/ Recently Commented

Analysis of the US Broadband Stimulus Package

In January 2009 the US Congress began considering the American Recovery and Reinvestment Bill 2009 aimed at kick-starting an economy in deep recession. The package, passed into law on 17 February, comprised $787 billion of mainly tax cuts, unemployment benefits and spending in education, health care, infrastructure and energy. Included in the fiscal stimulus package was a relatively modest $7.2 billion for broadband and wireless in unserved and underserved areas... more

Dozens of US House of Representatives Websites Hacked

US House officials have confirmed hackers breaching several websites belonging to House of Representatives members in the past week. Portions of the websites were replaced by digital graffiti which began earlier this month, according to zone-h. Brian Krebs of the Washington Post reports: "Rep. Spencer Bachus has sent a letter to the House's chief administrative officer, requesting more information about the attacks. Bachus cites information provided to him by Gary Warner, director of research in computer forensics at the University of Alabama at Birmingham. Warner suggested that the break-ins at the House sites were caused not by password guessing [as reported initially], but by 'SQL injection,' an attack that exploits security weaknesses in Web server configurations." more

Online Video Watching Among Young Adults Near-Universal; Nine in Ten

According to a study by Pew Internet, nine in ten (89%) of young adults aged 18-29 are now watching videos online in a regular basis. Additionally, the study indicates that the share of online adults who watch videos on sites such as YouTube and other video-sharing sites has nearly doubled since 2006. "Fully 62% of adult internet users have watched a video on these sites, up from just 33% who reported this in December 2006," according to the report. more

Twitter Taken Down by DDoS Attack, Company Confirms

The Twitter micro-blogging service was knocked offline this morning for several hours as a result of a denial of service attack (DDoS). Twitter has confirmed and reported the attack in a post on its official blog earlier today: "We are defending against this [DDos] attack now and will continue to update our status blog as we continue to defend and later investigate." The company later reported that the service as been resumed but they are still continuing to defend against and recover from this attack. No further updates have been provided yet. more

Keeping IT Industry Developments in Context

The announcement that Google's chief executive Eric Schmidt is standing down from the Apple board hardly came as a surprise. Google's Android is already powering smartphones that offer an open alternative to Apple's iPhone, while the recent announcement of plans for Chrome OS, an operating system that will directly challenge Mac OS, makes Google a direct competitor to Apple in its core market... more

Key Members of Congress Call for Permanent ICANN-US Tie

Philip Corwin of the Internet Commerce Associations reports: "In a stunning rebuke of ICANN's assertion that it had achieved sufficient accountability and professional stature to justify termination of its unique relationship with the U.S. government, the Chairman of the House Committee on Energy and Commerce as well as the Chairman of its Internet Subcommittee, along with eight other Committee members, dispatched a joint letter on August 4th to Commerce Secretary Gary Locke urging that the relationship between ICANN and the U.S. be made permanent and strengthened." more

How Copyright Violators Are Removed from Search Engine Listings Based on DMCA

It may not be widely-known but the big 3 search engines -- Google, Yahoo! and Bing -- have established procedures for removing natural search results on the basis of the Digital Millennium Copyright Act (DMCA). That's good news for brand owners: if consumers can't find infringing websites via the search engines, they're less likely to come across them at all... more

Trans-Sector Thinking Spreading to the Highest Levels in Government

Australia, New Zealand and the USA have taken international leadership in relation to their approaches to the infrastructure investment their countries are committed to in relation to the multi-billion dollar investment in national broadband and smart grid infrastructure. This is based on open networks, which will allow multiple access to infrastructure that can be used for e-health, smart grids, tele-education, as well as, of course, to telecoms, Internet and entertainment services. more

NJ Man Arrested for Domain Name Theft and Sale on eBay

A man from the northern New Jersey area was charged and arrested for stealing a domain name belonging to the owners of P2P.com. According to reports, he allegedly transferred the ownership of the domain name to himself and succeeded in reselling it on eBay to a professional basketball player Mark Madsen of the Los Angeles Clippers. more

WIPO: Disregard TLD in Trademark Dispute

There is a Dutch website which regularly publishes comments on rulings of the World Intellectual Property Organization (WIPO) Arbitration, Dutch court cases, and similar things. They have a newsletter which reports over the latest cases. It is really meant for people who are into the legal aspects of domain names. In the July "nieuwsbrief" newsletter, there was a remark (in Dutch) about a case that the top level ".nl" suffix to the name should not be considered relevant. more

Seeing the Opportunity for IP Communications Within the Smart Grid Space

Having followed IP communications as an analyst since 2001, I've seen a few cycles come and go, and Smart Grid reminds me a lot of VoIP. Telcos and utilities both operate large, complex and costly networks, and prior to 1984, both were heavily regulated. Following the deregulation of telecom came a wave of unprecedented innovation and disruption built largely around IP technologies. We all know what that's done for telcos -- and communications in general. more

OpenDNSSEC Launched to Help Drive Adoption of DNSSEC

A team of developers including .SE (The Internet Infrastructure Foundation), LNetLabs, Nominet, Kirei, SURFnet, SIDN and John Dickinson have come together to create open source software, called OpenDNSSEC, to make it easier to deploy DNSSEC. Patrik Wallström, responsible for DNSSEC at .SE comments: "In order to spread the use of DNSSEC to an increased number of domain names, the management surrounding this technology must be simplified. Together with a number of collaborators, we're developing OpenDNSSEC. Leveraging our deployment experience, we will produce a well-packaged, easy-to-use and flexible DNSSEC tool that eliminates all manual procedures. Those in charge of name servers no longer need detailed knowledge about the protocol in order to use it." more

More Than Half Top-Level Domains Not Really on Top of IPv6

At the recent ISOC Asia conference in Kuala Lumpur a rather innocuous coffee break question was raised: could any one around the table name some of the major Top-Level Domains (TLDs) still delinquent in their IPv6 support? Nobody could answer on the spot but the question intrigued me. A logical place to start looking for an answer was ICANN. more

Survey Suggests Strained Budgets Causing Security Cutbacks on Known Threats

A recent survey of security professionals by RSA Conference with regards to critical security threats and infrastructure issues currently faced, revealed budgetary constrains as the top challenge currently faced. According to reports, the study suggests that even though practitioners are most concerned about email phishing and securing mobile devices, technologies addressing these needs are at risk of being cut from IT budgets. 72% percent of respondents indicated a rise in email-borne malware and phishing attempts since Fall 2008, with 57% stating they have seen an increase in Web-borne malware. Concerns about zero-day attacks and rogue employees as a result of layoffs were cited by 28% and 26% of survey respondents, respectively. more

Nuclear Command and Control Structures Vulnerable to Cyber Terrorism

A research paper commissioned by the International Commission on Nuclear Non-proliferation and Disarmament (ICNND) suggests that nuclear command and control systems are vulnerable to cyber terrorism. "Despite claims that nuclear launch orders can only come from the highest authorities, numerous examples point towards an ability to sidestep the chain of command and insert orders at lower levels," says the report. more