/ Most Viewed

Wine Applications: Results of the New gTLD Prioritization Draw

There are 4 applications related to the wine business in the new gTLD program. Yesterday the new gTLD prioritization draw took place where each application was assigned a randomly-drawn priority number. These priority numbers are used to determine the order in which initial evaluation results are released. In the 1917 applications, 4 applications are related to wine. more

Google Playing to Win in the 700 MHz Auctions

Many say Google will bid to lose in the upcoming 700 MHz auctions and many more are equivocating. The idea is Google's entry alone will induce enough openness, and besides they couldn't afford to become an operator. This shows a total lack of understanding! more

American National Broadband Plan Good First Step

The National Broadband Plan that the FCC will present on 17 March will set the USA on a completely different telecoms path. This plan will hopefully show Congress that it is worthwhile making the legislative changes that will deliver the social and economic benefits of a national broadband infrastructure. more

No Virginia, You Have No Duty to Secure Your WiFi Access Point

Every now and again a report flies across the network about the police breaking down someone's door and attempting to arrest the home owner for bad things online - assuming that whatever happened from that person's Internet connection is their fault. Now there are lots of problems with this - lots of problems. But one of the big ones is that anyone can access an open access point... more

Reply-All Creates a DDoS Attack?

One can read in an Associated Press article that the US State Department have their email system bogged down due to too many people use the Reply-All function in their email client. IT Departments have asked people to not use Reply-All and also threaten with disciplinary action. To me, that is the wrong path forward. more

The Great Forking Bitcoins of China

Let's say I'm with the Chinese government and decide that I am tired of people evading currency controls and money laundering using Bitcoin. So we adjust the Great Firewall of China to block port 8333. We also add some proxies that allow some uncleared transactions from outside to flow into Chinese networks but not the other way and keep track of which ones we let through. Since a large fraction of the miners are inside China, and all of the hard currency exchanges are outside, this will cause a pretty serious fork. more

Will Googlerola Be Able to Fight Data Caps?

"Is Google Turning Into a Mobile Phone Company?" asks the headline in Andrew Ross Sorkin's New York Times story. Wrong question, IMHO. But is Google doing the deal at least partly to give it leverage over wireless providers? I think so. The biggest threat to the growth of Smart Phones and tablets and other Google businesses like YouTube is the imposition of data caps and metered pricing by wireless providers like at&t and Verizon Wireless. more

Prudential Settlements for Alleged Cybersquatting/Reverse Domain Name Hijacking Under the ACPA

Given the number of awards endlessly arriving from Panels appointed to decide cybersquatting disputes under the Uniform Domain Name Dispute Resolution Policy (UDRP) (ten to fifteen published daily), the sum total of grievants filing de novo challenges under the Anticybersquatting Consumer Protect Act (ACPA) is remarkably small -- one or two at most in any single year; and those rarely proceeding to summary judgment or trial. more

The Battle for IoT

There is an interesting battle going on to be the technology that monetizes the control of Internet of Things devices. Like a lot of tech hype, IoT has developed a lot slower than initially predicted -- but it's now finally becoming a big business. I think back to a decade ago when tech prognosticators said we'd soon be living in a virtual cloud of small monitors that would monitor everything in our life. According to those early predictions, our farm fields should already be fully automated, and we should all be living in the smart home envisioned by the Jetsonsmore

ICANN Issues Guidance to Domain Registrars and Registries in Light of Hurricane Maria

ICANN has issued a guidance notice to registrars and registries in relation to Hurricane Maria, which caused massive damage throughout the Caribbean. This isn't the first time that this has happened, with a previous incident in Asia triggering action from both registrars and registries to give domain name registrants impacted by the natural disaster breathing space. more

Should You Whitelist Your Vulnerability Scanning Service Provider?

Unlike consultant-led penetration testing, periodic or continual vulnerability scanning programs have to operate harmoniously with a corporation's perimeter defenses. Firewalls, intrusion prevention systems, web proxies, dynamic malware analysis systems, and even content delivery networks, are deployed to protect against the continuous probes and exploit attempts of remote adversaries -- yet they need to ignore (or at least not escalate) similar probes and tests being launched by the managed security service providers an organization has employed to identify and alert upon any new vulnerabilities within the infrastructure or applications that are to be protected. more

Come to the First Ever Dedicated New gTLD Conference: .nxt

Sometimes the heavens align. With the release of a number of resolutions from the ICANN Board on Sunday, we learnt two things: One, that there is a determined drive to get the rules for new Internet extensions, gTLDs, finalized in December at a meeting in Cartagena. And two, that the meeting immediately after that - in March 2011 - will be held in San Francisco. more

PRISM and the Administration State Strikes Back

It is a safe assumption that if you are reading this post, you like technology. If that is the case, then you understand the tremendous economic, cultural, and human rights benefits an open, universal, and free Internet provides. That freedom is under attack. And it is our responsibilities, as stakeholders in a successful Internet, to balance governments and have an open dialog on the topic. more

Wi-Fi 8: Beyond Speed, Towards Seamless Connectivity

As the IEEE 802.11 task force turns its attention to developing Wi-Fi 8, the next iteration of wireless networking standards, the focus has shifted from sheer speed to enhancing user experience. more

FCC Says Net Neutrality Rules to Cease on Jun 11

The Federal Communications Commission announced today that the landmark 2015 U.S. net neutrality rules will end on June 11. The FCC said the new rules will take effect 30 days from Friday, and confirmed to be Jun 11 according to Reuters. more