/ Most Viewed

Where Did “Data Shadow” Come From?

Anyone who works in privacy is familiar with the term "data shadow": the digital record created by our transactions, our travels, our online activities. But where did the phrase come from? Who used it first? A number of authors have attributed it to Alan Westin, whose seminal book Privacy and Freedom (largely a report on the work of the Committee on Science and Law of the Association of the Bar of the City of New York) set the stage for most modern discussions of privacy.  more

US Senate Committee Holds Hearing on ICANN’s New TLD Expansion

As previously noted, the U.S. Senate Committee on Commerce, Science, and Transportation today held a full committee hearing on ICANN's expansion of top level domains (TLDs). The hearing was held to examine the merits and implications of the program and ICANN's efforts to address concerns raised. ICANN will begin accepting applications for new TLDs on January 12, 2012. more

DNS Resolvers and DNSSEC: Roll Over and Die?

Security is great when all the green lights are shining brightly and everything validates as intended, but what happens when you encounter failure? In this work we examine the behaviour of the DNS when security, in the form of DNSSEC is added, and we look at what happens when things do not happen as intended. What triggered this examination was a sudden increase in the traffic generated by secondary servers for the in-addr.arpa reverse zones in December 2009. more

How the Registrar Cash Flow Model Could Collapse with New ICANN gTLDs

New top-level domain applicants are getting plenty of advice nowadays about how to launch their new Registry. In addition to thinking about their branding and distribution, they should also be thinking about their business practices with Registrars. What many of them do not realize is that their cash flow practices, with respect to Registrars, may be a factor of whether ICANN Registrars even support their Registry. more

Proving Common Law Rights Predating Domain Name Registration

The trademark rights required for standing under paragraph 4(a)(i) of the Uniform Dispute Resolution Policy (UDRP) refer to both registered and unregistered rights. Complainants with registered trademarks satisfy the requirement by submitting their certificates of registration. However, and not surprisingly, complainants with unregistered trademarks have to demonstrate that the alleged marks qualify as such, which requires that complainants prove both secondary meaning of the marks and their distinctiveness prior to the registration of the domain name. more

ICANN Can’t Take Care of Everything

Bruce Young tells a story of an Internet user who gets into trouble because "his" domain name was registered in the name of a web hosting provider that went bankrupt later on...As far as registrars are concerned, ICANN is currently doing its homework on domain name portability. As far as web hosting companies are concerned, though, these suggestions only look appealing at first sight. Upon closer inspection, they wouldn't be good policy... more

Steve Jobs: Apple is a Mobile Device Company

Apple CEO, Steve Jobs today announced the highly anticipated iPad and told the crowed that the company is now a $50 Billion a year company -- the majority of it being from sales of mobile devices including iPod, iPhone, and laptops. Now with the introduction of iPad, Jobs calls apple a mobile device company: "Apple is a mobile devices company. This is what we do." Jobs says Apple is the number one mobile devices company in the world. more

The Changing Role of IP Addresses in the Architectural Evolution of the Internet

I work at APNIC, the Regional Internet Registry that serves the Asia Pacific Region. APNIC provides common infrastructure services for the region that support the unique assignment of IP address blocks to Internet network operators within our region through the operation of an address registry. In short, IP addresses are what we do. So, when there are discussions in technology circles about evolving the Internet's address model in varying ways,... more

Google Launch of DNS Service and OpenDNS Reply

Earlier today Google announced the launch of their new DNS service. They're pushing it as part of their "better experience" and "speed" drive that Matt Cutts and Co have been harping on about for the last while. OpenDNS, however, has been offering a similar service for quite some time... So it was quite interesting to read OpenDNS' response to the Google service. more

Why Wireless Broadband Is No Alternative to FttH

The mainly politically-driven debate - FttH versus wireless broadband - is spreading uninformed messages and half-truths in the market. And confusing messages from mobile operators are also blurring the picture. All well-informed people confirm that this is a nonsensical debate -- both infrastructures will coexist with, and supplement, each other. more

Email Recommendation Engine for ESPs – Text Length Optimization (Part II)

Popular email editors today have no way to optimize for text length. An email marketer may attempt to build her content but has no idea whether that content is optimized related to word count for a specific industry/client. As it relates only to text length, does the email have too many or too few words. Currently, there is no built-in predictive model to inform her. Well, until now. Last month we described an evolutionary real-time data-driven process for email campaign builders to have at their disposal. more

Google Building a Third Data Center in Singapore to Keep up With Rapid Growth in the Region

Google built its first Southeast Asia data center in Singapore back in 2011 and quickly expanded to a second building in 2015. more

US Department of Defense Getting Aggressive on Adoption of Cloud, Machine Learning

The US Department of Defense is seeking private sector's help to "vault DOD" into the world of elastic computing, data management and analytics, cybersecurity, and machine learning. more

The Story of Conficker and the Industry Response

On November 2, 2009, Microsoft released its seventh edition of the Security and Intelligence Report (SIR). The SIR provides an in-depth perspective on the changing threat landscape including software vulnerability disclosures and exploits, malicious software (malware), and potentially unwanted software. Using data derived from hundreds of millions of Windows computers, and some of the busiest online services on the Internet, this report also provides a detailed analysis of the threat landscape and the changing face of threats and countermeasures and includes updated data on privacy and breach notifications. The following is an excerpt from the SIR, pp 29-32, about the Conficker worm and the industry response that showed an incredible amount of collaboration across vendors. more

Deep Packet Inspection: When the Man-In-The-Middle Wants Money

Say you're walking down the sidewalk having a talk with your best friend about all kinds of things. What if you found out later that the sidewalk you were using wasn't really a sidewalk -- but instead a kind of false-front giant copying machine, unobstrusively vacuuming up what you were saying and adding to its database of information about you? Or, say you send a letter to a client of yours (to the extent you still do this), and it turns out later that your letter was intercepted, steamed open, and the contents were read... more