/ Most Viewed

Emergency Patch Issued for Samba, WannaCry-type Bug Exploitable with One Line of Code

The team behind the free networking software Samba has issued and emergency patch for a remote code execution vulnerability. more

Research Group Releases International Law on Cyber Warfare Manual

The newly released handbook applies the practice of international law with respect to electronic warfare. The Tallinn Manual on the International Law Applicable to Cyber Warfare -- named for the Estonian capital where it was compiled -- was created at the behest of the NATO Co-operative Cyber Defence Centre of Excellence, a NATO think tank. It takes current rules on battlefield behaviour, such as the 1868 St Petersburg Declaration and the 1949 Geneva Convention, to the internet, occasionally in unexpected ways. more

The [Dot]Brand Tribes - Part 1

In my last post we talked about the value of introducing new generic Top-Level Domains (gTLDs) to Tribes. We discussed what a Tribe was and how communities of people sharing knowledge and experiences can benefit from new TLDs. In the next three posts from my blog we'll discuss how brand owners can either benefit from creating a tribal home and/or come together with other tribes for the benefit of their members. more

Toward an ITU Renaissance

For nearly fifty years now, a significant portion of my professional engineering and lawyering life has been threaded through the International Telecommunication Union (ITU). It has included all of its multiple sectors, working on the inside for two Secretary-Generals and running its Relations between Members and Regulations Division, writing two books including "The ITU in a Changing World" with the late George Codding, representing the U.S. at several conferences... more

Google Adds U.S. Cellular as Partner for Project Fi

Google today announced the addition of U.S Cellular, a leading mobile networks in the U.S., as its newest partner network for its Project Fi program. more

The 3 Biggest Challenges Facing New gTLDs

When ICANN announced the nTLD program, thousands of applicants threw their hats in the ring. It seemed pretty straight forward; the existing TLDs were running out of short meaningful options, all that was needed was to create newer options that would be more relevant for specific sets of customers. Years later, the process is well underway; hundreds of nTLDs have hit the market, yet less than 10% of those that have gone live seem to have found success. more

FCC Adopts New Rules for 5G Networks, US First Nation to Make the Move

U.S. Federal Communications Commission (FCC) adopts new rules to enable rapid development and deployment of next generation 5G technologies and services. more

Britain to Involve Huwawei in Nation’s 5G Rollout Amid US Ban

Top British officials have given the green light to the Chinese technology giant Huawei to participate in the development of the 5G wireless network in the United Kingdom, reports the Washington Post. more

The hiQ Decision Legalized Infrastructure Theft - We Need a Federal Fix

The hiQ ruling erased legal protections against commercial scraping, leaving infrastructure providers to absorb escalating costs. Without federal action defining data misappropriation, a free-rider AI economy could undermine open networks, investment, and long-term data integrity. more

Protect Access to Safe Online Pharmacies Through Cyber Policy

The high cost of prescription drugs has created a health and economic crisis in the U.S. Personal prescription importation gives Americans a lifeline for affording safe medications. As prescription drug prices continue to skyrocket, the Internet has made it possible for Americans to access medications safely at considerable cost savings. As I've shared previously on CircleID, safety and affordability are the most important considerations when choosing an online pharmacy. more

Fear of Disaster: 5 Tips to Help Enterprises Cope

IT disasters can strike anywhere, anytime. In 1983, a faulty Soviet warning system nearly precipitated World War III -- the system claimed five missiles were en route from the U.S. Only quick thinking by Lt. Col. Stanislav Petrov saved the day when he realized the United States would never launch so few warheads. And in 2004, a private contractor working with the British Child Support Agency (CSA) suffered a glitch that overpaid 1.9 million people and underpaid 700,000. more

Net Neutrality’s Legal Binary: An Either/Or With No “Third Way”

People working on net neutrality wish for a "third way" — a clever compromise giving us both network neutrality and no blowback from AT&T;, Verizon, Comcast and others. That dream is delusional because the carriers will oppose network neutrality in any real form; they want paid fast lanes. They have expressed particular opposition to "Title II" of the Communications Act — something telecom lawyers mention the same way normal people might reference the First or Second Amendments. Title II is the one essential law to ban paid fast lanes. more

DNS Under Strain: Technical and Policy Challenges in Supporting the Internet of Autonomous Things

A new IETF draft outlines critical limitations of DNS in supporting the Internet of Autonomous Things, highlighting challenges related to latency, mobility, security, and privacy, and proposing architectural improvements to meet evolving machine-driven demands. more

NTIA Asks New gTLD Applicants to Submit Public Interest Commitments

Kevin Murphy reporting in Domain Incite: The National Telecommunications and Information Administration said today that all new gTLD applicants, even those that have not already been hit by government warnings, should submit Public Interest Commitments to ICANN. In a rare comment sent to an ICANN public forum today, the NTIA suggested that applicants should use the process to help combat counterfeiting and piracy. ... NTIA said that applicants should pay special attention in their PICs to helping out the "creative sector". more

STEM to STEMM: It Will Take Musicians to Save the Internet

The internet is under all kinds of attacks from all kinds of people for all kinds of reasons. It’s not just the internet’s infrastructure that is under attack, so too is the very concept of the internet as an open communications platform serving the commonweal. Constructing effective technical defenses of the internet will require that America’s students learn and develop the quantitative disciplines known as STEM; Science, Technology, Engineering, and Mathematics. Constructing effective, ethical defenses of the internet will require that students study art and philosophy. The two educational paths are symbiotic... more