ICANN CEO, Rod Beckstrom, urges African leaders to "shatter" telecommunications monopolies in their nations in order to help lower the price of Internet access to their citizens during his opening remarks at the start of the 37th ICANN meeting in Nairobi, Kenya. Beckstrom noted that while 15 percent of the world's population lives in Africa, Africans make up less than 7 percent of all Internet users. more
NVIDIA recently issued its third annual State of AI in Telecommunications report. The company manufactures many of the cards used in AI data centers, so the company is clearly focused on AI adoption. NVIDIA issues similar reports for other industries. The 2025 report is the result of a survey that NVIDIA administered to 450 telecom professionals across the globe. more
I have some bad news: the published literature on 'net neutrality' fails to grasp the stochastic nature of broadband and its implications. This means that the relationship of traffic management to QoE is universally misunderstood and/or misrepresented. As a result the whole policy process is being placed into opposition with nature! Nature isn't changing to accommodate the policy process. So the policy process has to change. more
EFF, Mozilla, Cisco, Akamai, Identrust, and researchers at the University of Michigan today announced a new certificate authority (CA) initiative called "Let's Encrypt". more
In Spike Jonze's 2013 film "Her", the main character Theodore Twombly (played by Joaquin Phoenix) falls in love with a Siri-like virtual assistant. It is an intelligent computer operating system, a variance of AI envisioned by the high technology developers of today. We are still far away from creating AI capable of thinking and learning for themselves, not to mention living in symbiosis with them. However, Intelligent Virtual Assistants can be perceived as a step towards the fulfillment of the idea. more
The difficulty of applying a hierarchically organized PKI to the decentralized world of Internet routing is being fully exposed in a new Internet-draft. The document represents a rational response to an RPKI that closely ties address resources to a handful of Internet governance institutions, nicely illustrates how governments and national security policy are influencing Internet security, and portends substantial costs for network operators and beyond if adopted widely more
Much has already been written about the prospects and challenges associated with the introduction of new generic Top-Level Domains (gTLDs). This post were originally written for my personal blog but a good industry friend has persuaded me to post it (and more) on CircleID. During this series I will attempt to show how the introduction of new gTLDs is ultimately a "win win win" scenario. A win for innovation, a win for commerce and most importantly a win for internet users. So where to begin? more
Following a very successful series of workshops held during IETF meetings, the next Registration Operations Workshop (ROW) is now being held during the upcoming ICANN meeting in Hyderabad, India. While the previous workshops were of advanced topics attended by industry experts, the current one will be more of a tutorial and is open to all interested parties. more
Parties to a UDRP proceeding must include a certification similar in U.S. practice to Rule 11 of the Federal Rules of Civil Procedure (and undoubtedly a feature in procedural codes in other judicial jurisdictions) "that the information contained in this [Complaint or Response] is to the best of [Complainant's or Respondent's] knowledge complete and accurate, that this [Complaint or Response] is not being presented for any improper purpose, such as to harass... more
Nationally Appropriate Mitigation Action (NAMA) is a new policy program that was developed at the Bali United Nations Climate Change Conference. As opposed to the much maligned programs like CDM and other initiatives NAMA refers to a set of policies and actions that developed and developing countries undertake as part of a commitment to reduce greenhouse gas emissions. Also unlike CDM, NAMA recipients are not restricted to developing countries. more
A hacking incident over the weekend attacked networks in a number of countries including data centers in Iran where they left the image of a U.S. flag on screens along with a warning: "Don't mess with our elections." more
More than 50 major environmental groups have called on ICANN to protect the .ECO domain, representing a ground swell of public interest and support. Their letters are included with Big Room's community-priority .ECO application to ICANN... "This is one of the highest-level global mobilizations of the environmental community in history. Over 190 countries, more than 1,000 entities and over 10 million individual members are represented." more
A report, released today by McAfee, Inc., titled "Security Takes the Offensive," says that traditionally, security technology companies and computer users have taken a defensive posture, putting the cyber equivalent of body armor on computers, networks and in the cloud. The report's authors say it is now time to avoid enemy strikes altogether by taking a more aggressive stance, aligning forces and involving law enforcement. more
Today we at the Internet Society submitted our contribution to the United Nations General Assembly's 10-year review of the World Summit on the Information Society (WSIS+10) that will take place in New York in December. The goal of this meeting is to set the agenda for the UN - and through that the agendas of nations around the world -- with regard to the future of the "Information Society". more
According to CTIA's semi-annual wireless industry report, text messaging continues to be enormously popular in the United States, with more than 740 billion text messages carried on carriers' networks during the first half of 2009 - that is 4.1 billion messages per day. This number is nearly double from last year which was reported at 385 billion text messages. more