U.S. Space Force operates the Satellite Control Network, with 19 parabolic antennas at seven locations around the world. more
In this two-part blog series, we take a closer look at brand abuse and intellectual property (IP) infringements. In this first article, we explore the components making up a company's IP and how online content can affect a brand's value, both actual and perceived... The IP held by an organization -- i.e., the portfolio of brands, trademarks, and other intangible assets that provide it with its distinctiveness, and protect it from unfair competition in the marketplace... more
Broadband usage has spiked across the US this year as students and employees suddenly found themselves working from home and needing broadband to connect to school and work servers. But there is another quickly growing demand for broadband coming from gaming. We've had online gaming of some sort over the last decade, but gaming has not been a data-intensive activity for ISPs. more
The statistics concerning the number of gigabit fiber customers in the US is eye-opening. OpenVault tracks the percentage of customers provisioned at various broadband speeds. At the end of 2019, the company reported that 2.81% of all households in the US were subscribed to gigabit service. By the end of the first quarter of 2020, just after the onset of the pandemic, the percentage of gigabit subscriptions had climbed to 3.75% of total broadband subscribers. more
The Indian government is seeking to acquire new spyware in an effort to replace the controversial Pegasus system, which has been blacklisted by the US government. more
According to a recent Homeland Security News Wire article, nearly 8 million patient medical records were compromised over the course of the previous two years due to data security breaches. As more hospitals and patient care providers move to store patient data electronically -- primarily as a cost savings effort -- the risk and exposure of our private medical information increases while our individual control over this information diminishes. more
Everyone seems excited about new gTLDs being just around the corner. All of the overarching issues will soon be resolved: GAC and the ICANN Board will sit in a room and the wisdom of our leaders, ICANN and National, will produce the grand compromise. The starting flag will be flourished! A thousand flowers will bloom! Hooray! But it is only the developed world that can be excited about this, for it is hard to understand how the developing world could be very excited about an overpriced round of gTLD offerings that is unfairly beyond their means. more
ICANN, the organization overseeing the Domain Name System, has announced a $10 million grant initiative to propel projects supporting "the growth of a single, open and globally interoperable Internet." The first application cycle for grants is set to open in March 2024. more
A lot of organizations are interested in open source software, but fail to give it a fair chance compared to proprietary solutions. One reason for this is that the typical invitation to tender process puts open source at a disadvantage. Open source, as it happens, is made in a different ecosystem. more