/ Recently Commented

“Internet Drivers License” - A Short History Lesson

The press, the blogosphere, CircleID - everybody has been discussing Craig Mundie's comment on the need for an "Internet Driver's License". Most of the reaction has been from privacy advocates fearing that this is simply another way to kill anonymity on the Internet. Oh well... that's the usual set of reactions. Now... the fun part is, a driver's license also shows that you have the competence to drive... more

FCC’s Genachowski Promises He’s Not Out to Regulate Net, New Media

We learned from The Wall Street Journal yesterday that "Federal Communications Commission Chairman Julius Genachowski gets a little peeved when people suggests that he wants to regulate the Internet." He told a group of Journal reporters and editors today that: "I don't see any circumstances where we'd take steps to regulate the Internet itself," and "I've been clear repeatedly that we're not going to regulate the Internet." We're thankful to hear Chairman Julius Genachowski to make that promise. We'll certainly hold him to it. But you will pardon us if we remain skeptical... more

Google to Begin Experimental Ultra High-Speed Broadband Networks

In a blog post today, Google has announced that they will begin a fiber network experiment of their own. From the announcement: "We're planning to build and test ultra high-speed broadband networks in a small number of trial locations across the United States. We'll deliver Internet speeds more than 100 times faster than what most Americans have access to today with 1 gigabit per second, fiber-to-the-home connections. We plan to offer service at a competitive price to at least 50,000 and potentially up to 500,000 people." more

Smart Phishing for Smartphones

A common security prediction for 2010 is the continued rise of malware and phishing attacks on mobile phones. The MarkMonitor Security Operations Center recently detected an interesting twist on this theme involving a popular smartphone and the latest smart technologies used by cybercriminals. In this case, instead of compromising a smartphone to steal its information, cybercriminals used phishing techniques to clone smartphones. more

Wi-Fi Offload, Not Femtocells

Mobile operators face soaring data demand. The natural evolution of 2G/3G/4G infrastructure delivers about 2X additional capacity every 24 months. That's a major disconnect! (At least) two solutions are on the table, Femtocells and Wi-Fi offload. Both approaches solve the backhaul issue by using customer or 3rd party links (DSL, DOCSIS, T1/E1, WISP or otherwise)... As a solution for mobile data capacity, Wi-Fi wins, for many reasons. more

Domain Name Security Gains Prominence in German-Speaking World

The 2010 Domain Pulse, hosted by SWITCH (the .CH registry) was held in the snowy Swiss city of Luzern. Domain Name Security (DNS) was of particular importance in this year's meeting with DNSSEC being implemented in the root zone in 2010 by ICANN, and by many registries in the next few years. ICANN plan to have all root servers signed with DNSSEC by mid-2010 Kim Davies, Manager, Root Zone Services at ICANN told the meeting, starting with the L root server, then A root server with the last being the J root server as all are gradually signed. more

Sharing: The First Step to Structural Change in Mobile

The arrival of the iPhone, Android and iPad will raise the stakes higher in the mobile broadband market. The fact that iPhone alone has over 140,000 Apps over sort of open networks, not portals, shows the demand for mobile applications. This will put an enormous strain on the infrastructure of the mobile operators and will require them to build fibre networks to all mobile stations, as well as invest in more spectrum and new technologies such as LTE. At the same time the mobile subscriber markets are becoming saturated and competition is driving margins down. more

Domain Name Registry and Registrar Separation Now Probably Going to Be a Policy Debate

Again on the subject of new Top-Level Domains (TLDs) ... One of the "issues" that concerned a number of people is the concept of "vertical separation". The basic idea is that domain name registries and registrars should be kept separate. While that is a wonderful Utopian ideal, the reality is that in the real world companies own other companies, people trade in stocks and shares etc., etc. So it's far from being a simple "cut and dried" situation. more

DNSSEC: Will Microsoft Have Enough Time?

I have previously pointed out the shortcomings of good and user friendly support for DNSSEC in Microsoft's Server 2008 R2. During the period just after I wrote the post, I had a dialogue with Microsoft, but during the last months there has been no word at all. The reason I bring this up again is that more and more Top Level Domains (TLDs) now enable DNSSEC and also the fact that within six months the root will be signed. more

Australia Booting Infected Computers Off Their Networks

The Australian has a good article describing the efforts some of their ISPs are making in an attempt to clean up their act: the government is encouraging ISPs to detect computers on their network that are infected and part of botnets, and to communicate to the customer that their system is compromised... Unless the customer feels a little bit of pain they will not change their ways. more

Telecoms Leadership and the State of the Union

Before, during and after his inaugural speech (January 2009) President Obama spoke of the national benefits of broadband, and the changes which have been set in motion in the US telecoms market that were unheard of even a year ago. During the previous administration the incumbent telcos and cable companies had been given more freedom. As a consequence, innovation and competition dwindled and the US was no longer a leader in telecoms... However, since that time, the White House has lost some of its initial leadership. more

Jan 28: International Data Privacy Day

January 28 is marked as International Data Privacy Day in order to help raise awareness and generate discussions about information privacy. This year companies such as Intel, Microsoft, Google, AT&T, LexisNexis and The Privacy Projects are sponsoring Data Privacy Day efforts. more

Protecting Customer Data

There have been a number of reports recently about customer lists leaking out through Email Service Providers (ESPs). In one case, the ESP attributed the leak to an outside hack. In other cases, the ESPs and companies involved have kept the information very quiet and not told anyone that data was leaked. People do notice, though, when they use single use addresses or tagged addresses and know to whom each address was submitted. Data security is not something that can be glossed over and ignored. more

Big Brands Shooting Themselves In The Foot?

One of the topics that keeps coming up in ICANN policy discussions and as part of the new TLD application process is "transparency". ICANN, and the internet community in general, has had plenty of issues in the past with "bad actors" who have caused a lot of issues for everyone (think of many of the registrars who have lost accreditation in the last couple of years for example). On more than one conference call or policy discussion the issue of a company or a person's track record has come up. more

Comcast to Start a Series of Public IPv6 Trials Using 3 Transition Mechanisms

Comcast today announced plans to conduct production-network trials of IPv6 technology this year. The trials are aimed at helping identify and solve any areas of difficulty involved in the transition to IPv6, and to determine what approach will be the easiest and most seamless for its customers, says Jason Livingood, Comcast's Internet System Engineer. more