In follow up to August 1st ruling against Comcast, Federal Communications Commission (FCC) in a 67 page order released today has given Comcast 30 days "to disclose the details of their unreasonable network management practices, submit a compliance plan describing how it intends to stop these unreasonable management practices by the end of the year, and disclose to both the Commission and the public the details of the network management practices that it intends to deploy following termination of its current practices." more
Afilias, headquartered in Dublin, is set to float on AIM with new shares issued by the company expected to raise approximately $100m. Hal Lubsen, Chief Executive Officer of Afilias says: "Today's announcement is an important step in the next phase of our growth, as we look to be a key player in the new programme of TLDs, and make selective acquisitions to increase the breadth and depth of our services and reach." more
Stéphane Bruno writes: "In the first few hours that followed the earthquake, mobile service was completely disrupted. It was almost impossible to place a call, due to the combination of the damages on the cellular networks and the spike in phone calls. However, on some networks, SMS service was still available. People stuck under rubbles started texting to their friends and family (in Haiti and abroad) to tell them they were still alive and needed help. Those friends and family, not knowing what to do, started posting these SOS messages on their social networks, mainly on Facebook." more
For the first time in recent Internet history, a new submarine cable carrying live traffic across the South Atlantic was activated, directly connecting South America to Sub-Saharan Africa. more
To date, the FCC has posted 27,063 comments it has received from the Citizens of the United States about its Network Neutrality NOI, aka Broadband Industry Practices WC Docket No. 07-52 [.doc, .pdf]. The first hundred are here, with links to the rest. more
As we approach the World Cup in South Africa this June it's heartening to see the amount of attention being paid to the continent. As with ICANN's recent Nairobi meeting, the eyes of the world are focusing on Africa in a new way -- as a sophisticated marketplace, and as a destination for investment, technology, and yes, sports... Still, as we prepare for the Cup and as we celebrate ICANN's recent approval of more Internationalized Domain Names (IDNs), our job as an Internet community remains unfinished. Too many scripts and thus too many key voices remain "off the pitch". more
Microsoft is shipping a patch to eliminate SHA-1 hashes from its update process. There's nothing wrong with eliminating SHA-1 - but their reasoning may be very interesting. SHA-1 is a "cryptographic hash function". That is, it takes an input file of any size and outputs 20 bytes. An essential property of cryptographic hash functions is that in practice (though obviously not in theory), no two files should have the same hash value unless the files are identical. more
On July 25th ICANN announced the publication of the Draft Report of the Independent Review of the Trademark Clearinghouse (TMCH). This study was coordinated for ICANN by the Analysis Group, in conjunction with researchers from the Center for Internet and Society at Stanford as well the University of Pennsylvania's Wharton School... while public comments on the draft report will be accepted through September 3rd, this Report was triggered by GAC concerns expressed before the Applicant Guidebook for the new gTLD program was even completed, and is not the work product of a GNSO-created working group and therefore will not directly result in the establishment of any new ICANN policy. more
Ah, BYOD. How I love thee. BYOD, or "Bring Your Own Device", gives me choices. I can use a device at work I actually like and am most effective with. (How did I ever get by without my iPad?) But BYOD comes with challenges. Personal devices can be infected with malware. Once they're connected to an enterprise's network, they can be controlled by a bot master to hijack enterprise resources and wreak havoc as part of a botnet. more
According to various news outlets, Russia is reported to be planning a complete Internet shut down, as part of a test of its cyber-defenses. more
Wout de Natris writes to report: "EU Commissioner for the Information Society Neelie Kroes today launched the EU co-funded project for the Internet of the future in which everything will be connected to everyone in the cloud. Here's the link to Mrs. Kroes' speech." more
Most people - mistakenly - believe that they are perfectly safe behind a firewall, network address translation (NAT) device or proxy. The fact is quite the opposite: if you can get out of your network, someone else can get in. Attackers often seek to compromise the weakest link in a network and then use that access to attack the network from the inside, commonly known as a "pivot-and-attack." more
According to a recent Homeland Security News Wire article, nearly 8 million patient medical records were compromised over the course of the previous two years due to data security breaches. As more hospitals and patient care providers move to store patient data electronically -- primarily as a cost savings effort -- the risk and exposure of our private medical information increases while our individual control over this information diminishes. more
With just a little more than three months left in 2016, the number of domain name disputes filed at the World Intellectual Property Organization (WIPO) appears to be headed for a record year. According to public data published on the WIPO website, the current number of domain name disputes filed this year (as of this writing, September 27, 2016) is 2,228 - which would indicate that the total might reach 3,011 cases by December 31. more
Canadian Prime Minister Justin Trudeau on Wednesday told reporters that President Donald Trump's plan to roll back net neutrality protections for the internet "does not make sense". more