/ Most Viewed

Obama Urges FCC to Treat the Internet As a Utility

President Obama released a letter today stating that Internet services -- including both wired and wireless Internet -- should fall under Title II of the Telecommunications Act. Reclassifying broadband this way would prevent providers such as Comcast from charging fees to companies like Netflix in exchange for faster delivery speeds. more

60 Minutes Investigates Cybersecurity and the Reality of Sabotaging Critical Infrastructure

CBS's 60 Minutes aired a special report last night investigating how hackers can get into the computer systems that run crucial elements of the world's infrastructure, such as the power grids, water works or even a nation's military arsenal. From the report: "At the Sandia National Laboratories, Department of Energy security specialists like John Mulder try to hack into computer systems of power and water companies, and other sensitive targets in order to figure out the best way to sabotage them. It's all done with the companies' permission in order to identify vulnerabilities. In one test, they simulated how they could have destroyed an oil refinery by sending out code that caused a crucial component to overheat." more

Have New Domains Had Our Twerking Moment?

There's a lot of .buzz about Google's new holding company, Alphabet. From .NYC to .London to .Tokyo the "new Google" story is making .news everywhere, as the .media large and small speculates on what it means for the .online and .tech industries, and beyond. After all, as one of the .top brands and companies in the .world, when Google makes a move it can have .global impact. more

A Consociational Bureau for the Internet Governance Forum

The principle that Internet governance "is a joint effort which requires cooperation and partnership among all stakeholders" (Geneva Declaration of Principles, para 20) has become axiomatic since it was first agreed at WSIS, and is fundamental to the IGF as a "new forum for multi-stakeholder policy dialogue" (Tunis Agenda, para 72). However at the same time as this principle has been universally embraced, some of its implications, that would require the four stakeholder groups identified in the Tunis Agenda to collaborate on the development of joint policy recommendations (Tunis Agenda para 72(g)) have met with resistance. That the strongest resistance has come from those stakeholders with the greatest investment in the existing Internet governance regime... more

DNS Abuse Definition: Attributes of Mitigation

A substantial amount of DNS community discussion on the topic of DNS Abuse is focused on defining what is or is not DNS Abuse. The definition adopted by ICANN contracted parties, as well as the DNS Abuse Institute, is straightforward: DNS Abuse is malware, botnets, pharming, phishing, and spam where it's a vehicle for the preceding harms. There is, of course, some fuzziness on the margins, where technical harms are also using content. more

TLD Expansion: ICANN Must Not Back Down

ICANN's plan to open up the domain name space to new top level domains is scheduled to begin January 12, 2012. This long overdue implementation is the result of an open process that began in 2006. It would, in fact, be more realistic to say that the decision has been in the works 15 years; i.e., since early 1997. That is when demand for new top-level domain names, and the need for other policy decisions regarding the coordination of the domain name system, made it clear that a new institutional framework had to be created. more

61 Businesses Tell ICANN New TLDs Are Needed to Help Consumers, Encourage Innovation, Avoid Chaos

Sixty-one businesses, organizations, and individuals, including many of the domain industry's major players, yesterday sent a letter to ICANN, detailing the reasons why new top-level domains are required without delay. If you're interested in top-level domains, or if you just want to understand why they are important to the Internet, this letter lays out the reasons clearly and succinctly, with a minimum of jargon. more

A Voting System for Internet by Domain Name Owners - Part II

This is the second part of a 2-part series article describing a method for voting among owners of domain names. To read the first part of this article click here.

After a ballot closes, each registrar will send the summary results to at least two vote counting entities. These organizations will tally summary results obtained from each registrar. The totals of the summary results will be cross-checked against totals from the other vote counting entities. more

What is Light-Touch Regulation?

One thing I've noticed recently is that a lot of people are climbing on board the idea of building better broadband to rural America. Many people seem to think that the FCC can somehow act to fix a lot of the shortcomings of rural broadband - but in doing so, they have missed the entire point of what the FCC calls 'light-touch' regulation - because, from a practical perspective, broadband is not regulated at all. more

China Blocks WhatsApp, Says Messaging Service Should Stop Spread of “Illegal Information”

WhatsApp is now broadly disrupted in China including text messages which were going through despite China's censorship of the app beginning mid-July which only effected photographs and video chats. more

NANOG 65 Report

NANOG 65 was once again your typical NANOG meeting: a set of operators, vendors, researchers and others for 3 days, this time in Montreal in October. Here's my impressions of the meeting... The opening keynote was from Jack Waters from Level 3, which looked back over the past 25 years of the Internet, was interesting to me in its reference to the "Kingsbury Letter". more

It’s Time to Rethink Outage Reports

Much has been said about the criticality of the small coterie of large-scale content distribution platforms and their critical role in today's Internet. These days when one of the small set of core content platforms experiences a service outage, then it's mainstream news, as we saw in June of this year with outages reported in both Fastly and Akamai. In the case of Akamai, the June outage impacted three of Australia's largest banks, their national postal service, the country's reserve bank, and one airline... more

NSA, Prism and Internet Exchange Points in Canada

As the operator of the registry for the .CA top-level domain and the domain name system (DNS) infrastructure that supports it, I am uncomfortable, though not surprised, with the knowledge that a government is monitoring the activities of Internet users. And while recent reports about the National Security Agency's top-secret PRISM program actively monitoring Internet users in the United States and (by default) citizens of other countries - Canada included - are on the front page of newspapers around the world, Internet surveillance is not exactly new. more

Equifax Hacked, Nearly Half of US Population Affected

In an announcement today, credit reporting giant Equifax revealed a cybersecurity incident potentially impacting approximately 143 million U.S. consumers. more

Automated Theft of Intellectual Property

A few days ago I wrote about a piece of my intellectual property, an article I wrote and posted on DaileyMuse.com, being stolen, plagiarized, and posted on another web site under a different authors name. I hadn't been looking for my work elsewhere, I was simply browsing the access logs and visiting other websites that stood out. As a result of finding my work posted elsewhere without my permission, I contacted the owner of the website by email and provided 24 hours to remove the content before I pursued legal action. more