Today the Berkman Center announced a new project that might be of interest to readers. Since 2002 I've studied Internet filtering around the world, most recently as part of the OpenNet Initiative. Last year with support of the MacArthur Foundation we published "Access Denied," a study of filtering in about 40 states. Our work so far has been centralized... We're now complementing that effort with a distributed reporting system... more
Mobile WiMAX will outpace LTE over the next few years due to its head start on deployments, reports In-Stat. While WiMAX and LTE will take very different paths, the report suggests Mobile WiMAX already has commercial deployments where as LTE won't be commercially available until late 2009. more
I don't want to get into the entire Irish Recorded Music Association (IRMA) vs Eircom and IRMA vs ISPs debacle. The only reason I'm even writing this is because I'm getting a bit tired of all the "quotes" of "quotes" and other unclear and misleading things that people have been saying about ISPs over the last few weeks. more
There are now 177 million domain names across all top-level domains, which is an increase by 16% (24 million domain names) compared to a year ago. These numbers are from the latest Domain Name Industry Brief, a quarterly report from VeriSign about the growth of the domain name industry. In this review, Royal Pingdom has broken down the numbers in order to demonstrate the growth of both gTLDs (generic TLDs, such as .com and .net) and ccTLDs (country-code TLDs, such as .cn, .se, .uk and .us). more
C-SPAN interviews professor Gene Spafford from Purdue University on the topic of cybersecurity and how the current Internet is a conduit for all types of "cybercrime". He also talks about the much discussed article "A New Internet?" by John Markoff in the February 14, 2009, New York Times in which he was quoted. The piece argued for a new type of Internet that is more secure with the trade-off of users giving up more of their anonymity. Professor Spafford talks about alternative solutions and he responded to questions via telephone calls and email. more
ipoque, a European deep packet inspection hardware provider has published an Internet study for 2008/2009 providing an overview of the Internet's current state based on analyzing 1.3 petabytes of Internet traffic -- "the amount of data equal to 300,000 DVDs" -- in eight regions of the world (Northern Africa, Southern Africa, South America, Middle East, Eastern Europe, Southern Europe, Southwestern Europe, Germany). The study includes the use of about 100 of the most popular Internet protocols including P2P, VoIP, media streaming, instant messaging. more
In this multipart series I will be presenting some of the leading industry-standard best practices for enterprise network security using Cisco technologies. Each article in the series will cover a different aspect of security technologies and designs and how each can be deployed in the enterprise to provide the best security posture at the lowest possible budgetary and administrative cost. In Part 2 of this series I discussed security risks and vulnerability. In this article we begin to focus on the role Cisco network and security technologies play in ensuring the safety and security of network data. more
According to a new report, the number of domain names increased by 24 million globally in 2008 increasing the total to 177 million domain name registrations across all of the Top Level Domains (TLDs). This represents 16% growth over the previous year, reports the latest Domain Name Industry Brief published by VeriSign. It is also noted that the last quarter of 2008 saw more than 10.1 million new domain names registered across all TLDs. This reflects a slower growth in new registrations with a decline of 12% from the third quarter 2008 and 17% from the same quarter in the previous year. more
David Akin pointed me to this article in the Ottawa Citizen which describes CRTC initiatives aimed at getting the cablecos to pay into a fund that would support, "the creation of high-quality, high-cost, scripted Canadian broadcasting content in the new media." In it, Ken Engelhart, senior vice-president of regulatory [affairs?] for Rogers Corp. is quoted saying... more
In the mid-year 2008 rankings by the Fibre-to-the-Home (FttH) Council, South Korea, Hong Kong, Japan and Taiwan occupy the top four positions in terms of household penetration percentage. Asia Pacific now accounts for more than 27 million of the world’s 32 million FttH connections. more
ICANN has its 34th international public meeting in Mexico City on 1-6 March i.e. in just over a fortnight. One of the consistent concerns I hear in my role as general manager of public participation for the organization is that there is not a way for people to ask questions to the staff and the Board. I don't think that's really true but I do accept that the formats used are not liked by a large number of people... more
As enterprise information security spending is scrutinized in unprecedented fashion in 2009 Information Technology management will seek to get more for their security dollar. While budgets tighten and risks grow due to the global economic downturn IT departments will be looking for point solutions, not suites of security tools. more
Adding to the flurry of gambling news of late, the Washington Court of Appeals issued a decision today that found peer-to-peer betting company (betcha.com) did not violate Washington state gambling laws. The court runs through some other issues underlying the statute, but the net result is that Betcha is off the hook... for now. Read more... more
The telecom infrastructure decisions we are now facing have very little to do with developments or the need for services in 2009 or 2010. They are more related to where the digital economy is taking us in the future. This is well beyond the time needed to kick-start sluggish economies. more
In this multipart series I will be presenting some of the leading industry-standard best practices for enterprise network security using Cisco technologies... In Part 1 of this series, I provided an overview of the critical role that properly designed data security architectures play within an Internet-connected organization. Before we begin to discuss the security designs, processes and recommendations related to Cisco technology, let's first discuss some of the ways a network becomes unsecure... more