/ Most Viewed

Google Not the Only Company Testing Wireless Access by High-Altitude Balloons

Oceus Networks Inc., a mobile 4G LTE broadband networking provider, recently demonstrated the efficacy of a deployable 4G LTE solution on a high-altitude balloon platform, which can be used to rapidly provide broadband coverage and communications services to first responders within the first 72 hours following an emergency or natural disaster. more

Tracking Outages

The idea of tracking data outages spawned from an early discussion on the outages forum including feedback from an outages survey about having a status page for (un)planned outages as a central resource. The purpose of such effort is to have a wider focus that one could view as opposed to having to check dozens of provider status pages. There were many ideas put forth but nothing really panned out and things kinda fell on the back burner. more

Google’s “Deeply Disturbing Invasion of Privacy” Being Investigated by Connecticut AG

What happens to companies when they get too big for their own good? Do they inadvertently do things that potentially harm our privacy (think Facebook)? Or, do they simply make mistakes that violate our privacy? Well, last month Google revealed that its Street View cars "mistakenly" captured content flowing over wireless networks -- a potential invasion of privacy. more

Dot-Sucks TLD Accused of Predatory, Exploitative and Coercive Practices

Kieren McCarthy reporting in the Register: "The intellectual property constituency (IPC) of domain overseer ICANN has formally asked the organization to halt the rollout of the controversial .sucks top-level domain, due to start on Monday." more

ITU-T - Still Living in 1924

Sometime later this year - at a venue still unknown - something short of a thousand people from around the world will gather together and engage in a now meaningless ritual almost exactly like they did in 1924. In the 1990s the name of the gathering was changed from the CCITT Plenary Assembly to a World Telecommunication Standardization Assembly (WTSA). more

Turns out ICANN’s Beckstrom is an Inspirational Patron of the Tea Party

Friday's edition of National Public Radio's "On The Media" devoted attention to the rise of the Tea Party and its widespread use of the social media. In the report Ken Vogel of Politico noted that the movement drew inspiration from the book, "The Starfish and the Spider" co-authored by ICANN President, Rod Beckstrom. more

Dealing With the Digital Divide

A political focus on subsidizing telecom infrastructure is just so easy. There are multiple photo opportunities (at the announcement, the cheque presentation and the system activation), happy mayors, happy voters. It gets to be portrayed as economic stimulus, direct job creation and consistent with progress on digital economic development. But while it may feel satisfying politically, I question the effectiveness of continued broad government subsidies based on geography, rather than taking a more focused approach based on need. more

The Continuing WHOIS Disappearing Act

WHOIS is about to become even harder to find. ICANN has recently concluded long-delayed contract negotiations with industry meant to accommodate the technical migration from the WHOIS protocol to the Registration Data Access Protocol (RDAP). Instead of limiting the changes to what's necessary to implement the new technical protocol, the proposals effectively gut WHOIS, making it virtually impossible to find by eliminating web-based WHOIS access... more

Complete Internet Shutdown Reported in Syria

While Syria's Internet disruptions in the recent past have been linked to Government's efforts to prevent cheating during national high school exams, today's complete Internet shutdown reported by Dyn Research is unknown and does not appear to be exam-related. more

Trust Isn’t Easy: Drawing an Agenda from Friday’s DDoS Attack and the Internet of Things

Last week, millions of infected devices directed Internet traffic to DNS service provider Dyn, resulting in a Distributed Denial of Service (DDoS) attack that took down major websites including Twitter, Amazon, Netflix, and more. In a recent blog post, security expert Bruce Schneier argued that "someone has been probing the defences of the companies that run critical pieces of the Internet". This attack seems to be part of that trend. This disruption begs the question: Can we trust the Internet? more

The Shadow of the Web

I believe in the Internet As an ideal. As a web of human minds. As a wonder of the world, not built through totalitarian control but rather through fierce coopetition. As a technological pillar held up by a newer, better, governance structure. As the facilitator of knowledge sharing and communication on a level so advanced that it would appear supernatural to folks living just a century ago, or less. I worry for the Internet While it has been a major disruptive force, it is also susceptible to the existing paradigm. more

Data Based Decision Making

A new report was released by the National Telecommunications and Information Administration, part of the US Department of Commerce... It is a 68 page report with a wealth of data to help understand the factors that differentiate levels of adoption and to try to understand the reasons for non-adoption of residential broadband. In the US, people who don't use the internet represent two thirds of non-users of broadband... more

New Analysis Suggests Recent Cyberattacks Against US and South Korea Originated from UK Not N. Korea

Nguyen Minh Duc, senior security director at Bach Khoa Internetwork Security (Bkis), says that the source of recent cyberattack against US and South Korean government websites was not North Korea -- as widely reported -- but UK. Based on Bkis analysis, a report today by Nguyen Minh Duc says that a master server located in UK was found to control the 8 Command and Control servers responsible for the series of cyberattacks last week.
 more

Just One Bit

I'm never surprised by the ability of an IETF Working Group to obsess over what to any outside observer would appear to be a completely trivial matter. Even so, I was impressed to see a large-scale discussion emerge over a single bit in a transport protocol being standardized by the IETF. Is this an example of a severe overload of obsessive-compulsive behaviour? Or does this single bit represent a major point of design principle... more

FAKE45: Trump Administration Illegitimacy Under International Law

The FAKE45 sign in the photo lower right corner appearing on the front page of today's Washington Post -- ironically in front of the Department of Justice headquarters -- captures a result of yesterday's events that may have far-reaching consequences. About 4.5 million people -- including a million in Washington DC alone -- spontaneously came together from every corner of the nation and world to question the legitimacy of a Trump Administration, express disdain for its actions, and assert the repugnancy of its positions. I was there. more