/ Most Viewed

U.S. Government Trying to Persuade Allied Countries to Avoid Telecom Equipment from China’s Huawei

The U.S. government is engaged in persuading wireless and internet providers in allied countries to stop using telecommunications equipment from China's Huawei Technologies. more

Israel’s Airstrike on Hamas Hackers: First Real-Time Physical Retaliation Against Cyberattack

Amid escalating violence between Israel and Gaza this weekend, the Israeli Defense Force claimed it bombed and partially destroyed the base of an active Hamas hacking group in Gaza. more

Trump Relaxes U.S. Regulation to Launch Cyberattacks

President Donald Trump has reversed an Obama-era policy that set limits on how the United States deploys cyberattacks. more

Corporate Domain Name Management Becoming More Difficult – Is Anyone Surprised?

Brandsight recently concluded their Third Annual Domain Management Survey. Designed to uncover issues of greatest concern to corporate domain name professionals, the survey was sent to more than 300 companies. The companies that responded spanned all verticals, ranging from financial services to high-tech to consumer packaged goods. Of those that responded, 18% had portfolios smaller than 500 domains... more

Myanmar Internet Down from Massive DDoS Attack

Craig Labovitz of Arbor Networks reports: "Back in 2007, the Myanmar government reportedly severed all Myanmar Internet connectivity in a crackdown over growing political unrest. Yesterday, Myanmar once again fell of the Internet. Over the course of the past several days, Myanmar's main Internet provider, the Ministry of Post and Telecommunication (or PTT for short), suffered a large, sustained DDoS attack disrupting most network traffic in and out of the country." more

The Price of Lack of Clarity

As anyone reading this blog, assuredly knows, the world is in the grip of a deadly pandemic. One way to contain it is contact-tracing: finding those who have been near infected people and getting them to self-quarantine. Some experts think that because of how rapidly newly infected individuals themselves become contagious, we need some sort of automated scheme. That is, traditional contact tracing is labor-intensive and time-consuming - a time we don't have. more

UN Internet Takeover Rumours Mask Bigger Governance Shortcomings

In recent months the Internet has been buzzing about the prospect of a United Nations "takeover" of the Internet, including responsibility for governance of the domain name system. The concern hit a fever pitch late last month when the U.S. Congress held hearings on the issue. A steady stream of technology companies and consumer groups expressed fears with potential U.N. and foreign government involvement and members of Congress pledged to take a strong stand against the takeover. more

Taking Permission

Permission is always a hot topic in email marketing. Permission is key! the experts tell us. Get permission to send email! the ISPs tell us. Marketers have responded by setting up processes to "get" permission from recipients before adding them to mailing lists. They point to their privacy polices and signup forms and say "Look! the recipient gave us permission." In many cases, though, the permission isn't given to the sender, permission is taken from the recipient. more

VoIP Security FUD

I'm continually amazed by the amount of FUD being spread with regard to VoIP security threats. People...the sky is not falling. VoIP isn't e-mail. It isn't implemented like e-mail, it won't be implemented like e-mail (maybe "it shouldn't be implemented like e-mail" is a more appropriate statement). Following best security practices will ensure at least a level of security equivalent to current TDM systems. Best FUD I've heard this week: VoIP is insecure because you can simply put a bridge on an ethernet line and capture a stream. Hey, has anyone ever heard of alligator clips? more

New gTLD Retrospective at ICANN 50

On Wednesday June 25th from 10-12am in the Sovereign Room applicants and key community members will debate what worked, what didn't and what's next for new gTLDs. The event has been organized by the RySG & NTAG as the first community led dialogue on the 2012 new gTLD round since 'reveal day' two years ago. Rather than have panelists deliver presentations, the session will be an open dialogue both between panel members and the audience. It is split into two fifty minute discussion sessions. more

Will ICANN’s gTLD Flood the Sub-Domain Registrations?

Obviously, the market will explode if there were a few hundred new gTLDs creating global excitement and building new platforms on ecommerce and cyber-branding. The media hype and breakaway stories will create a boom to the traffic; all types of new and old names will be registered under current and re-registered under new gTLDs wherever possible. more

WHOIS Detractors and Advocates: Today’s Viewpoints Post-GDPR

Opposing parties continue to debate whether WHOIS should stay after the General Data Protection Regulation (GDPR) took effect across the EU in May 2018. While the Internet Corporation for Assigned Names and Numbers (ICANN), which oversees WHOIS, is looking for ways to be GDPR compliant, experts from various fields are contemplating the problems pointed out by officials. more

When Neutrality Isn’t Neutral: ICANN, Smart Africa, the “BluePrint” and “CAIGA”

ICANN's role in Smart Africa's governance blueprint highlights a widening divide between legality and legitimacy. Funding and participation occurred without early community consultation, raising concerns about procedural integrity, RIR independence, and the precedent such interventions may set for global Internet governance. more

Keeping Track of Satellites

The topic of satellite broadband has been heating up lately. Elon Musk's StarLink now has over 540 broadband satellites in the sky and is talking about starting a few beta tests of the technology with customers. OneWeb went into bankruptcy, but it is being bought out by a team consisting of the British government and Bharti Airtel, the largest cellular company in India. Jeff Bezos has continued to move forward with Project Kuiper, and the FCC recently gave the nod for the company to move ahead. more

Using AM Radio Towers in Designing Wireless Networks

One existing resource that is often overlooked in designing wireless networks is AM radio towers. For the most part, companies deploying fixed wireless and microwave antenna have avoided these towers. This is due to the nature of AM radio, which transmits at such a low frequency that the entire tower is effectively used as the transmitting antenna. The entire tower is energized with the AM signal, and the typical AM tower sits on a base insulator that blocks the tower from being grounded.  more