/ Most Viewed

Using Gerrymandering Technology to Fight Gerrymandering

In 1991, eight high-level Soviet officials attempted a coup that failed after two days. During those two days, citizen journalists and activists used Usenet newsgroups to carry traffic into, out of and within Russia (70 cities). News spread and protests were organized in Russia. In the west, we saw images of Boris Yeltsin speaking to demonstrators while standing on top of a tank and the Russians saw that we were aware of and reporting on the coup. more

Using Dot Brand Domains in Brand Communication

A certain number of brands are using a dot brand domain as their main actual website. The following analysis looks at how dot brands are used in brand communication. Are brands communicating about their domain names, or are domain names supporting brand communication? Dot brand corresponds to the ability, for a certain number of pioneering brands, to use their brand name at the top level of the naming system for their own purpose, in parallel to a dot com or a country code. more

Australian Farms Get Connected to the Starlink Satellites

Last year, I reported on the possibility that LEO (Low Earth Orbit) satellite-based systems might be a gamechanger for the delivery of high-speed data services, including internet access, to people in regional and remote Australia. What has become clear with the rollout of the NBN is that the quality of data connections in metropolitan cities in many cases has improved, but that the rest of Australia doesn't have a similar experience. more

Designing for RealTimeML

The steepening trajectory towards event-driven and real-time API architecture is imminent. This means incorporating event-based APIs into a technology strategy and leveraging existing API legacy systems that may have incurred a fair amount of technical debt, especially for historically progressive organizations. more

NTIA Releases Cybersecurity Road Map for “Building a More Resilient Internet”

U.S. Departments of Commerce and Homeland Security have released a road map setting out steps to stop the cyber threat to nations internet infrastructure, announced NTIA. more

When ‘Confusing Similarity’ in UDRP Cases Gets Confusing

The first element of the Uniform Domain Name Dispute Resolution Policy (UDRP) requires a complainant to prove that the disputed domain name "is identical or confusingly similar to a trademark or service mark in which the complainant has rights." It's unusual for a complainant to fail on this first of three prongs, but one recent case demonstrates just how uncertain the UDRP can be sometimes. more

Apple Under Criticism for Back-Pedaling on IPv6 Support

Apple Computer's AirPort Utility, Version 6.0 was criticized this week at the North American IPv6 Summit for no longer being compatible with IPv6. The previous Version, 5.6, offered IPv6 service by default. "Comcast, for example, is urging its subscribers that are interested in using IPv6 not to upgrade to AirPort Utility Version 6.0 if they use the OS X Lion operating system because of incompatibilities with IPv6." more

EFF Raises Concerns Over EU’s Proposed Cyber Resilience Act

The Electronic Frontier Foundation (EFF) has voiced concerns about the European Union's proposed Cyber Resilience Act (CRA), saying it could pose significant threats to open-source developers and cybersecurity. more

Wither WHOIS!: A New Look At An Old System

No, that title is not a typo. The WHOIS service and the underlying protocol are a relic of another Internet age and need to be replaced. At the recent ICANN 43 conference in Costa Rica, WHOIS was on just about every meeting agenda because of two reasons. First, the Security and Stability Advisory Committee put out SAC 051 which called for a replacement WHOIS protocol and at ICANN 43, there was a panel discussion on such a replacement. The second reason was the draft report from the WHOIS Policy Review Team. more

How Safe is Your Fiber Network?

There was a major attack launched against long-haul fiber networks outside of Paris, France, on April 27 of this year. It appears that there was a coordinated attack by vandals to cut three long-haul fiber routes simultaneously. Fibers were cut with what seemed like a circular saw, and sections of fiber were removed to make it hard to make repairs. These were backbone fibers that were shared by multiple ISPs. more

How Effective Are Internet Blackouts? Insights from Uganda

On 18th February, 2016, Uganda Communications Commission, the Telco regulator, ordered all ISPs to sever access to Facebook, Twitter and WhatsApp. 11 million Internet users, including myself were forced to live through a four-day Internet blackout. With this unprecedented move, Uganda joined Syria, Russia, Egypt, Burundi and other regimes that have weaponized the Internet to curtail free speech and access to information. more

A Civil Society Perspective on NETmundial Final Outcome: A Remarkable Achievement Despite Losses

few 'big picture' thoughts on the Netmundial meeting in Brazil this week and its final outcome document, adopted by its high level committee. Overall, there are some truly amazing and forward-looking principles supported in the "Netmundial Multi-Stakeholder Statement" that we as civil society should be proud of, and especially our civil society representatives who worked tirelessly for this achievement. more

Google’s Holistic Approach to Datacenter: We Must Treat It as One Massive Computer

A recent paper released by by Urs Hölzle and Luiz André Barroso of Google's infrastructure design and operations team provides an introduction into today's high scale computing along with factors influencing their design, operation, and cost structure. From the abstract: "As computation continues to move into the cloud, the computing platform of interest no longer resembles a pizza box or a refrigerator, but a warehouse full of computers. These new large datacenters are quite different from traditional hosting facilities of earlier times and cannot be viewed simply as a collection of co-located servers..." more

Poland to Test a Cybersecurity Program for Aviation Sector

During the two-day Cybersecurity in Civil Aviation conference, Poland announced an agreement to test a cybersecurity pilot program for the aviation sector as Europe's European Aviation Safety Agency (EASA) civil aviation authority face increasing threats posed by hackers to air traffic. more

A Closer Look at the “Sovereign Runet” Law

In December 2018, a bill on the "stable operation" of the Russian segment of the Internet was introduced and got the title "Sovereign Runet" in mass media and among the public. It was adopted after 5 months later, despite doubts about the technical feasibility of its implementation. The law is very ambitious in its intent to simultaneously control Internet traffic and protect Runet from some external threats, but legislators still have no idea how it would actually work. more