Since ????. (.web in Arabic and pronounced "dot shabaka") launched as the world's first new Top-Level Domain in 2014, we've faced many hurdles in growing adoption of Arabic domain names. From universal acceptance and general awareness issues to a lack of Registrars with Arabic retail interfaces -- the challenges have been numerous and varied. However, according to a new ICANN-commissioned study released this week - one of the first to investigate the Middle East DNS sector - there is much to celebrate too. more
As I type these words, I am perched on one of the benches in the main thoroughfare of the cavernous venue hosting Mobile World Congress (MWC). Above me is a video screen warning me of the perils of the infamous local pickpockets, so I know I'm definitely in Barcelona! In its current form, MWC has been the mainstay event of the telecoms business for a decade, and its roots go back to the late 1980s. The slogan of this year's event is "Mobile is Everything". I believe this phrase is a symptom of an industry suffering from dangerous strategic drift. Here's why. more
While most of the recommendations included in the Cross Community Working Group on Enhancing ICANN Accountability (CCWG-Accountability) Report are much needed reforms to ICANN's accountability mechanisms, the proposal also contains a fundamental flaw, which jeopardizes its overall acceptance and risks delaying the IANA transition process further: it changes the role of governments from "advisory" to "decisional" over ICANN's governance, and it separately enhances the power of governments over ICANN's board of directors. more
When 2015 began, there were several million IPv4 numbers still in the American Registry for Internet Numbers (ARIN) IPv4 free pool, ARIN was processing 4-5 unique IPv4 transfer transactions per month, and fewer than 5 million numbers had been transferred publicly in the prior 12 months. The end of 2015 told a different story. In late September, the ARIN free pool was depleted. more
Tomorrow afternoon at 1pm EST Apple will be giving testimony to the House Judiciary Committee. The session that Apple and others will be taking part in is aptly named, The Encryption Tightrope: Balancing Americans' Security and Privacy In common with other hearings the various witnesses called to speak have already submitted their written testimony, so we can already look at it and analyse it. more
For years, the question of exactly when to register a domain name has been one asked by legal departments, as they've sought to formalize their internal processes. If you were to think about it logically, it would make most sense to register it after the trademark had been cleared. After all, why bother to register a domain, if you aren't going to use it to support a product, service or campaign? more
During Q4, repeat DDoS attacks were the norm, with an average of 24 attacks per targeted customer in Q4, reports Akamai in its newly released Q4 2015 State of the Internet - Security Report. more
The newly proposed British spying law, the Investigatory Powers Bill (IPB), is reported to include methods that would permit the British government to order companies like Apple to re-engineer their own technology, similar to current demands from the FBI. In addition, if the law passes, it would be accompanied by a gag order. more
It is rather amazing to follow the reporting on the FBI vs Apple case in relation to the FBI's order to Apple to provide them with software that would allow them to crack the security code on all Apple phones. In some of those reports spin doctoring from the FBI -- especially through the public media -- led you to believe that Apple is not willing to assist the FBI in the San Bernardino murder case. This is, however, blatantly false. more
Google, Facebook, Twitter and Microsoft are among tech companies that have joined Apple in its iPhone fight with the U.S. government, according the latest report from the Wall Street Journal. more
The North American Network Operators Group (NANOG) continues to be one of the major gatherings on network operators and admins, together with the folk who work to meet the various needs of this community. Their program committee produces a program that never fails to provide thought provoking interest. Here are my reactions to some of the presentations I heard at NANOG 66, held in San Diego in February. more
Distributed Denial of Services (DDoS) attacks have been the frustration of information technology professionals for many years. When asked, most tell you they wish their internet service providers (ISPs) would simply provide them "clean pipes" all the time and take care of DDoS attacks upstream before they ever get to them. Unfortunately, the resources (equipment and personnel) necessary to clean Internet connections all the time are very expensive and come with several downsides. more
On 18th February, 2016, Uganda Communications Commission, the Telco regulator, ordered all ISPs to sever access to Facebook, Twitter and WhatsApp. 11 million Internet users, including myself were forced to live through a four-day Internet blackout. With this unprecedented move, Uganda joined Syria, Russia, Egypt, Burundi and other regimes that have weaponized the Internet to curtail free speech and access to information. more
By 2020, some 50 billion devices are expected to connect to the Internet and the economic value created by IoT could be worth as much as $11.1 trillion -- roughly 11% of the global economy by 2025, according to a new report released by AT&T. more
Google has announced its first initiative out of Jigsaw which is the expansion of its experimental service, Project Shield. Google is offering Project Shield as a free service leveraging Google technology to protect news and free expression sites from DDoS attacks on the web. more