Leaving the Public Forum yesterday at the ICANN meeting in Costa Rica I had learned of a couple of decisions which to me goes against serving the global public interest. At an ICANN Board meeting a few months ago which I unfortunately missed the Board resolved matters related to how financial support and batching will take place in the new gTLD Program. I would like to put forward proposals for adjusting these... more
Usenet is 40 years old. Did we get it right, way back when? What could/should we have done differently, with the technology of the time and with what we should have known or could feasibly have learned? And what are the lessons for today? A few things were obviously right, even in retrospect. For the expected volume of communications and expected connectivity, a flooding algorithm was the only real choice. more
While jogging along LacLeman in Geneva I caught up with Dr. Kim Seang-Tae, the President of the National Information Society Agency of South Korea. He is also one of the Commissioners of the ITU/UNESCO Broadband Commission for Digital Development. Dr. Seang-Tae is the chief architect of the FttH miracle that is transforming South Korea. His broadband journey began in 1994, when he developed the country's first broadband plan. more
Earlier this year, The Alliance for Safe Online Pharmacies (ASOP) released findings from their 2021 survey on American Perceptions and Use of Online Pharmacies. According to ASOP's data, U.S. residents' use of online pharmacies to purchase prescription medications continues to increase yearly. In 2021, 42% of Americans purchased medications from online pharmacies, either for themselves or family members under their care. This is a significant increase of 7% since just last year. more
The Domain Name System (DNS, aka Web 2) and Web3 platforms are two different naming systems available to internet users. While the DNS (Web2) has been a reliable and trusted internet standard for decades, Web3 platforms (such as ENS, Handshake and Unstoppable) are a relatively new technology deployment that presents unique and different features. more
The AI Strategy course at UC Berkeley has come to an abrupt end, but formal learnings in AI will continue. I want to thank professors at UC Berkeley, Alberto Todeschini, Ph.D., and Stuart Russell, who developed a comprehensive course to implement AI in business. After three certificates, Alberto has encouraged me to pursue a master's in Artificial Intelligence. My wife and I are contemplating this next step. more
A few months ago, there was a lot of discussion that despite its claims, Zoom did not actually offer end-to-end encryption. They're in the process of fixing that, which is good, but that raises a deeper question: why trust their code? (To get ahead of myself, this blog post is not about Zoom.) If Zoom has the key but doesn't abuse it, there isn't a problem, right? Let's fast-forward to when they deploy true end-to-end encryption. Why do we trust their code not to leak the secret key? more
This year, the Internet Society celebrates its 25th anniversary. Our own history is inextricably tied to the history of the Internet. We were founded in 1992 by Internet pioneers who believed that "a society would emerge from the idea that is the Internet" -- and they were right. As part of the celebration, this September we will launch a comprehensive report that details the key forces that could impact the future of the Internet. The report will also offer recommendations for the Future and we need your input. more
Monday saw a nationwide series of outages due to a misconfiguration at Level 3, an internet backbone company. more
The incredible pace of change of the Internet -- from research laboratory inception to global telecommunication necessity -- is due to the continuing pursuit, development and deployment of technology and practices adopted to make the Internet better. This has required continuous attention to a wide variety of problems ranging from "simple" to so-called "wicked problems". Problems in the latter category have been addressed through collaboration. This post outlines key characteristics of successful collaboration activities. more
Vint Cerf has posted comments in support of the pending sale of PIR and the .org registry to Ethos Capital. Vint's Comments . Vint is a respected member of the Internet community, and his comments need close attention and careful assessment. Some of his comments have been discussed here earlier. Other comments, posted here and elsewhere, have either supported the sale or raised questions. more
The patent for a technology to disable iPhone cameras -- filed by Apple in 2009 -- won approval from the U.S. Patent & Trademark Office on Tuesday. While logical to counter bootlegging, idea has raised censorship concerns amongst groups such as freedom of expression advocates. more
The ".COM Registry Agreement Amendment" is on the Main Agenda for this Thursday's Regular Meeting of the ICANN Board. The proposed extension of the RA was announced and put out for public comment on June 30th. The public comment period closed on August 12th and ICANN staff's Report of Public Comments was due on September 15th, coincident with the Board meeting. The original due date for that staff Report was August 26th, but was pushed back to accommodate the large number of comments... more
A newly released Internet of Things ecosystem forecast from International Data Corporation (IDC) attempts to clarify the hardware, software, services, connectivity, and security that make up the evolving Internet of Things (IoT) ecosystem. The worldwide IoT market is forecast to grow from $1.3 trillion in 2013 to $3.04 trillion in 2020 with a compound annual growth rate (CAGR) of 13%. more
China's newly released International Strategy on Cyberspace is marked by three distinctive layers with different degree of priority: (1) sovereignty (or cybersecurity, or UN Charter), (2) globalization (or digital economy, or WTO rules), and (3) fundamental freedoms (or human rights, or UDHR). The good point of the strategy is that it tries to make the three layers peacefully co-exist in one document. The failure, however, lies in the intentional ranking of relevance/importance of the three layers... more