If you're interested in learning more about Internationalized Domain Names (IDNs), UNESCO and EURid recently released a report on the evolution and challenges of IDNs. It's a good read and it highlights some of the struggles that countries and registries face and taking IDNs mainstream. Though Russia has so far proven to be a major success story - with more than 800,000 IDN registrations so far (and counting) - most other IDNs are have a long ways to go yet. more
Mike Hammer's thoughtful article, A Few Thoughts on the Future of Email Authentication, should trigger thoughtfulness in the rest of us. Email abuse has been around a long time. Anti-abuse efforts have too. Yet global abuse traffic has grown into the 90+% range, with no hint of trending downward. The best we hear about current effectiveness is for last-hop filtering, if you have the money, staff and skills to apply to the problem... more
Despite positive discussions currently underway at the ICANN54 meetings in Dublin regarding protection of privacy services for domain name registrants, another meeting in Paris seems to be contradicting the efforts. more
The FCC recently published some tools to let consumers measure some internet characteristics. The context is the FCC's "National Broadband Plan". I guess the FCC wants to gather data about the kind of internet users receive today so that the National Broadband Plan, whatever it may turn out to be, actually improves on the status quo. The motivation is nice but the FCC's methodology is technically weak. more
Thousands of TalkTalk and Post Office customers in the UK have had their Internet access cut by an attack targeting certain types of Internet routers, according to a BBC report on Thursday. more
As we approach the WSIS+20 Review, the future of Internet governance is at a crossroads. In its January 29th submission, the Regional Commonwealth in the Field of Communications (RCC) - representing Russia, Armenia, Azerbaijan, Kyrgyzstan, Uzbekistan, Tajikistan, and Rostelecom - advocates for a state-led governance model that challenges the Western-led multistakeholder approach. The submission reflects an ongoing ideological divide between sovereignty and openness in digital governance. more
Internet Governance, like all governance, needs to be founded on guiding principles from which all policymaking is derived. There are no more fundamental principles to guide policymaking than the Universal Declaration of Human Rights (UDHR). This article, Part 7 of a series, looks at Articles 20 and 21 and explores how principles in the UDHR and lessons learned over the last half-century help define the rights and duties of one's engagement in the digital spaces of the Internet ecosystem. more
As society uses more digital technologies we are increasingly also faced with its problems. Most of us will have some horror stories to tell about using computers, smartphones, and the internet. But this hasn't stopped us from using the technology more and more. I believe that most people would say that their lives would be worse without technology -- in developed countries but equally in the developing world. more
The possibility of unauthorized access to EPA information raises an array of concerns since EPA-held data includes various types of Confidential Business Information, scientific research data, environmental databases, agency plans for responding to "incidents of national significance" and other security-related matters, and environmental monitoring data used in regulatory enforcement actions. more
I recently participated in two Comverse events, and once again the message was driven home to me about the enormous opportunities that lie ahead of the industry in the field of new telecoms applications. The middleware and cloud applications that are now appearing at the edge of the network will of course, be further developed once high-speed broadband becomes available, but already they are having an enormous impact on the telecoms market. The new user experiences that can be obtainable through these applications will enrich fast broadband networks beyond recognition. What we now have is, on the one hand, the Over-The-Top (OTT) applications that have conquered the world... more
One of the most difficult elements in the development of smart cities is how to finance them. Local government doesn't have the money for it and while state and federal governments might have more money to spend there is no way that their current tax funds could pay for even a fraction of the investments that are needed. Indeed the reality is that in order to create a smart city... massive up-front investments are needed. more
ICANN's web site has a press release saying that the were granted a temporary restraining order on Monday requiring that Registerfly cough up all the info on their registrants, or else.
My assumption all along has been that the reason that Registerfly hasn't provided full info is because they don't have it. ICANN agrees that they got partial data last month, and it's hard to imagine a reason that Registerfly would have given them some of the data but deliberately held back the rest. I guess we'll know soon enough.
By the way, I hear that ICANN plans to implement their registrar escrow policy, the one that's been in the contracts since 2000, pretty soon. more
In the business world, there are two main paths a company can take with cybersecurity -- the reactive and the proactive approach. The problem with a purely reactive attitude is that it can easily put companies in constant firefighting mode. And for small companies with limited resources, this can turn out to be an increasingly uncomfortable place to be in.
With that in mind, experts today suggest proactive cybersecurity by monitoring suspicious activity and identifying risks before they turn into full-blown attacks. more
Heartbleed, for anyone who doesn't read the papers, is a serious bug in the popular OpenSSL security library. Its effects are particularly bad, because OpenSSL is so popular, used to implement the secure bit of https: secure web sites on many of the most popular web servers such as apache, nginx, and lighttpd. A few people have suggested that the problem is that OpenSSL is open source, and code this important should be left to trained professionals. They're wrong. more
As digital transformation has been picking up momentum, leading analysts such as 451 Research have suggested that hybrid multi-clouds and automated DevOps will become key constituents powering enterprises in the new era. At the heart of these enabling technologies lies Lifecycle Service Orchestration (LSO) designed for near-autonomous application deployment across hybrid infrastructures consisting of traditional on-premise data centers and public clouds. more