/ Most Viewed

Multi-Stakeholder Internet Governance Is Captured and Presumed Dead

Technical management of the Internet was delegated to ICANN by the U.S. government because it was believed that the private sector would be more agile and responsive to the needs of globally distributed stakeholders. However, this optimism and the faith it has produced has proven to be misplaced since ICANN's multi-stakeholder governance continues falling far short of the basic expectations set when it was created. more

Fifth Applicant Auction Concluded, 28 Contention Sets Resolved

After the successful conclusion of our fifth auction last week, the Applicant Auction has now resolved contention for a total of 28 strings. More than 20 gTLD applicants have participated in our auctions, ranging from many smaller companies with only one gTLD application in contention to large, publicly traded portfolio applicants like TLDH and Demand Media. more

Congress Still Raising Concerns About ICANN’s New gTLD Program

Juliana Gruenwald reporting in the NationalJournal: "Nearly six months after the program was launched, key members of Congress are still raising concerns about a plan to introduce hundreds of new Internet addresses into the domain name systems, saying they want fresh assurances that the new strings will not harm trademark holders and that the public has adequate opportunity to comment. The latest salvo came on Tuesday from the top leaders of the House and Senate Judiciary committees..." more

DDoS Mitigation: A Blend of Art and Science

As DDoS attacks become larger, more frequent and complex, being able to stop them is a must. While doing this is part science, a matter of deploying technology, there is also an art to repelling sophisticated attacks. Arbor Networks, Citrix and others make great gear, but there's no magic box that will solve all your problems for you. Human expertise will always be a crucial ingredient. more

Pay TV Loses Record 1.3M Subscriptions So Far This Year

The U.S. Cable, satellite and telecommunications-based subscription video services lost 430,000 customers in the third quarter of this year, bringing the year-to-date drop to 1.3 million -- the largest ever through the first nine months of the year. more

Performance Test White Paper for SDN Controller Issued

Recently, BII-Global SDN Certified Testing Center (SDNCTC EN | CH) issued the Performance Test White Paper for SDN Controller (hereinafter Whitepaper) at China Future Network and Development Innovation Forum, which truly fills the vacuum in SDN controller performance testing at home. It, by means of elaborate results from the open-source controller tests, provides reliable analysis report to all corners within the industry, which has been highly thought of and widely supported by experts both at home and broad. more

Tough Choices Two Years In

At the start of my term as New TLD Applicant Group (NTAG) Chair, I wrote about the importance of the 50th ICANN meeting for applicants. The meeting is significant, not only as a milestone for ICANN, but also because it marks two years since ICANN began processing new gTLD applications. Two years in, the program is at an inflection point. The final initial evaluation result was published two weeks ago and the first ICANN auction will take place this week. more

Germany Investigating Legal Grounds to Destroy Servers Used to Carry Out Cyberattacks

Hans-Georg Maassen, Germany's head of the German Federal Office for the Protection of the Constitution says large amounts of data were seized during the May 20015 cyberattack on lower house of parliament (Bundestag). more

Auction to Sell .versicherung Top Level Domain

The Top-Level Domain (TLD) .versicherung (German word for INSURANCE) managed by dotversicherung-registry GmbH in Hamburg, will be holding an international auction executed by Right of the dot, LLC in Lauderdale USA in collaboration with Heritage Auctions. The auction will take place on 26th of August 2015, 10:00 am Eastern Standard Time (UTC -4:00). more

Controversy Looms as Pakistan Passes Cybercrime Law, Critics Say Violates Human Rights

Pakistan's National Assembly on Thursday passed the controversial cybercrime bill through a majority vote that prescribes a maximum penalty of 14 years in jail and 5 million rupees in fine for cyber-terrorism. more

The Fibre Optic Path

In August 1858, Queen Victoria sent the first transatlantic telegram to U.S. President James Buchanan. The cable system had taken a total of four years to build and used seven copper wires, wrapped in a sheath of gutta-percha, then covered with a tarred hemp wrap and then sheathed in an 18-strand wrap, each strand made of 7 iron wires. It weighed 550kg per km, with a total weight of over 1.3Mkg. more

France Drops Its Internet “Three Strikes” Anti-Piracy Law

France has put an end to its most extreme measure of its notorious "three strikes" anti-piracy law. "Getting rid of the cut-offs and those damned winged elephants is a good thing. They're very costly," Joe McNamee, of European Digital Rights. more

Apple vs FBI: Apple and Others to Argue on the Hill

Tomorrow afternoon at 1pm EST Apple will be giving testimony to the House Judiciary Committee. The session that Apple and others will be taking part in is aptly named, The Encryption Tightrope: Balancing Americans' Security and Privacy In common with other hearings the various witnesses called to speak have already submitted their written testimony, so we can already look at it and analyse it. more

Internet Governance: Coin of the New Realm

The Aspen Institute released the IDEA Common Statement and Principles as a do no harm Hippocratic Oath for Internet governance. The Aspen report describes the present moment as an inflection point for "the most robust medium of information exchange in history". Reed Hundt outlined the risks associated with Internet governance changes favored by China and a group of developing nations through the ITU. more

WikiLeaks’ Vault 7: CIA Gives a Free Lesson in Personal Cyber Security

WikiLeaks' newly released Vault 7 trove is a tantalizing study in how one of the world's premiere intelligence agencies hacks devices. Analysts and experts have signaled that this leak appears authentic based on some clues in the content. But while it may ultimately be comparable in size to the Snowden or Manning leaks, it lacks the "wow" factor that made those landmark whistleblowing cases so important. What lessons are to be learned from the leaks, and how should we apply them to our personal digital lives? more