Computer scientists, engineers and journalists gathered today on the CERN particle physics lab in the suburbs of Geneva, Switzerland, to pay homage to the a 1989 proposal by Tim Berners-Lee that would later come to be the blueprint for the World Wide Web. In March 1989, Tim Berners-Lee submitted a proposal for an information management system to his boss, Mike Sendall. 'Vague, but exciting', were the words that Sendall wrote on the proposal, allowing Berners-Lee to continue... more
Open Society Fellow Evgeny Morozov and I have written an Op-Ed for Project Syndicate about how the future of Internet control is not "firewall" censorship but more subtle forms of manipulation and pressure. Recognizing that censorship is too heavy handed and imperfect to be successful on its own, the Chinese government's Internet strategy is placing increasing emphasis on corporate self-censorship... more
Today the Berkman Center announced a new project that might be of interest to readers. Since 2002 I've studied Internet filtering around the world, most recently as part of the OpenNet Initiative. Last year with support of the MacArthur Foundation we published "Access Denied," a study of filtering in about 40 states. Our work so far has been centralized... We're now complementing that effort with a distributed reporting system... more
I don't want to get into the entire Irish Recorded Music Association (IRMA) vs Eircom and IRMA vs ISPs debacle. The only reason I'm even writing this is because I'm getting a bit tired of all the "quotes" of "quotes" and other unclear and misleading things that people have been saying about ISPs over the last few weeks. more
C-SPAN interviews professor Gene Spafford from Purdue University on the topic of cybersecurity and how the current Internet is a conduit for all types of "cybercrime". He also talks about the much discussed article "A New Internet?" by John Markoff in the February 14, 2009, New York Times in which he was quoted. The piece argued for a new type of Internet that is more secure with the trade-off of users giving up more of their anonymity. Professor Spafford talks about alternative solutions and he responded to questions via telephone calls and email. more
ipoque, a European deep packet inspection hardware provider has published an Internet study for 2008/2009 providing an overview of the Internet's current state based on analyzing 1.3 petabytes of Internet traffic -- "the amount of data equal to 300,000 DVDs" -- in eight regions of the world (Northern Africa, Southern Africa, South America, Middle East, Eastern Europe, Southern Europe, Southwestern Europe, Germany). The study includes the use of about 100 of the most popular Internet protocols including P2P, VoIP, media streaming, instant messaging. more
According to a new report, the number of domain names increased by 24 million globally in 2008 increasing the total to 177 million domain name registrations across all of the Top Level Domains (TLDs). This represents 16% growth over the previous year, reports the latest Domain Name Industry Brief published by VeriSign. It is also noted that the last quarter of 2008 saw more than 10.1 million new domain names registered across all TLDs. This reflects a slower growth in new registrations with a decline of 12% from the third quarter 2008 and 17% from the same quarter in the previous year. more
David Akin pointed me to this article in the Ottawa Citizen which describes CRTC initiatives aimed at getting the cablecos to pay into a fund that would support, "the creation of high-quality, high-cost, scripted Canadian broadcasting content in the new media." In it, Ken Engelhart, senior vice-president of regulatory [affairs?] for Rogers Corp. is quoted saying... more
A study comparing best-of-breed computer security vendors suggests more than half of active malware and phishing threats on the Internet go undetected, with an average detection rate of 37% for malware and 42% for phishing. "Given the dynamic nature of today's online threats and the traditionally reactive approach taken by today's malware and phishing detection technology, conventional signature-based solutions are inherently at a disadvantage to keep up," said Panos Anastassiadis, CEO and Chairman of Cyveillance. "Because the majority of damage occurs during the first 24 hours of an attack, early detection of attacks is crucial." more
With the alarming increase in cyberattacks, criminals are literally turning businesses against their own customers in order to steal consumer's personal data, warns the latest annual X-Force Trend and Risk report from IBM. "The security industry puts a lot of effort into the technical evaluation of security threats, examining, sometimes at great length, the potential threat that each issue might present to corporations and consumers. Criminal attackers out for profit, however, have considerations that the security industry does not always take into account, such as monetization cost and overall profitability." more
A glitch in Google's security update on Saturday morning caused links to every search result -- including Google's own pages -- to get flagged with the warning: "This site may harm your computer." The errors caused panic among users around the world who at first feared the popular search engine had suffered a major security failure. The problem which lasted for approximately 40 minutes has now been acknowledged and fixed by Google. The reason for the hiccup, as explained by Google, was due to a human error in the list of URLs Google uses to identify and flag websites known to install malicious software. more
I recently had the opportunity to interview, Richard Whitt, Google's Washington Telecom and Media Counsel, who will be one of the keynote speakers at the upcoming Emerging Communications Conference (eComm 2009) being held on March 3-5 at the San Francisco Airport Marriott. The following is the transcript of our phone conversation and the audio recording of the interview. more
Contrary to the image of Generation Y as the "Net Generation," internet users in their 20s do not dominate every aspect of online life, says a new report released today by Pew Internet. Based on December 2008 survey conducted by Pew Internet and American Life Project, generation X is the most likely group to bank, shop, and look for health information online. Boomers are just as likely as Generation Y to make travel reservations online. And even Silent Generation internet users are competitive when it comes to email (although teens might point out that this is proof that email is for old people). Over half of the adult internet population is between 18 and 44 years old. But larger percentages of older generations are online now than in the past, and they are doing more activities online, according to surveys. more
Patrick Neighly reports on CommsDay about the Pacific Telecommunications Council 2009 Conference held last week where Vint Cerf was a keynote speaker. From the report: "Historians will view 2009 as a turning point in Internet history, according to Google internet evangelist Vint Cerf. Speaking to PTC'09 attendees, the legendary figure warned the industry to brace for 'significant change' and said Asia was poised to forever change the look and experience of the online landscape. The region boasts 578.5 million surfers with nearly 85% of its population still to come. That influx is likely to combine with the launch of non-Latin-character addresses to reshape the Web into a very different beast." more
Irrespective of which solution to the current domain name brand-sharing impasse ends up being adopted by brand owners (option 1, option 2, or a combination), the owners must first understand and embrace current trends in online communications, information gathering, and entertainment. Thus, for a solution to succeed the corporate mindset toward new technologies needs to change; after that brand owners can work cooperatively with the domain name industry (owners and institutions) to increase the aggregate pie. more