China is revising its cybersecurity laws to include faster reporting requirements and stricter oversight of AI-related incidents, reflecting growing concerns about national security and the unchecked expansion of digital infrastructure. more
If you are interested in DNSSEC and how it can make the Internet more secure, the DNSSEC Workshop at ICANN 49 in Singapore will be streamed live for anyone to listen and view. One of three DNSSEC-related technical events at ICANN 49, the DNSSEC Workshop takes place on Wednesday, March 26, from 8:30am - 2:45pm Singapore time. more
Global internet usage through mobile devices, has almost doubled to 8.5% in January 2012 from 4.3% last year according to a new report from web analytics StatCounter. While this stat excludes tablets, firm's research arm highlights the increasing use of mobile devices to access the internet with market share doubling year on year since 2009. Nokia leads worldwide, most probably driven by its dominance in India. Apple is second globally but leads the US and UK markets. In the UK RIM is second only to Apple. more
ICANN's role in Smart Africa's governance blueprint highlights a widening divide between legality and legitimacy. Funding and participation occurred without early community consultation, raising concerns about procedural integrity, RIR independence, and the precedent such interventions may set for global Internet governance. more
A report from the Center for Data Innovation warns of a new broadband gap they call the data divide, which is when some parts of society are not sharing in the big societal advantages that come from using and understanding the huge amounts of data that are being generated today. The report includes examples of the data divide that make the concept easier to understand. more
As unusual as it may be for a lawyer to speak at a IETF meeting, Ian Walden gave a lecture on Data Protection Directives and updates thereof. He said they affect some 90 jurisdictions. A difference between email addresses and cookies - the latter are the main subject of the January 2012 update of the directives - is that after more than a decade of enforcement, specific browser extensions may allow users to browse what cookies they have, while no record states whom they conferred their email addresses to. more
For a student final dissertation TV documentary short, 10 minutes, I have ended up choosing to investigate whether the landing stations for trans-atlantic cables are the achilles heel of the internet. As an outsider to the world of internet infrastructure I have been struck by how easy it has been to identify the landing stations in Cornwall and the cables that enter them. (Thank you Google for the aerial photographs) more
The previous two articles in this series have outlined techniques for 'mining' brandable domain names -- that is, domain names of potential interest to entities looking to launch a new brand name and associated website -- from the enormous dataset of unregistered names (determined via zone file analysis). The key element of the identification process is the implementation of filtering techniques to identify... more
While the most common results of a UDRP proceeding are either transfer of a disputed domain name to a complainant or denial (that is, allowing the respondent to retain it), there is another possible outcome: cancellation. I'm always surprised to see a UDRP decision in which a domain name is cancelled. True, many trademark owners don't really want to obtain control of a disputed domain name (and, instead, they simply want to get it taken away from a cybersquatter). more
The success of the new gTLDs program depends on the actions of the winning registries and on ICANN's allocation policies for the second round of applications. A successful landscape would be dominated by only a few registries but would be less confusing for users. The major players: businesses and Internet users who drive the demand for the gTLDs; the registries who own and run the gTLDs; and ICANN, which sets the rules for determining a winner for each new gTLD. more
Spam and virus trends in Q3'10 confirm that spammers are still hard at work distributing malicious content in new and creative ways, according to the latest reports. The latest spam and virus trends report is produced by Postini, Google's email security and archiving service that, according to the company, processes more than 3 billion email messages per day and more than 50,000 businesses. more
A few weeks, I attended a one-day conference at the Queensland University of Technology (QUT) at the occasion of the launch of their new $7.5 million Centre for Data Science. This laboratory is also the lead node of a new Australian Data Science Network, bringing together data science organizations from across the country. The new center aims to support data-led decisions across key areas like health, environment, business, government and society -- in short, data for the good. more
I have on my desk a rather small tube. It's a little under 2cm in diameter, 6 cm long, and looks like it's made from a dull white polycarbonate material. At the end, I can see a copper inner tube, and inside that, another polycarbonate layer, and then a smaller steel tube that holds a thin steel thread and some fibre optic cables. There are no layers of steel jacketing, nor any other additional wrapping at all. more
This article on cloud appeared in the Economist.com on April 12th 2001 titled "The Beast of Complexities" Stuart Feldman of IBM, mentions these examples. Quote 'Picture yourself as the product manager of a new hand-held computer whose design team has just sent him the electronic blueprint for the device. You go to your personalized web portal and order the components, book manufacturing capacity and arrange for distribution. With the click of a mouse, you create an instant supply chain that, once the job is done, will dissolve again." unquote. ...In the same article he also lamented that so far, nobody has found a silver bullet to kill the Beast of Complexity. more
Last Month at the NETMundial meeting in Brazil, representatives from governments, private sector, civil society, the technical community and academia met to debate the key principles on which the Internet should evolve. The meeting culminated in a supporting the principles of a decentralized and multistakeholder (ie: non-governmental) driven Internet ecosystem, committed to principles of openness, fairness, accessibility, security and safety. more