/ Most Viewed

China Tightens Cybersecurity Rules to Curb AI and Infrastructure Threats

China is revising its cybersecurity laws to include faster reporting requirements and stricter oversight of AI-related incidents, reflecting growing concerns about national security and the unchecked expansion of digital infrastructure. more

DNSSEC Workshop on March 26 to Be Streamed Live from ICANN 49 in Singapore

If you are interested in DNSSEC and how it can make the Internet more secure, the DNSSEC Workshop at ICANN 49 in Singapore will be streamed live for anyone to listen and view. One of three DNSSEC-related technical events at ICANN 49, the DNSSEC Workshop takes place on Wednesday, March 26, from 8:30am - 2:45pm Singapore time. more

Mobile Internet Usage at 8.5%, Doubled From Last Year

Global internet usage through mobile devices, has almost doubled to 8.5% in January 2012 from 4.3% last year according to a new report from web analytics StatCounter. While this stat excludes tablets, firm's research arm highlights the increasing use of mobile devices to access the internet with market share doubling year on year since 2009. Nokia leads worldwide, most probably driven by its dominance in India. Apple is second globally but leads the US and UK markets. In the UK RIM is second only to Apple. more

When Neutrality Isn’t Neutral: ICANN, Smart Africa, the “BluePrint” and “CAIGA”

ICANN's role in Smart Africa's governance blueprint highlights a widening divide between legality and legitimacy. Funding and participation occurred without early community consultation, raising concerns about procedural integrity, RIR independence, and the precedent such interventions may set for global Internet governance. more

The Data Divide

A report from the Center for Data Innovation warns of a new broadband gap they call the data divide, which is when some parts of society are not sharing in the big societal advantages that come from using and understanding the huge amounts of data that are being generated today. The report includes examples of the data divide that make the concept easier to understand. more

Review Your Email Forwarding Practices

As unusual as it may be for a lawyer to speak at a IETF meeting, Ian Walden gave a lecture on Data Protection Directives and updates thereof. He said they affect some 90 jurisdictions. A difference between email addresses and cookies - the latter are the main subject of the January 2012 update of the directives - is that after more than a decade of enforcement, specific browser extensions may allow users to browse what cookies they have, while no record states whom they conferred their email addresses to. more

Landing Sites, Internet’s Achilles Heel of the Internet?

For a student final dissertation TV documentary short, 10 minutes, I have ended up choosing to investigate whether the landing stations for trans-atlantic cables are the achilles heel of the internet. As an outsider to the world of internet infrastructure I have been struck by how easy it has been to identify the landing stations in Cornwall and the cables that enter them. (Thank you Google for the aerial photographs) more

Unregistered Gems Part 3: Keeping Your -ize on the Prize

The previous two articles in this series have outlined techniques for 'mining' brandable domain names -- that is, domain names of potential interest to entities looking to launch a new brand name and associated website -- from the enormous dataset of unregistered names (determined via zone file analysis). The key element of the identification process is the implementation of filtering techniques to identify... more

Why Cancel a Domain Name in a UDRP Case?

While the most common results of a UDRP proceeding are either transfer of a disputed domain name to a complainant or denial (that is, allowing the respondent to retain it), there is another possible outcome: cancellation. I'm always surprised to see a UDRP decision in which a domain name is cancelled. True, many trademark owners don't really want to obtain control of a disputed domain name (and, instead, they simply want to get it taken away from a cybersquatter). more

Success Factors for New gTLDs Program

The success of the new gTLDs program depends on the actions of the winning registries and on ICANN's allocation policies for the second round of applications. A successful landscape would be dominated by only a few registries but would be less confusing for users. The major players: businesses and Internet users who drive the demand for the gTLDs; the registries who own and run the gTLDs; and ICANN, which sets the rules for determining a winner for each new gTLD. more

Q3 Saw Massive Virus Volumes While Spam Remained Steady

Spam and virus trends in Q3'10 confirm that spammers are still hard at work distributing malicious content in new and creative ways, according to the latest reports. The latest spam and virus trends report is produced by Postini, Google's email security and archiving service that, according to the company, processes more than 3 billion email messages per day and more than 50,000 businesses. more

The Power of Data in Smart City Developments

A few weeks, I attended a one-day conference at the Queensland University of Technology (QUT) at the occasion of the launch of their new $7.5 million Centre for Data Science. This laboratory is also the lead node of a new Australian Data Science Network, bringing together data science organizations from across the country. The new center aims to support data-led decisions across key areas like health, environment, business, government and society -- in short, data for the good. more

Submarine Cable Resiliency in the Face of Disruptions

I have on my desk a rather small tube. It's a little under 2cm in diameter, 6 cm long, and looks like it's made from a dull white polycarbonate material. At the end, I can see a copper inner tube, and inside that, another polycarbonate layer, and then a smaller steel tube that holds a thin steel thread and some fibre optic cables. There are no layers of steel jacketing, nor any other additional wrapping at all. more

Could This Be the Silver Bullet for Cloud Computing

This article on cloud appeared in the Economist.com on April 12th 2001 titled "The Beast of Complexities" Stuart Feldman of IBM, mentions these examples. Quote 'Picture yourself as the product manager of a new hand-held computer whose design team has just sent him the electronic blueprint for the device. You go to your personalized web portal and order the components, book manufacturing capacity and arrange for distribution. With the click of a mouse, you create an instant supply chain that, once the job is done, will dissolve again." unquote. ...In the same article he also lamented that so far, nobody has found a silver bullet to kill the Beast of Complexity. more

Outcome from NETMundial Meeting in Brazil Largely Seen as Positive for Business

Last Month at the NETMundial meeting in Brazil, representatives from governments, private sector, civil society, the technical community and academia met to debate the key principles on which the Internet should evolve. The meeting culminated in a supporting the principles of a decentralized and multistakeholder (ie: non-governmental) driven Internet ecosystem, committed to principles of openness, fairness, accessibility, security and safety. more