No censure attaches to having domain names registered by proxy/privacy services. However, while the practice has become routine for protecting privacy and sensitive information, registering in the name of a proxy is still taken into account in assessing intention, and even circumstantial evidence without contradiction or explanation can tip the scale in complainant's favor. more
Russia's Ministry of Digital Development is set to invest nearly 60 billion rubles ($660 million) over the next five years to enhance its internet censorship system, according to a government proposal revealed by Reuters. more
Is the global, open Internet moving away from a network of networks that is universally accessible to a series of networks fragmented along policy, technical or economic lines? As some governments pass laws related to data localization and restriction of cross-border data flows, what will the impact be? What about the increasing use of DNS and content filtering? What other factors have the potential for causing fragmentation? more
Earlier this week, Facebook expanded the roll-out of its facial recognition software to tag people in photos uploaded to the social networking site. Many observers and regulators responded with privacy concerns; EFF offered a video showing users how to opt-out. Tim O'Reilly, however, takes a different tack... O'Reilly's point - and face-recognition technology - is bigger than Facebook. more
The last few years have shown us how the Internet shrinks distances between distributed teams, organizations and families. This poses a challenge for some organizations. Many business relationships and contractual agreements involving the Internet have geographical implications and restrictions. This matters to anyone operating a network. It is most important for networks that get new address space. more
I think the concept that I have to explain the most as a consultant is oversubscription, which is how ISPs share bandwidth between customers in a network. Most broadband technologies distribute bandwidth to customers in nodes. ISPs using passive optical networks, cable DOCSIS systems, fixed wireless technology, and DSL all distribute bandwidth to a neighborhood device of some sort that then distributes the bandwidth to all of the customers in that neighborhood node. more
The Joint Commission, a healthcare accreditation agency, has advised hospitals and health systems to brace for at least a month of downtime following a cyberattack, according to The Wall Street Journal. This recommendation is part of new guidelines released by the agency for handling IT security events. more
Tim Berners-Lee is in Washington urging lawmakers to reconsider the rollback of net neutrality laws. more
Brendan Sasso reporting in the Hill: "Julius Genachowski, chairman of the Federal Communications Commission (FCC), issued a statement late Wednesday slamming Russia for passing a bill that would allow the government to blacklist certain websites. He said the country had moved in a 'troubling and dangerous direction.' ... 'The world’s experience with the Internet provides a clear lesson: a free and open Internet promotes economic growth and freedom; restricting the free flow of information is bad for consumers, businesses, and societies,' he said. more
Last January, Doug Madory of Dyn Research reported on Cuban traffic, noting that C&W's share had increased. And this week Madory reported that ETECSA had activated a new internet transit provider, medium-Earth orbit (MEO) satellite-connectivity provider O3b Networks (Other 3 billion), replacing geostationary satellite provider Intelsat... the time for a data packet to travel from earth to an O3b satellite and back to Earth is significantly less than to an Intelsat satellite. more
George Reese (author of the new book Cloud Application Architectures: Building Applications and Infrastructure in the Cloud) is talking at Gluecon about securing cloud infrastructures. Two recent surveys found "security" was the number one concern of companies considering a move to the cloud. George says the key to making customers comfortable with cloud security is transparency... more
As my learned friend John Levine has noted, rightly, any policy that anyone has come up with thus far regarding net neutrality is based upon a Telco model. Now, think about that for a second. A telephone call costs pretty much the same if you whisper or shout. It costs the same if you make a quick phone-call or you yack for hours. These days, even long distance is trivially inexpensive, because the capacity to carry the world's phone-calls is well beyond any foreseeable demand. There is huge headroom. more
The FCC is engaged in researching and preparing a National Broadband Plan which is due to Congress in February 2010. The FCC has released a Notice of Inquiry soliciting comments for the plan and is currently actively holding a lengthy series of workshops exploring the different aspects of what might go into the plan. more
This year, the IGF Multistakeholder Advisory Group which provide assistance in the preparations for Global IGF meetings called for Intersessional work (activities that are pursued in the months between annual IGFs with the aim of helping the IGF produce more tangible outputs that can become robust resources). Previously, the IGF has used best Practice Forums and Dynamic coalitions to bring out key issues that affect the world as it relates to the Internet. This year's Intersessional activity is centred on "Policy Option for connecting the Next Billion". more
The long rumored reorganization of the telecommunications sector in China has begun. Now China will have three major companies, each with both mobile and fixed networks. The focus for fixed network growth is broadband Internet access. The focus for mobile will be continued growth in mobile subscribers and the launch of 3G services, with the three companies using three different 3G technologies. more