There have been some interesting new developments in university Green Revolving Funds (GRF) that I believe could be a significant revenue opportunity for cloud suppliers and R&E networks. In this age of severe financial constraints and cutbacks for universities, new revenue models are needed to sustain advanced cyber-infrastructure in support of research and education. more
The world has changed dramatically for the better over the last 15 years, mainly due to the commercialization of the Internet. That is what I would like to believe. Unfortunately, I am no longer sure. True, the Internet connects all of us with every corner of the world... For the rest, the times may be changing, because there are those who believe that the Internet should be molded to fit those same old bureaucracies and corrupted institutions that have plagued humanity for decades, if not centuries. The solution, many times, feels far out of reach. more
President Donald Trump has reversed an Obama-era policy that set limits on how the United States deploys cyberattacks. more
Last Month at the NETMundial meeting in Brazil, representatives from governments, private sector, civil society, the technical community and academia met to debate the key principles on which the Internet should evolve. The meeting culminated in a supporting the principles of a decentralized and multistakeholder (ie: non-governmental) driven Internet ecosystem, committed to principles of openness, fairness, accessibility, security and safety. more
This article on cloud appeared in the Economist.com on April 12th 2001 titled "The Beast of Complexities" Stuart Feldman of IBM, mentions these examples. Quote 'Picture yourself as the product manager of a new hand-held computer whose design team has just sent him the electronic blueprint for the device. You go to your personalized web portal and order the components, book manufacturing capacity and arrange for distribution. With the click of a mouse, you create an instant supply chain that, once the job is done, will dissolve again." unquote. ...In the same article he also lamented that so far, nobody has found a silver bullet to kill the Beast of Complexity. more
For a student final dissertation TV documentary short, 10 minutes, I have ended up choosing to investigate whether the landing stations for trans-atlantic cables are the achilles heel of the internet. As an outsider to the world of internet infrastructure I have been struck by how easy it has been to identify the landing stations in Cornwall and the cables that enter them. (Thank you Google for the aerial photographs) more
Last month, the U.S. National Cybersecurity Strategy was launched, providing a new roadmap for stronger collaboration between those operating within the digital ecosystem. The strategy calls on software makers and American industry to take far greater responsibility to assure that their systems cannot be hacked while accelerating efforts by the Federal Bureau of Investigation and the Defense Department to disrupt the activities of hackers and ransomware groups around the world. more
DotConnectAfrica Trust (DCA) received an Injunction it requested in its IRP Proceedings in an arbitration process against ICANN ('DCA Trust vs. ICANN') governed by the International Dispute Resolution Procedures of the ICDR based in New York and the Supplementary Procedures for ICANN IRP Process. more
Global internet usage through mobile devices, has almost doubled to 8.5% in January 2012 from 4.3% last year according to a new report from web analytics StatCounter. While this stat excludes tablets, firm's research arm highlights the increasing use of mobile devices to access the internet with market share doubling year on year since 2009. Nokia leads worldwide, most probably driven by its dominance in India. Apple is second globally but leads the US and UK markets. In the UK RIM is second only to Apple. more
I was pointed to an article in the Armed Forces Journal where Col Charles W. Williamson III argues that the US Air Force needs to develop a BOTnet army as part of the US military capability for retaliatory strikes. The article brings up some interesting issues, the one that I believe carries the most weight is the argument that we (well, people living on the Internet) are seeing an arms race. It is true that more and more nations are looking into or developing various forms of offensive weapons systems for the use on the Internet... more
In recent months the Internet has been buzzing about the prospect of a United Nations "takeover" of the Internet, including responsibility for governance of the domain name system. The concern hit a fever pitch late last month when the U.S. Congress held hearings on the issue. A steady stream of technology companies and consumer groups expressed fears with potential U.N. and foreign government involvement and members of Congress pledged to take a strong stand against the takeover. more
The Internet's Domain Name System undertakes a vitally important role in today's Internet. Originally conceived as a human-friendly way of specifying the location of the other end of an Internet transaction, it became the name of a service point during the transition to a client/server architecture. A domain name was still associated with an IP address, but that 1:1 association was weakened when we started adjusting to IPv4 address exhaustion. more
I'm continually amazed by the amount of FUD being spread with regard to VoIP security threats. People...the sky is not falling. VoIP isn't e-mail. It isn't implemented like e-mail, it won't be implemented like e-mail (maybe "it shouldn't be implemented like e-mail" is a more appropriate statement). Following best security practices will ensure at least a level of security equivalent to current TDM systems. Best FUD I've heard this week: VoIP is insecure because you can simply put a bridge on an ethernet line and capture a stream. Hey, has anyone ever heard of alligator clips? more
A few weeks, I attended a one-day conference at the Queensland University of Technology (QUT) at the occasion of the launch of their new $7.5 million Centre for Data Science. This laboratory is also the lead node of a new Australian Data Science Network, bringing together data science organizations from across the country. The new center aims to support data-led decisions across key areas like health, environment, business, government and society -- in short, data for the good. more
The success of the new gTLDs program depends on the actions of the winning registries and on ICANN's allocation policies for the second round of applications. A successful landscape would be dominated by only a few registries but would be less confusing for users. The major players: businesses and Internet users who drive the demand for the gTLDs; the registries who own and run the gTLDs; and ICANN, which sets the rules for determining a winner for each new gTLD. more