/ Most Viewed

Green Revolving Funds Can Help Fund Costs of Cloud Computing and R&E Networking

There have been some interesting new developments in university Green Revolving Funds (GRF) that I believe could be a significant revenue opportunity for cloud suppliers and R&E networks. In this age of severe financial constraints and cutbacks for universities, new revenue models are needed to sustain advanced cyber-infrastructure in support of research and education. more

DCA Receives an Injunction It Requested in Its IRP Proceedings

DotConnectAfrica Trust (DCA) received an Injunction it requested in its IRP Proceedings in an arbitration process against ICANN ('DCA Trust vs. ICANN') governed by the International Dispute Resolution Procedures of the ICDR based in New York and the Supplementary Procedures for ICANN IRP Process. more

Carpet Bombing in Cyber Space - Say Again?

I was pointed to an article in the Armed Forces Journal where Col Charles W. Williamson III argues that the US Air Force needs to develop a BOTnet army as part of the US military capability for retaliatory strikes. The article brings up some interesting issues, the one that I believe carries the most weight is the argument that we (well, people living on the Internet) are seeing an arms race. It is true that more and more nations are looking into or developing various forms of offensive weapons systems for the use on the Internet... more

Corporate Domain Name Management Becoming More Difficult – Is Anyone Surprised?

Brandsight recently concluded their Third Annual Domain Management Survey. Designed to uncover issues of greatest concern to corporate domain name professionals, the survey was sent to more than 300 companies. The companies that responded spanned all verticals, ranging from financial services to high-tech to consumer packaged goods. Of those that responded, 18% had portfolios smaller than 500 domains... more

U.S. Government Trying to Persuade Allied Countries to Avoid Telecom Equipment from China’s Huawei

The U.S. government is engaged in persuading wireless and internet providers in allied countries to stop using telecommunications equipment from China's Huawei Technologies. more

The Price of Lack of Clarity

As anyone reading this blog, assuredly knows, the world is in the grip of a deadly pandemic. One way to contain it is contact-tracing: finding those who have been near infected people and getting them to self-quarantine. Some experts think that because of how rapidly newly infected individuals themselves become contagious, we need some sort of automated scheme. That is, traditional contact tracing is labor-intensive and time-consuming - a time we don't have. more

Trump Relaxes U.S. Regulation to Launch Cyberattacks

President Donald Trump has reversed an Obama-era policy that set limits on how the United States deploys cyberattacks. more

UN Internet Takeover Rumours Mask Bigger Governance Shortcomings

In recent months the Internet has been buzzing about the prospect of a United Nations "takeover" of the Internet, including responsibility for governance of the domain name system. The concern hit a fever pitch late last month when the U.S. Congress held hearings on the issue. A steady stream of technology companies and consumer groups expressed fears with potential U.N. and foreign government involvement and members of Congress pledged to take a strong stand against the takeover. more

Using AM Radio Towers in Designing Wireless Networks

One existing resource that is often overlooked in designing wireless networks is AM radio towers. For the most part, companies deploying fixed wireless and microwave antenna have avoided these towers. This is due to the nature of AM radio, which transmits at such a low frequency that the entire tower is effectively used as the transmitting antenna. The entire tower is energized with the AM signal, and the typical AM tower sits on a base insulator that blocks the tower from being grounded.  more

Israel’s Airstrike on Hamas Hackers: First Real-Time Physical Retaliation Against Cyberattack

Amid escalating violence between Israel and Gaza this weekend, the Israeli Defense Force claimed it bombed and partially destroyed the base of an active Hamas hacking group in Gaza. more

Myanmar Internet Down from Massive DDoS Attack

Craig Labovitz of Arbor Networks reports: "Back in 2007, the Myanmar government reportedly severed all Myanmar Internet connectivity in a crackdown over growing political unrest. Yesterday, Myanmar once again fell of the Internet. Over the course of the past several days, Myanmar's main Internet provider, the Ministry of Post and Telecommunication (or PTT for short), suffered a large, sustained DDoS attack disrupting most network traffic in and out of the country." more

VoIP Security FUD

I'm continually amazed by the amount of FUD being spread with regard to VoIP security threats. People...the sky is not falling. VoIP isn't e-mail. It isn't implemented like e-mail, it won't be implemented like e-mail (maybe "it shouldn't be implemented like e-mail" is a more appropriate statement). Following best security practices will ensure at least a level of security equivalent to current TDM systems. Best FUD I've heard this week: VoIP is insecure because you can simply put a bridge on an ethernet line and capture a stream. Hey, has anyone ever heard of alligator clips? more

Keeping Track of Satellites

The topic of satellite broadband has been heating up lately. Elon Musk's StarLink now has over 540 broadband satellites in the sky and is talking about starting a few beta tests of the technology with customers. OneWeb went into bankruptcy, but it is being bought out by a team consisting of the British government and Bharti Airtel, the largest cellular company in India. Jeff Bezos has continued to move forward with Project Kuiper, and the FCC recently gave the nod for the company to move ahead. more

Taking Permission

Permission is always a hot topic in email marketing. Permission is key! the experts tell us. Get permission to send email! the ISPs tell us. Marketers have responded by setting up processes to "get" permission from recipients before adding them to mailing lists. They point to their privacy polices and signup forms and say "Look! the recipient gave us permission." In many cases, though, the permission isn't given to the sender, permission is taken from the recipient. more

New gTLD Retrospective at ICANN 50

On Wednesday June 25th from 10-12am in the Sovereign Room applicants and key community members will debate what worked, what didn't and what's next for new gTLDs. The event has been organized by the RySG & NTAG as the first community led dialogue on the 2012 new gTLD round since 'reveal day' two years ago. Rather than have panelists deliver presentations, the session will be an open dialogue both between panel members and the audience. It is split into two fifty minute discussion sessions. more