The steepening trajectory towards event-driven and real-time API architecture is imminent. This means incorporating event-based APIs into a technology strategy and leveraging existing API legacy systems that may have incurred a fair amount of technical debt, especially for historically progressive organizations. more
The internet affects every individual in this world whether directly or indirectly. For example, a medical professional somewhere in Goma, Congo might access the internet to read and post reviews to current medication available and this might have an impact on the kind of medication that he/she recommends to the patient, whether the patient has access to affordable internet or not. Since the internet affects everyone, Africans citizens who are aware of internet governance discussions, expect African stakeholders to engage in these discussions. more
It was with great interest that I read a recent announcement about a plan by the International Telecommunications Union (ITU) to publish template answers on a wiki for the 22 questions relating to registry technical operations contained within ICANN's new Top-Level Domain Applicant Guidebook. As someone who has spent the best part of six years following the development of the program (witnessing first-hand each evolution of the Applicant Guidebook) my first thought was one of bemusement... more
In 1991, eight high-level Soviet officials attempted a coup that failed after two days. During those two days, citizen journalists and activists used Usenet newsgroups to carry traffic into, out of and within Russia (70 cities). News spread and protests were organized in Russia. In the west, we saw images of Boris Yeltsin speaking to demonstrators while standing on top of a tank and the Russians saw that we were aware of and reporting on the coup. more
Karachi-based Bank Islami revealed Saturday morning that it had detected abnormal transactions resulting in 2.6 million Pakistani rupees, roughly $19,500 and precautionary steps where taken immediately. more
The Electronic Frontier Foundation (EFF) has voiced concerns about the European Union's proposed Cyber Resilience Act (CRA), saying it could pose significant threats to open-source developers and cybersecurity. more
Last year, I reported on the possibility that LEO (Low Earth Orbit) satellite-based systems might be a gamechanger for the delivery of high-speed data services, including internet access, to people in regional and remote Australia. What has become clear with the rollout of the NBN is that the quality of data connections in metropolitan cities in many cases has improved, but that the rest of Australia doesn't have a similar experience. more
U.S. Departments of Commerce and Homeland Security have released a road map setting out steps to stop the cyber threat to nations internet infrastructure, announced NTIA. more
There was a major attack launched against long-haul fiber networks outside of Paris, France, on April 27 of this year. It appears that there was a coordinated attack by vandals to cut three long-haul fiber routes simultaneously. Fibers were cut with what seemed like a circular saw, and sections of fiber were removed to make it hard to make repairs. These were backbone fibers that were shared by multiple ISPs. more
Apple Computer's AirPort Utility, Version 6.0 was criticized this week at the North American IPv6 Summit for no longer being compatible with IPv6. The previous Version, 5.6, offered IPv6 service by default. "Comcast, for example, is urging its subscribers that are interested in using IPv6 not to upgrade to AirPort Utility Version 6.0 if they use the OS X Lion operating system because of incompatibilities with IPv6." more
On 18th February, 2016, Uganda Communications Commission, the Telco regulator, ordered all ISPs to sever access to Facebook, Twitter and WhatsApp. 11 million Internet users, including myself were forced to live through a four-day Internet blackout. With this unprecedented move, Uganda joined Syria, Russia, Egypt, Burundi and other regimes that have weaponized the Internet to curtail free speech and access to information. more
few 'big picture' thoughts on the Netmundial meeting in Brazil this week and its final outcome document, adopted by its high level committee. Overall, there are some truly amazing and forward-looking principles supported in the "Netmundial Multi-Stakeholder Statement" that we as civil society should be proud of, and especially our civil society representatives who worked tirelessly for this achievement. more
No, that title is not a typo. The WHOIS service and the underlying protocol are a relic of another Internet age and need to be replaced. At the recent ICANN 43 conference in Costa Rica, WHOIS was on just about every meeting agenda because of two reasons. First, the Security and Stability Advisory Committee put out SAC 051 which called for a replacement WHOIS protocol and at ICANN 43, there was a panel discussion on such a replacement. The second reason was the draft report from the WHOIS Policy Review Team. more
A recent paper released by by Urs Hölzle and Luiz André Barroso of Google's infrastructure design and operations team provides an introduction into today's high scale computing along with factors influencing their design, operation, and cost structure. From the abstract: "As computation continues to move into the cloud, the computing platform of interest no longer resembles a pizza box or a refrigerator, but a warehouse full of computers. These new large datacenters are quite different from traditional hosting facilities of earlier times and cannot be viewed simply as a collection of co-located servers..." more
During the two-day Cybersecurity in Civil Aviation conference, Poland announced an agreement to test a cybersecurity pilot program for the aviation sector as Europe's European Aviation Safety Agency (EASA) civil aviation authority face increasing threats posed by hackers to air traffic. more