So, the FCC will recommend that Comcast be "punished" or receive "sanctions" for its peer-to-peer throttling practice. And the network neutrality debate goes on, as does its ambiguities and vagueness. Even if you hate Comcast and agree with the net neutrality argument and the FCC's decision, one thing Comcast is correct in saying is that "reasonable network management" specified by the FCC in network neutrality policy set in 2005 is vague. Actually, the term "network management" by itself is broad before you even try to interpret what is meant by "reasonable", and it is not exactly correct in its application here... more
In fact WiFi (technically standard 802.11) and WiMAX (802.16) don't compete for broadband users or applications today. That's partly because WiFi is widely deployed and WiMAX is still largely an unfulfilled promise and partly because the two protocols were designed for very different situations. However, if WiMAX is eventually widely deployed, there will be competition between them as last mile technologies. Some people describe the difference between WiFi and WiMAX as analogous to the difference between a cordless phone and a mobile phone... more
As the second Internet Governance Forum approaches, it is an appropriate moment to take stock of how the Internet Governance dialogue has evolved since the conclusion of the WSIS Summit in 2005. One year after the first IGF in Athens, it is clear that government, industry and civil society stakeholders are still grappling over the direction and focus of the IGF... There is little doubt that some governments will choose to borrow concepts from the IGF when developing law and policy and will ultimately apply them to the Internet within their respective jurisdictions. Given the global nature of the Internet, this should be a fundamental concern. While this important dialogue about the Internet continues at the IGF in Brazil next month, another no less important debate is emerging with regard to RFID technology and the so-called "Internet of Things." The Internet of Things is a term coined to describe a future ubiquitous sensor network that collects commercial and personal data in public and private settings created, in part, through the rollout of RFID technology... more
Wednesday was the open public consultation preparing for the second meeting of the Internet Governance Forum, which will take place in Rio de Janaeiro on 12th-15th November. Although the inaugural Athens meeting was widely deemed a success, having largely stayed off the dread topics of wresting control of DNS from ICANN and IP addressing from the RIRs, the usual suspects were back demanding that these topics be added to the agenda. more
Companies sensible to effective delivery of email to all free email services may have noticed problems with deliveries to Hotmail addresses. Despite the SMTP dialog ending with a successful "250" return code, recipients don't see the message. In their Guidelines, MSN require thorough compliance with IETF standards. However, it seems they have their own interpretation about provisions for Delivery Status Notifications, a.k.a. bounces, that servers must send after they have accepted responsibility for delivering the message... more
While I was in LA last week John sent me details of the Communications Regulation (Amendment) Bill 2007. While there are some potentially positive aspects in the Bill some of the Bill's contents are, for lack of better word, simply crazy... more
What would duopoly providers of internet access really like to have? They'd really like to be paid for providing non-commodity services. They'd really like to be rewarded for running the network, top to bottom. "But that's not possible," you say. No provider can tell one packet from another. Providers can only block the ports used by applications they don't like, and that's a clumsy, unwinnable arms race. The applications can always switch to common and useful ports, and no provider wants to alienate its subscriber base. But what if providers could inspect the contents of packets, without using too much computational power, and discriminate among applications? "Naah," you say. "They can't possibly do that."... more
The Irish domain registry (IEDR) is to come under the control of the Commission for Communications Regulation ComReg. At present the registry is managed by a "not-for-profit" company, however it has come under increasing criticism with regard to both its management and policies. Although there are approximately 40,000 IE domains currently registered, it is still one of the strictest and most expensive ccTLDs in the world. more
ICANN's new DNS abuse rules mark progress, yet short-term domain leasing enables fleeting, hard-to-detect attacks. A proposed 30-day minimum lease could curb cybercrime by undermining the economics of weaponised parked domains. more
A dispute over African IP governance exposes a flaw in the RIR system, where thin policy, weak accountability and institutional self preservation risk overriding running networks and undermining the technical legitimacy that sustained global coordination. more
A critique of ICANN's multi-stakeholder model argues that its accountability record, revealed through more than a dozen IRP disputes, shows structural failures that should caution policymakers seeking institutional blueprints for governing artificial intelligence systems globally. more
A debate over aligning internet and AI governance reveals stark differences in origin, incentives and power. While lessons from ICANN's multi-stakeholder model endure, AI's corporate dominance and geopolitical rivalry demand new, bottom-up approaches. more
Poland thwarted a large-scale cyberattack on its energy grid without disruption, offering a rare case study in critical infrastructure resilience, decentralised energy governance, and the balancing act between openness and digital security. more
Internet governance is shifting from participatory forums to security-driven mandates. As authority accelerates ahead of legitimacy, technical systems face growing instability and operators absorb the risks of politically motivated control. more
Sometime by year-end, the UN General Assembly (UNGA) will vote on the proposed UN Convention Against Cybercrime. The treaty is opposed by most civil liberties organizations and Internet businesses, although the US position appears uncertain, mostly for reasons of foreign policy. more