/ Most Viewed

More Privacy for Domain Registrants – Heightened Risk for Internet Users

A recent exchange on CircleID highlighted a critical need for data to inform the debate on the impact of ICANN's post-GDPR WHOIS policy that resulted in the redaction of domain name registrant contact data. A bit of background: in my original post, I made the point that domain name abuse had increased post-GDPR. A reader who works with a registrar (according to his bio) commented: "Can you back up that statement with data? Our abuse desk has actually seen a reduction in abuse complaints." more

US, European Consumer Groups Call on FTC to Investigate Google for Deceptive Tracking of Users

Over 75 consumer groups in U.S. and Europe have asked the US Federal Trade Commission (FTC) to investigate Google for unfairly and deceptively manipulating users of mobile phones with its Android operating system by constantly tracking location. A letter sent to the FTC by the Transatlantic Consumer Dialogue (TACD), a forum of US and EU consumer organizations, says Google manipulates users into constant location tracking. more

“Restoring” Internet Freedom for Whom?

Recently, a colleague in the Bellisario College of Communications asked me who gets a freedom boost from the FCC's upcoming dismantling of network neutrality safeguards. He noted that Chairman Pai made sure that the title of the FCC's Notice of Proposed Rulemaking is: Restoring Internet Freedom. My colleague wanted to know whose freedom the FCC previously subverted and how removing consumer safeguards promotes freedom. more

Obama’s Tech Stimulus Plan: Health IT, Broadband, and Smart Grid

Steve Lohr has a nice piece in the New York Times ('Technology Gets a Piece of Stimulus,' 26 Jan 2009, p. C1) this morning about the role that technology and innovation will play in the economic recovery (aka stimulus) bill supported by the Obama Administration. In the past, health IT deployment has been approached as an engineering problem: what computers have to be part of which networks exchanging which types of data? This loses sight of the purpose of electronic medical records... more

Who Cares About 50,000 .CAT’s?

This past May 19th, 5 years after its sunrise, puntCAT arrived at the 50,000 domain names landmark. We know that, nowadays, 50,000 domain names may hardly be described as shocking news, and, certainly, this is not our limit, and we believe there's still plenty of room for .cat to grow. Then, who and why should care about this number? more

The Start of Something Big: ICANN Announces Planning for Round Two of New gTLDs

ICANN has published a short paper in advance of its 65th meeting in Marrakech which starts on 23 June 2019. Entitled, "ICANN Org's Readiness to Support Future Rounds of New gTLDs," it describes ICANN's working assumptions for "policy implementation and operational readiness for a subsequent round of new gTLDs". The document is necessary for ICANN to move forward with essential preparations for the next round. more

Bypassing Geo-Locked BYOD Applications

In the wake of increasingly lenient bring your own device (BYOD) policies within large corporations, there's been a growing emphasis upon restricting access to business applications (and data) to specific geographic locations. Over the last 18 months more than a dozen start-ups in North America alone have sprung up seeking to offer novel security solutions in this space - essentially looking to provide mechanisms for locking application usage to a specific location or distance from an office, and ensuring that key data or functionality becomes inaccessible outside these prescribed zones. more

Set-Top-Box Revisited: How Does the Gateway Solution Increase Competition?

The FCC seems determined in revisiting and repairing the current CableCard rules fiasco in which it chose to mandate a universal Set-Top-Box for Cable, Telco, and DBS providers. Where does a solution lie, and is the FCC going down another road of improbable acceptance? The problem with a CableCard solution, in an attempt to create more competition, was the opening of current provider STB's to access other venues, which turned out to be both technically and business concept unfriendly. more

Who Is Sending Email As Your Company?

You might expect that the IT department or security team knows who's sending email using your company's domains. But for a variety of reasons these groups are often unaware of many legitimate senders -- not to mention all the bad actors. Fortunately you can get a more complete view by using DMARC's reporting features. How does it happen? Product teams managing a new product launch or customer survey hire marketing consultants and Email Service Providers (ESP)... more

Green IT Revolutionizing UK Cyber-Infrastructure via Networks, Cloud, Outsourcing, Finan. Incentives

As readers of my blogs may know I have long argued that advances in research and education through cyber-infrastructure (or eInfrastructure) can be largely justified, if not entirely paid for through the energy savings of using clouds, networks or outsourcing. But a big impediment in adopting cyber-infrastructure in most jurisdictions is the lack of financial incentives. The energy savings of cyber-infrastructure are usually earned by the facilities or estates department or rarely based on to researchers and educators. more

Feds Confirm Cyberattack Caused Nation’s Critical Suicide Helpline Outage

Federal officials have confirmed that a cyberattack caused a nearly day-long outage of the United States's 988 mental health helpline on December 1st, 2020. The Substance Abuse and Mental Health Services Administration (SAMHSA) revealed that the attack occurred on the network of Intrado, the company that provides telecommunications services for the helpline.  more

Battling Over Clouds

More than 40 years ago, the FCC was worried about telephone companies using their power over communications to control the then-nascent (and competitive) data processing marketplace. The Bell System at that point was already banned from providing services that weren't common carriage communications services (or "incidental to" those communications services)... In a 1999 article in the Texas Law Review, Steve Bickerstaff pointed out that Computer 1 meant that no one could provide a "computer utility" service... Today, we'd call the "computer utility" something different -- we'd use the term "cloud computing." more

NJ Man Arrested for Domain Name Theft and Sale on eBay

A man from the northern New Jersey area was charged and arrested for stealing a domain name belonging to the owners of P2P.com. According to reports, he allegedly transferred the ownership of the domain name to himself and succeeded in reselling it on eBay to a professional basketball player Mark Madsen of the Los Angeles Clippers. more

White Spaces: Timing

Last week's emergency petition by the broadcasters to delay the FCC's Nov. 4 vote is just part of the white spaces atmosphere right now. Ars Technica reports that the mud is really flying -- the broadcasters are accusing proponents of white space use of wanting to kill off television. It's a familiar argument -- "If you do Y, broadcast television as we know it will be destroyed." more

Ferocious FttH Competition in China

Most of the discussions, analyses and comments regarding the strategic issues in telecommunication are still focussed on the mature markets in Europe and North America, where there are well-established policies and regulations with institutions that have been in existence for many decades. Occasionally one hears claims that we are reverting back to old telecoms policies and regulations, as, for example, was the case with the FCC proposal for its Title II legislation. more