U.S. Sen. Mark R. Warner (D-VA), a member of the Senate Select Committee on Intelligence and co-founder of the bipartisan Senate Cybersecurity Caucus, has released a letter asking three federal agencies for information on the tools available that prevent cyber criminals from compromising consumer products, such as Internet of Things (IoT) devices. more
As the expiry date of the current IANA Functions contract approaches (October 1st, 2016), some in the US Congress are challenging the validity of the proposal to transfer (or "transition") the ovesight role currently exercised by the US Administration, to a multistakeholder system equipped with checks and balances. A letter was sent to the President of the United States of America. Similar letters were sent to the Speaker and Leadership of the House of Representatives, as well as to the President pro tempore and Leadership of the Senate. more
Earlier today some of the biggest names in the tech industry sent a letter to Congress in support of the IANA transition and urging Congress not to delay it. The IANA transition relies on the expiry of the contract between the US Government's Department of Commerce and ICANN which is scheduled for the end of this month. As has previously been noted, some conservative politicians, most notably Senator Ted Cruz, have been very vocal in their criticism of the move and want to block it in Congress. more
With two simultaneous processes getting underway in the UN General Assembly's First Committee, the UN Group of Governmental Experts (GGE) and the Open-Ended Working Group (OEWG) on Cybersecurity, and several technology and multi-stakeholder initiatives pushing cybersecurity improvement, the world of cyber norms has become both more interesting and more complicated. more
The ".COM Registry Agreement Amendment" is on the Main Agenda for this Thursday's Regular Meeting of the ICANN Board. The proposed extension of the RA was announced and put out for public comment on June 30th. The public comment period closed on August 12th and ICANN staff's Report of Public Comments was due on September 15th, coincident with the Board meeting. The original due date for that staff Report was August 26th, but was pushed back to accommodate the large number of comments... more
Every day, new technologies bring us closer to ubiquitous connectivity. If the capabilities of technology is advancing at a fast pace, the same is not always true of regulations; when creating or marketing a new technology, regulation is likely to act as a bottleneck. Understanding regulatory challenges is therefore the foundation that your next move rest on. Although the target may be a global or regional market, it's essential that strategies are designed both well in advance and target each jurisdiction individually. more
A domain name is a unique alphanumeric designation that facilitates reference to sets of numbers which actually locate a particular computer on the Internet. Domain names are a fundamental part of the Internet's user interface. Improving the usability of the Internet depends upon effective domain name policy. This study is intended to contribute to improvement in Internet usability for the end users of domain names. Benefits of more usable domain names include: higher sales, customer satisfaction and productivity, and reduced support costs. more
For the first time in my memory, broadband has entered into U.S. presidential politics. This is an important milestone for rural broadband – not because of the proposals being made by candidates, but because it indicates that the voices of those without rural broadband have reached upward to the top of the political system. I'm sure that when the presidential candidates go to rural areas, they are asked if they can help find a solution for the lack of broadband in many rural counties. more
Yesterday's "Day of Action to Save Net Neutrality," resulted in more than 3.4 million emails to U.S. Congress and more than 1.6 million comments to the Federal Communications Commission. more
The incredible pace of change of the Internet -- from research laboratory inception to global telecommunication necessity -- is due to the continuing pursuit, development and deployment of technology and practices adopted to make the Internet better. This has required continuous attention to a wide variety of problems ranging from "simple" to so-called "wicked problems". Problems in the latter category have been addressed through collaboration. This post outlines key characteristics of successful collaboration activities. more
Given the level of public interest in Ethos' acquisition of Public Interest Registry ("PIR") from the Internet Society, it is no surprise that this agreement continues to attract press attention. Ethos welcomes open discussion on this important investment, and we are of course following the media coverage closely. Unfortunately, it is not always possible to respond point-by-point to every article, so I would like to take this opportunity to address several mischaracterizations of the deal recently reported by Wired, Deutsche Welle, and others. more
China's newly released International Strategy on Cyberspace is marked by three distinctive layers with different degree of priority: (1) sovereignty (or cybersecurity, or UN Charter), (2) globalization (or digital economy, or WTO rules), and (3) fundamental freedoms (or human rights, or UDHR). The good point of the strategy is that it tries to make the three layers peacefully co-exist in one document. The failure, however, lies in the intentional ranking of relevance/importance of the three layers... more
The sharing economy is a challenge for local communities. On the good, it creates economic opportunity and reduces the price. On the bad, it circumvents public safety and welfare protection. Such is the clash between Airbnb and local jurisdictions. San Francisco implemented a local ordinance that permits short-term rentals on the condition that the rental property is registered. In order to register the property, the resident must provide proof of liability insurance... more
Barely a week passes without something in the news that reminds us of the critical role encryption plays in securing our data. It is a technology that protects so much of what we rely on, as individuals protecting our privacy, as companies securing our business assets and transactions, and as governments responsible for critical national infrastructure. ... The request Kathy mentions came after the San Bernardino shootings in California... more
The AI Strategy course at UC Berkeley has come to an abrupt end, but formal learnings in AI will continue. I want to thank professors at UC Berkeley, Alberto Todeschini, Ph.D., and Stuart Russell, who developed a comprehensive course to implement AI in business. After three certificates, Alberto has encouraged me to pursue a master's in Artificial Intelligence. My wife and I are contemplating this next step. more