/ Most Viewed

Getting New gTLDs’ Sales Drivers Right: Simulations Are Key

The new gTLDs won't survive unless registries learn simulation techniques, the only way to understand how sales drivers interact. Some of the new gTLDs have done dismally. Registry critics, including insiders, blame high registration prices, limited supply, and restrictions on usage, competition, and marketing messages. But these drivers connect with each other. You can't talk about prices without talking about price-setting mechanisms and the number of registrations. more

Agriculture At High-Speed: Project Updates on Bridging California’s Rural/Urban Digital Divide

When farms are connected to the Internet, we all benefit. Agriculture that gains real-time information about plants, soil, atmosphere, and irrigation, dubbed "precision agriculture", can save farmers 20-30% of their water consumption while increasing productivity by 20-70%, according to Valley Vision. The San Francisco-Bay Area Internet Society Chapter is pleased to announce that we have started phase one of our collaborative project, "Bridging California's Rural/Urban Digital Divide with Mobile Broadband"... more

Help Us Answer: What Will the Internet Look Like in 10 Years?

What will the Internet look like in the next seven to 10 years? How will things like marketplace consolidation, changes to regulation, increases in cybercrime or the widespread deployment of the Internet of Things impact the Internet, its users and society? At the Internet Society, we are always thinking about what's next for the Internet. And now we want your help! more

2020’s New Internet Success – Rejoinder

The posting with a similar name seems a bit contrived by anonymous in some strange attempt to enhance its significance. Many others, including myself, have been discussing this subject for some time. Indeed, a concerted lobbying effort and anti-competitive efforts by legacy TCP/IP internet stakeholders have been really ramped up over the past year to mischaracterize what is occurring. more

Deadline of Oct 31 to Register for IAB Workshop on Stack Evolution in a Middlebox Internet

Can we develop better transport protocols for communication across the Internet? In a world where the "end-to-end" principle is no longer certain and middleboxes are common, which paths through the Internet are actually available to applications? Which transports can be used over these paths? How can applications cooperate with network elements to improve path establishment and discovery? ... These are all questions posed for the Internet Architecture Board's (IAB) Workshop on Stack Evolution in a Middlebox Internet (SEMI). Taking place in Zürich, Switzerland from 26-27 January, 2015. more

The Issue of Market-Initiated Competition in Telecoms

Many political discussions are taking place all over the world about how to best stimulate national or provincial telecommunications infrastructure investments against the background of current market dynamics. In this context the question often revolves around whether there is a market failure and, if so, does the government have a role to play here to address the matter, or can it be left for the market to sort out. more

Supporting SpaceX Starlink in Remote Communities

Five companies are developing low-Earth orbit (LEO) broadband satellite constellations, but, as of now, only SpaceX is planning to market directly to consumers. What sorts of support will they require? A pilot study of Starlink connectivity in remote Chilean communities may provide some answers to that question. The Chilean regulator, SUBTEL, has authorized a year-long pilot study of Starlink connectivity in remote, rural communities and is committed to supporting them during the year. more

Best Practices: A Meaningless Term

Chad White wrote an article for MediaPost about best practices which parallels a lot of thinking I've been doing about how the email marketing industry treats best practices. After several conversations recently about "best practices," I'm convinced that the term is now meaningless. It's been bastardized in the same way that the definition of "spam" has shifted to the point that it has very different meanings to different groups of people. more

ICANN Releases Guideline for Coordinated Vulnerability Disclosure Reporting

ICANN has released a set of guidelines to explain its Coordinated Vulnerability Disclosure Reporting. The guidelines serve two purposes, says ICANN: "They define the role ICANN will perform in circumstances where vulnerabilities are reported and ICANN determines that the security, stability or resiliency of the DNS is exploited or threatened. The guidelines also explain how a party, described as a reporter, should disclose information on a vulnerability discovered in a system or network operated by ICANN." more

A Framework for Recent Internet Governance Discussions - From Montevideo Statement to 1net

There have been many significant Internet Governance developments in the last several weeks, and so I'd like to take this moment to provide a framework in which to consider these recent events. For the last several years, the leadership of several recognized Internet organizations (ISOC, ICANN, IAB/IETF, IANA, the 5 Regional Internet Registries (RIRs), and W3C; sometimes referred to as the "Internet technical organizations") have met periodically to promote better coordination between these groups. more

Microsoft is Abandoning SHA-1 Hashes for Updates - But Why?

Microsoft is shipping a patch to eliminate SHA-1 hashes from its update process. There's nothing wrong with eliminating SHA-1 - but their reasoning may be very interesting. SHA-1 is a "cryptographic hash function". That is, it takes an input file of any size and outputs 20 bytes. An essential property of cryptographic hash functions is that in practice (though obviously not in theory), no two files should have the same hash value unless the files are identical. more

DDoS Attacks Getting More Powerful, ISPs Report Concern Over New Threats and Budget Pressures

Massive distributed denial of service (DDoS) attacks against ISPs and their customers have almost doubled over the past year, according to a new security report. Attacks on networks making them unavailable to intended users -- also known as distributed denial of service (DDoS) attacks -- exceeded 40 gigabits in the last year according to Arbor Networks' annual survey of ISPs from North America, South America, Europe and Asia. more

Why ‘Open’ May Become the Keyword of the Digital World in 2022?

From open standards and software to data, 'open' has been a defining word of the internet since its early days. However, most of the digital growth around major platforms has been driven by proprietary software and 'closed' systems. Recently, companies such as Microsoft and Google have been shifting towards open-source software more and more. Over the last few years, additional momentum was created with the USA adopting the open-source approach to cope with lagging behind, mainly, Huawei in the development of 5G networks. more

The Jaynes Case is Finally Over

Last September the Virginia Supreme Court issued a surprise ruling that reversed its previous decision and threw out the state’s anti-spam law on First Amendment grounds. The Commonwealth made a last ditch appeal to the US Supreme Court, which I predicted they’d be unlikely to accept. I guessed right... more

Governments Increasingly Trying to Control the Internet, Warns New U.S. Report

The U.S. Sate Department annual human rights report released on Friday has expressed concerns over the increasing trend among governments spending more time, money and attention in efforts to control their citizens access to the Internet and other communication means. To aid people seeking to speak out, the U.S. government is helping to finance circumvention technologies to avoid firewalls, reports the Associated Press. "To deal with governments hacking computers or intimidating dissenters, the U.S. government has trained 5,000 people from around the world on how to leave less of a trace on the Internet." more