Ren Zhengfei tells the Economist and the NY Times he is prepared to give the US essentially everything the President has asked, including the crown jewels: the complete design and source code of Huawei's 5G system. Ren would "license the entire Huawei 5G platform to any American company that wants to manufacture it and install it and operate it, completely independent of Huawei." more
A German appeals court has held a German domain name registrar (Key Systems) responsible for issuing a domain name to H33t, a torrent-tracking site. The case was appealed, but the appeals court upheld the lower court ruling. more
The ICANN Board meeting undertaken recently in Nairobi was indeed eventful and there were many vital topics on the agenda, in particular for the new gTLD program that kept many interested parties on the edges of their seats as the meeting unfolded. ... One of the more controversial decisions was in regard to the Expression of Interest (EOI), a program intended to allow potential new gTLD applicants to pre-register for their desired TLD and provide ICANN and the community with invaluable information regarding likely volumes of applications. more
With companies realizing the threat of hefty fines, lawsuits, and executive resignations that can follow security breaches, companies are scrambling to scoop up scarce security experts. more
Understandably, just now new gTLDs are uppermost in the minds of people in the domain name business. For the general Internet user, some other issues retain their crucial importance: upholding the global public interest, enhancing governance within ICANN and beyond, making the Multi-Stakeholder Model (MSM) truly efficient, sustainable, and equitable. "Making ICANN Relevant, Responsive and Respected" ("R3") sets out to identify the main challenges facing the Internet community, especially in ICANN, and offers recommendations in each of the areas explored. more
The Registration Operations Workshop (ROW), an informal gathering of DNS professionals, is set to continue its tradition of fostering technical dialogue and knowledge-sharing across the domain name ecosystem. more
In our physical world, census information is used to inform the planning processes behind the provision of infrastructure, such as schools, hospitals, housing, and similar. It can be used to assess the impact of natural disasters or to understand a society's needs in terms of food and energy security. Demographic data is also used to inform investment and business decisions. You'd think that the Internet itself would be awash with similar information. more
Four Chinese ministries issued the policy document in September, called "Guiding Opinions on Expanding Investment in Strategic Emerging Industries and Cultivating Strengthened New Growth Points and Growth Poles." As you can see below, in this document, 5G was the top recommendation. The National Development and Reform Commission, Ministry of Science and Technology, Ministry of Industry and Information Technology, and the Ministry of Finance came together to suggest priorities for the 14th Five-Year Plan. more
The ICANN Security and Stability Advisory Committee (SSAC) and the Internet Society Deploy360 Programme are planning a DNSSEC and Security Workshop during the ICANN67 meeting held from 07-12 March 2020 in Cancun, Mexico. The original DNSSEC Workshop has been a part of ICANN meetings for many years and has provided a forum for both experienced and new people to meet, present, and discuss current and future DNSSEC deployments. more
Aaron H. Swartz, a computer activist, co-founder of Reddit and co-author of the "RSS 1.0" specification, died in New York on Friday. Swartz, 26 years of age, committed suicide in New York City on Jan. 11, according to his uncle. more
According to a report by the Defense Science Board, the President-elect Barack Obama will inherit a cybersecurity infrastructure that is ill-prepared for advanced cyberattacks which will be of particular challenge for the new leaders... Reporting today on eWeek, Roy Mark writes: "The Bush administration has been widely criticized by security experts as de-emphasizing cyber-security and hamstringing the authority of officials in charge of government-wide cyber-security" said Roy Mark in a report eWeek." more
Structured Query Language (SQL) continues to be quite relevant today. Many organizations still use SQL database systems, and it still ranks as the top in-demand language in tech job postings -- even in 2020. Companies are also increasing their analytics and business intelligence efforts, where SQL skills come in as quite handy. SQL queries allow you to pull key information from databases quickly. more
It was interesting to see that, albeit belatedly, the American media started to stop giving Trump opportunities to spew out his lies across the country and beyond. It obviously had now reached a point where the media realized that if they continued to provide Trump with their avenues, this would make them accomplices in inciting violence. Is this going to be a turning point? more
How many times have you heard that humans are the weakest link in cybersecurity? The headlines have proven that over and over again. In particular, business email compromise or BEC (also known as email account compromise or EAC) scams, which typically target an employee with access to the financial resources of his company -- this could be a C-level executive or any high-ranking officer -- for fraud are still on a constant uphill trend. more
Internet 2009 in numbers as reported by Royal Pingdom: In 2009 there were 90 trillion emails sent; 100 million new email users; 24 percent increase in spam; 47 million new websites; 8 percent increase in domain names with the total reaching 187 million; 18 percent increase in overall Internet users with the worldwide total reaching 1.73 billion; and new zombie computers created reach 148,000 per day. more