/ Most Viewed

Interstate at Rush Hour ...in the Rain ...on a Friday – AKA, Your Enterprise Traffic on the Net

Congestion. Traffic. Two words that draw a visceral response, whether you are commuting to work or managing a network. Managing data traffic used to be easy. Everything was housed in centralized data centers, and all traffic was routed through big, dedicated, effective but expensive "pipes" -- Multiprotocol Label Switching (MPLS) links. When all the applications are at the data center, it makes sense to build private access for all traffic. more

The Sale of .ORG Registry: Continuing the Conversation We Should Be Having

On 11 February, I participated in a discussion about the pending sale of PIR at American University Washington College of Law, appropriately titled, The Controversial Sale of the .ORG Registry: The Conversation We Should Be Having. It was great to have a balanced discussion, free of some of the emotions that have often made it hard to discern the realities of the transaction. Certain misapprehensions arose in the discussion that we lacked the time to explore fully, so I want to take those up here. more

Documentary Balmes Israel for Stuxnet Malware Failure

Oscar-winning documentarian Alex Gibney's "Zero Days" -- coming out on Friday -- investigates the story of the classified Stuxnet attack on Iran by the US and Israel. more

H.R. 2666 Bill Proposes Deregulating U.S. Broadband Rates, Obama Threatens to Veto

President Obama has threatened to veto a backdoor attempt by a Republican-backed bill that would undermine net neutrality protection measures. The "No Rate Regulation of Broadband Internet Access Act", or H.R. 2666, proposes to prohibit the Federal Communications Commission (FCC) from regulating the rates charged for broadband Internet access service. more

Humans’ Best Defense Against Cybersecurity

At regular intervals, I have discussed the cybersecurity situation in Australia. In those assessments, I wrote about my frustration that the previous government policies more or less resembled a fire brigade approach. Trying to address individual incidents with regulations and legislation rather than coming up with a holistic strategy. more

Coronavirus Online Threats Going Viral, Part 3: Mobile Apps

In part three of this series of posts looking at emerging internet content relating to coronavirus, we turn our attention to mobile apps - another digital content channel that can be used by criminals to take advantage of people's fears about the health emergency for their own gain.One of the most common attack vectors we have found in our analysis is the use of apps purporting to track global progression of COVID-19, or provide other information, but which instead incorporate malicious content. more

Microsoft Releases Patches to Fix Close to a Hundred Flaws, Including for Unsupported Windows XP

Microsoft has released security updates for close to a hundred security vulnerabilities in a number of Windows operating systems. more

Proposal Aims to End US Control of ICANN

A proposal involving removal of root zone management functions from ICANN and creating an independent and neutral private sector consortium is to be presented at the Singapore ICANN meeting March 21, and then formally submitted to the "NETMundial" Global Multistakeholder Meeting on the Future of Internet Governance in SaoPaulo, Brazil. more

Real-Time Email Recommendation Engine Part IV: Image Optimization

Before we dive into optimizing predictive analytics for images using #RealTimeML, at our neighborhood Email Service Provider, there are a few people we need to acknowledge. First, we would like to recognize the Stanford Digital Economy Lab and its managing director Christie Ko. Christie reached out to us to potentially write articles for them, and we talked about several topics in the world of Machine learning (ML). She found our blog here on CircleID and ... more

Support Plug-and-Play with On-Boot Firmware Updates

Have you ever purchased a new electronic device, taken it home, excitedly unwrapped it and switched it on, only to discover that something is wrong and you need to phone customer support? This scenario is all-too-common in the broadband services industry, and unfortunately, it's usually the service provider who takes the blame. New customers will often purchase gateways from third parties or redistributors without knowing that the device's firmware is out of date. more

Looking Forward to ‘The Conversation We Should Be Having’

No, this topic hasn't yet been exhausted: There's still plenty more conversation we can and should have about the proposed sale of the .ORG registry operator to a private firm. Ideally, that conversation will add more information and more clarity about the issues at stake and the facts that underpin those issues. That's why I'm planning to attend today's event at American University where the sale's proponents, opponents and undecideds will have a tremendous opportunity to better understand one another. more

Diversity Is Neither an Option Nor a Secondary Requirement for ICANN

While enhancing ICANN's diversity has been agreed on as a principle, previous discussions were often characterized by conflicting views on priorities, dimensions of diversity, or the current levels of diversity. As a new group is about to be formed to enhance ICANN's diversity, the importance of the purpose cannot be underestimated: "Maximum participation and transparent deliberations by all affected stakeholders are necessary in order to capture the diversity of views that constitute the (global) public interest in a given instance". more

Shame on the Regulators

It's clear that even before the turn of this century that the big telcos largely walked away from maintaining and improving residential service. The evidence for this is the huge numbers of neighborhoods that are stuck with older copper technologies that haven't been upgraded. The telcos made huge profits over the decades in these neighborhoods and ideally should not have been allowed to walk away from their customers. more

5 Reasons Why You Should Adopt NFV for Your CPEs

Communication service providers around the world are about to embark on an epic journey. A journey which has the potential to be a major game changer for hardware and software vendors alike. The simple concept of decoupling software from hardware, referred to as network functions virtualization (NFV), promises to improve an operator's ability to differentiate themselves from the competition by moving network functions from dedicated appliances to generic commercial off-the-shelf (COTS) servers. more

Learn More About the DNS at DNIB.com

DNIB.com is a new industry-focused source of information, insights and data on the Domain Name System (DNS) -- a place to hear directly from subject-matter experts about relevant policy and governance news, DNS security and technology topics, and to provide industry data, analysis and insights on a regular schedule. DNIB.com builds on the Domain Name Industry Brief Quarterly Report, which summarizes the state of the domain name industry through a variety of statistical and analytical research. more