/ Most Commented

Cloud Computing Can Make You More Secure

The number one concern cited for avoiding cloud computing is security. And there is a reason for that. Cloud providers have demonstrated some spectacular failures in the past, including Amazon's near total shutdown of an entire region, Dropbox's authentication snafu, and innumerous cloud providers that go belly-up. However, in the long run, cloud computing is destined to become more secure than in-house IT. I will briefly describe two dynamics in the industry that point in that direction, with substantiating evidence. more

Thoughts About U.S. Government’s Decision on IANA Transition

Last week the government of the United States made an announcement that sent shockwaves through the Internet governance world. The National Telecommunications & Information Administration (NTIA), a division of the Department of Commerce, publicly stated that it will not be renewing its contract with the Internet Assigned Numbers Authority (IANA) past its September 2015 expiry date. The importance of this announcement cannot be underestimated. more

Aligning Broadband and Healthcare

For many years I have been saying that in order to generate business cases that will support the developments of national broadband networks it is necessary to take into account the social and economic benefits of such investments. The reality is that these benefits do not show up on the balance sheets of the traditional telecoms infrastructure companies and this is a key reason they are reluctant to make such investments. more

The Future of Communications Cross-Subsidies

It used to be so much easier to manage a system of cross subsidies for communications. If a regulator wanted consumer services to be subsidized by businesses, rural to be subsidized by urban, local subsidized by long distance, TV production subsidized by distribution, it could just issue an order to make it so. So let it be written; so let it be done. There were few, if any, other suppliers of those services, so there were limited arbitrage opportunities. more

The Name Collision Conference

Earlier this week Verisign sponsored a two day conference on name collisions in the DNS. Despite the very short time frame in which it was organized, only a month from announcement to meeting, there were some very good presentations. I'll just hit some highlights here; all of the papers and slides are on their web site at namecollisions.net. Sunday morning started with a keynote by Bruce Schneier, who is not a DNS expert (and doesn't claim to be) but had some interesting observations on names in general. more

Future of Cloud Computing and Why It’s Here to Stay

Nowadays, everybody is talking about cloud computing. Fans say it's the future, the answer to every problem with computing as we know it; others say it's just a fad and will eventually die. Who's right? While nobody knows the future, the fact is, enough evidence is available that we can all reasonably predict what's coming. Consider these facts... more

Thinking Outside the Internet

This is a talk I gave at Google in Cambridge January 6, 2014. Some may know this as Ambient or Borderless Connectivity, but I'm titling this post as "Thinking Outside the Internet." It builds on my Three Stages of Digital theme, outlining how we are shifting from a telecom-centric framing with meaning and value inside the wire to today's Internet in which meaning and value are no longer contained within channels. more

Mobile World Congress: 4G Technology Enters the Residential Market

We're just back from Mobile World Congress in Barcelona, Spain, where more than 85,000 attendees from over 200 countries gathered to discover what the 1,800 companies present had to showcase. As expected, some of the show's biggest themes focused on the Internet of Things, the mobile cloud, Big Data, 4G LTE and wearable devices... After speaking to a cross-section of service providers, it became clear that many operators are already starting to leverage their investment in existing 4G LTE infrastructure... more

Policy Advisory Board Model Now a Test of Multistakeholder Model

In early November 2013, prior to ICANN's Buenos Aires meeting, I published an article at this forum, Policy Advisory Boards – A Cornerstone PICS (Public Interest Commitment Specification), that extoled the advantages of adopting a Policy Advisory Board (PAB) model as a practical, effective, and least burdensome means of effectively implementing the request of ICANN's Governmental Advisory Committee (GAC) for consumer and competitive safeguards at sensitive new gTLD "strings" - especially those that are related to regulated industries and professions. It is deeply gratifying that the article has received nearly 9,000 views since first being posted and inspired considerable discussion. more

Who Are the Major New gTLD Applicants and… (Part Five: Rightside Registry)

Rightside is a name you may only have heard of very recently. It is a relative newcomer in the new gTLD industry. It is important to note that there is a difference between "Rightside" and "Rightside Registry". One is the Trademark and also the name of this new group to which eNom (a Registrar), Namejet (a platform to buy/sell domain names and Premium domains) and Name.com (another Registrar) belong. As for "Rightside Registry", it is the new name of the platform to operate new gTLD applications. more

Dynamic DNS Customers, Check Your Router Settings!

There have been quite a few news stories released over the last 24 hours regarding a wide-scale compromise of 300,00 Internet gateway devices. Here's the executive summary of what happened, how to check if you are vulnerable, and what you can do to fix it... If you use any of these devices, you should check it to ensure your device has not been compromised. more

How Can Managers Support Their Engineers Deploy IPv6?

After interacting with over 1000 network engineers during training sessions about what they think could help drive IPv6 deployment in Africa, I have come to the realisation that a three prong approach is required... Many training courses focus on the first issue, and quite logically, that's where the real work lies. I've developed such a course that has been delivered in over 45 countries, and there are lots of other great training available, both free and paid. more

Proposal Aims to End US Control of ICANN

A proposal involving removal of root zone management functions from ICANN and creating an independent and neutral private sector consortium is to be presented at the Singapore ICANN meeting March 21, and then formally submitted to the "NETMundial" Global Multistakeholder Meeting on the Future of Internet Governance in SaoPaulo, Brazil. more

Jeff Schmidt to Present Name Collision Management Framework at Research Workshop

I'm delighted to announce that the name collisions workshop this weekend will include Jeff Schmidt, CEO of JAS Global Advisors, presenting the Name Collision Occurrence Management Framework that his firm just released for public review. Jeff's presentation is one of several on the program announced by the program committee for the Workshop and Prize on Root Causes and Mitigations of Name Collisions (WPNC). more

Widespread Compromised Routers Discovered With Altered DNS Configurations

A widespread compromise of consumer-grade small office/home office (SOHO) routers has been discovered by threat intelligence group Team Cymru. According to the report, "attackers are altering the DNS configuration on these devices in order to redirect victims DNS requests and subsequently replace the intended answers with IP addresses and domains controlled by the attackers, effectively conducting a Man-in-the-Middle attack." more