This past Saturday, a self-professed neo-Nazi massacred eleven worshipers at synagogue services in Pittsburgh. The killer was reported to have lived on and was incented by an "Over the Top (OTT)" service purposely established to facilitate extremist activities known as Gab. Within hours, the cloud service providers hosting their services announced they would no longer provide hosting services. Presumably, the threat of both potential civil litigation liability among other penalties, as well as adverse publicity, provided the motivation. more
Hackers have intensified attacks on government websites and media outlets, both on the Israeli and Palestinian sides. more
The Internet Governance Forum, held this year in the Brazilian beach resort town of João Pessoa, completed its 10th annual meeting Friday November 13. The IGF Secretariat claims that nearly 5,000 people attended. Moreover, it looks as if its existence will be continued for another 10 years when the UN meets in New York later this year. Vint Cerf declared it "the best IGF ever" in the closing open microphone session. But how good is "best?" more
Human rights are a topic that came up several times at the IETF meeting that just ended. There's a Human Rights Research Group that had a session with a bunch of short presentations, and the featured two talks at the plenary asking, 'Can Internet Protocols Affect Human Rights?' The second one, by David Clark of MIT, was particularly good, talking about "tussle" and how one has to design for it or else people will work around you. more
Late last year, we learned that China's 90,000 employee Haier Group would be producing laptops and tablets in partnership with GEDEME, a Cuban manufacturer that will assemble the machines using Haier parts, equipment, and production processes. Last week, a friend who is a professor at the University of Havana told me that he and other professors have been given GDM laptops. more
The Energy Internet is based on the same principles as that of the classic Internet except that energy rather data packets are routed between sources and destinations. It sometimes also referred to as mico-grids or nano-grids, but generally these terms are a misnomer as they really refer to a smaller version of the traditional electrical grid. Traditional power systems are passive, hierarchical and for the most part have no intelligence or management. more
Symantec today announced that it has signed a definitive agreement to acquire VeriSign's identity and authentication business, which includes the Secure Sockets Layer (SSL) Certificate Services, the Public Key Infrastructure (PKI) Services, the VeriSign Trust Services and the VeriSign Identity Protection (VIP) Authentication Service. more
The headlines this week say that over 200 million domain names now exist on the internet. Pretty impressive... But consider the explosive growth of Social Networks. The top twenty social networks alone have over 2 billion user names. With User Names on social networks rapidly becoming the Internet's new brand identifiers, I wonder: is it time that we apply the same trademark rules we have for domain names to user names as well? more
A hacker by the name of Gnosticplayers has claimed responsibility for the hacking of 44 companies resulting in over a billion user data. Hacker also gotten dangerously close to releasing the records, ZDNet reports. more
It didn't seem to make any headlines, but it is an interesting sign of the Internet times that, effective January 1, 2009 , the United State Patent and Trademark Office ("USPTO") changed the International Classification of "domain name registration services" to Class 45 (defined below). The reason that the move is interesting is that it is just one more indication that the world of the Internet is becoming less and less about technology and more and more about law and policy. more
Friday marks the beginning of the ICANN 57 meeting in Hyderabad, India. As per usual there will be a range of activities related to DNSSEC or DANE. Two of the sessions will be streamed live and will be recorded for later viewing. Here is what is happening. All times below are India Standard Time (IST), which is UTC+05:30. Please do join us for a great set of sessions about how we can work together to make the DNS more secure and trusted! more
The US government is demanding Apple unlock iPhones in about a dozen cases beside the San Bernardino one. In a strikingly similar case, Judge James Orenstein in Brooklyn rejected the government's request for three separate reasons. In the decision the judge refers several times to the San Bernardino case, and it is clear he expects this decision to be an important precedent for that one. more
The US government plan to move control of the internet's naming and numbering functions to ICANN next month may not move forward, reports Kieren McCarthy more
There has been plenty of buzz and chatter on the Internet recently concerning a very large DDoS attack against CloudFlare, with coverage on their blog, the New York Times, and the BBC, among many others. While attacks of this nature are certainly nothing new, the scale of this attack was surprising, reported to hit 120Gbps. For a sense of scale, your average cable modem is only about 20Mbps, or about 0.016% of that bandwidth. more
A shift has occurred in agriculture: farmers are not only relying on clouds but increasingly, on the cloud. With the click of a mouse, farmers can find out which fields need water and chemical inputs in real time. The use of this technology, called precision agriculture, is helping farming become more productive, environmentally friendly and is revolutionizing how our food is cultivated. more