Telstra might regret having signed a commercial deal with London-based OneWeb as this company has now become a pawn in the war between Russia and Ukraine. Telstra agreed to host two OneWeb gateway Earth stations in Australia, one in the west and one in the north, which would also cover the APAC region, with a third Earth station currently under discussion for the east coast. more
A group of academic researchers have revealed a design weakness in the 4G/5G protocol which can be exploited by an attacker to identify the victim's presence in a particular cell area just from the victim's soft-identity such as phone number and Twitter handle. more
This year we must work together to open up Internet governance processes so that everyone can have their voices heard in the development of Internet policies. In 2015, the Internet governance landscape is peppered with events and meetings as a number of key Internet policy issues are debated. There are key global, regional and local discussions underway about how to strengthen the Internet governance model in ways that will be meaningful to users around the globe, and how to be more inclusive of new ideas and perspectives. more
I recently followed a webinar session organized by the University of Queensland on the factory of the future. Smart or not, the future will still need factories to make the stuff we humans use every day. One of the discussed questions included: "how will existing production models cope with the staggering and ongoing rate of digital disruption and advanced capabilities?" more
Before, during and after his inaugural speech (January 2009) President Obama spoke of the national benefits of broadband, and the changes which have been set in motion in the US telecoms market that were unheard of even a year ago. During the previous administration the incumbent telcos and cable companies had been given more freedom. As a consequence, innovation and competition dwindled and the US was no longer a leader in telecoms... However, since that time, the White House has lost some of its initial leadership. more
For all of us at Public Interest Registry, working to remove child sexual abuse content from the Internet isn't just a part of our work; it's our moral duty. As stewards of the .ORG community, addressing the problem head on is the only option compatible with our values. Talking about Child Sexual Abuse Materials (CSAM) is challenging and uncomfortable. It's also far too important, and prevalent, of a problem to ignore. While it's impossible to know exact numbers, online CSAM is a major, rapidly growing crisis. more
Senators Hawley and Blumenthal propose a bipartisan bill requiring federal evaluation of advanced AI systems, aiming to prevent misuse while balancing national security, civil liberties, and technological competitiveness. more
Connected devices need a free-to-use infrastructure that allows for innovation beyond the needs of a provider or other intermediary. An interface is best when it disappears and the user can focus the problem at hand. In the same way infrastructure, is best when it can simply be assumed and becomes invisible. With an invisible infrastructure as with an invisible interface a user can concentrate on their tasks and not think about the computer. Dan Bricklin and I chose to implement VisiCalc on personal computers that people could just purchase. more
It's tax time again. If you are like most domainers, you are a little hesitant about filing your tax return. This is not just because you dread paying Uncle Sam like most taxpayers. It may be because you are unsure of whether you are reporting your domain purchases and sales correctly. Despite the growth of domaining, it is still a relatively young and small industry that has not yet gained the attention of the IRS... more
One of the first in-depth reviews I’ve found for T-Mobile’s fixed cellular broadband was published in the Verve. It’s not particularly flattering to T-Mobile, and this particular customer found the performance to be unreliable – fast sometimes and barely functioning at other times. But I’ve seen other T-Mobile customers raving about the speeds they are receiving. We obviously can’t draw any conclusions based upon a single review by one customer... more
Last October the FCC issued a Notice for Proposed Rulemaking that proposed expanding WiFi into the 6 GHz band of spectrum (5.925 to 7.125 GHz). WiFi has been a huge economic boon to the country, and the FCC recognizes that providing more free public spectrum is a vital piece of the spectrum puzzle. Entrepreneurs have found a myriad of inventive ways to use WiFi that go far beyond what carriers have provided with licensed spectrum. more
In late August the White House mandated that all of the agencies in the US government have functioning DNSSEC capabilities deployed and operational by December 2009. I am suggesting here that we, as a community, commit to the same timetable. I call upon VeriSign and other registries to bring up DNSSEC support by January 2009. more
As news of the spread of the coronavirus (COVID-19) continues to emerge, CSC has undertaken the first in a series of studies looking at how the development of the crisis has affected online content. This first article looks at the numbers of registered domains with names containing coronavirus-related strings - "coronavirus" or "covid(-)19" (optional hyphen) - and analyzes the types of content present on the associated websites. more
As the expiry date of the current IANA Functions contract approaches (October 1st, 2016), some in the US Congress are challenging the validity of the proposal to transfer (or "transition") the ovesight role currently exercised by the US Administration, to a multistakeholder system equipped with checks and balances. A letter was sent to the President of the United States of America. Similar letters were sent to the Speaker and Leadership of the House of Representatives, as well as to the President pro tempore and Leadership of the Senate. more
As noted in the first part of this series, Security and Reliability encompasses holistic network assessments, vulnerability assessments, and penetration testing. In this post I'd like to go deeper into network assessments. I stated last time that the phrase "network assessment" is broad. more