In this article, published in the Federal Communications Law Journal (FCLJ), the authors (Reed E. Hundt and Gregory L. Rosston) have proposed sweeping changes to the current telecommunications regulatory regime. With impending reform in telecommunications laws, the authors argue that an important first step is the creation of a bipartisan, independent commission to examine and recommend implementation of more market-oriented communications policy. The following excerpt from the article looks into service competition with respect to VoIP... more
The IANA transition still appears to be on track for consummation at the end of the September 30th expiration date of the current contract between NTIA and ICANN in the wake of the May 24th Senate Commerce Committee oversight hearing on "Examining the Multistakeholder Plan for Transitioning the Internet Assigned Number Authority". That is, while there are clearly some concerns on both sides of the aisle about terminating the remaining U.S. government ties to ICANN... more
Traditionally, the Internet Corporation for Assigned Names and Numbers (ICANN) coordinates the Internet Assigned Numbers Authority (IANA) functions, which are key technical services critical to the continued operations of the Domain Name System (DNS)... ICANN has also evolved in its structures to use the 'Multistakeholder Model' in the dissemination of some of its functions and this has seen the creation of working groups and constituencies. more
There has been a lot of talk, blogging, tweeting and press reportage about the Epsilon breach, but little in the way of concrete information to consumers as to where they stand, if their personal information (PII) such as their name and email address has been lost to criminals. The CAUCE Board of Directors have developed the following FAQ that provides facts and guidance for those affected by the breach. more
As 2014 winds down, cloud spending is up. That's the word from research firm IDC -- as reported by IT Jungle, cloud spending will reach over $56 billion this year and won't stop anytime soon. By 2018, predictions peg the cloud as worth $127 billion, and that's just counting "core" cloud services such as SaaS, PaaS and IaaS. Cloud-based peripherals, the Internet of Things and other cloud initiatives are also on track to make an impact; here's a quick look at top cloud considerations for the coming year. more
Susan Crawford, special assistant to the president for science, technology and innovation policy and a member of the National Economic Council, is reported to be favorably inclined towards a U.S. network much like Australia's recently announced $33B broadband plan. Of course, the U.S. is some 15 times bigger than Australia, and that'd make the price tag closer to $500B by straight multiplication. But the U.S. would get a fiber network done right... more
I ought to explain why I've suddenly gone cold on VoIP. It's just I've watched my own behaviour. I've grown tired of the inconsistency of PC VoIP calls, and instead I've reverted to using landlines, mobiles and Jajah (for callback). But I'm still using IM to set up many of those calls! The problem isn't unique to any one client - they're all proving unsuitable for business use with clients (which is most of my telephony needs covered). The worst of all seems to be Skype conference calling... more
The proverbial Pandora's box that is opened whenever the topic of online copyright infringement is raised throws into sharp relief a host of challenges that have confounded policy makers, internet service providers and consumers for many years. Chief amongst them is how to strike an appropriate balance between protecting the rights of content owners while continuing to promote the interests of the public and preserving the benefits of the internet, given its unprecedented ability to facilitate the rapid dissemination of copyrighted content. more
Many C-level executives are unaware their IT organizations could be sitting on a lucrative sellable supply of unused IPv4 addresses. Assessing and executing on the opportunity takes planning, but there's a clear path for getting it done. In 2014 and 2015, buyers had their pick of large block holders with millions of available and unused numbers. This surplus allowed large buyers to shop around for the lowest offer and, as a result, drive prices down to a low of $4/number. more
Not so long ago, the notion of introducing laws and other regulatory responses to address cyber security issues was regarded with significant hesitation by governments and policy makers. To some extent, this hesitation may well have stemmed from a general perception by those who do not work directly in the field that the world of cyber security is somewhat of a 'dark art'. More recently, however, there has been a substantial shift in this attitude, with proposals to regulate a range of cyber security related matters becoming increasingly numerous. more
As ICANN prepares to expand the domain name space, calls grow for a public-law framework to govern the DNS root, ensuring global equity, transparency, and accountability in managing the Internet's core infrastructure. more
The Federal Communications Commission (FCC) has proposed rules and guidelines to enable satellite companies like SpaceX, T-Mobile, AST Spacemobile, and Lynk to offer satellite services directly to cell phones. more
This post follows an earlier post about DNS amplification attacks being observed around the world. DNS Amplification Attacks are occurring regularly and even though they aren't generating headlines targets have to deal with floods of traffic and ISP infrastructure is needlessly stressed -- load balancers fail, network links get saturated, and servers get overloaded. And far more intense attacks can be launched at any time. more
On Friday, 14 March 2014, the U.S. Department of Commerce National Telecommunications and Information Administration (NTIA) announced its intention to transition the IANA functions to the global multistakeholder community. As expected, the announcement has sent adrenaline coursing through the veins of Internet governance experts and government policy people the world over. I'd argue, however, that it is an important point for the Internet's technical experts to sit up and take notice, as well: the fact that you are probably saying "what problem does this solve?" is a testimony to how much works well today, and we want to make sure it continues to work well in any future arrangements. more
There may still be a few security practitioners working in the field who didn't have a copy of Bruce Schneier's Applied Cryptography on their bookshelf the day they started their careers. Bruce's practical guide to cryptographic algorithms, key management techniques and security protocols, first published in 1993, was a landmark volume for the newly emerging field, and has been a reference to developers ever since. more