No Image

Phil Howard

Joined on November 9, 2003
Total Post Views: 0


Information about this member is not available yet.


Trump Wants to Change the Communications Decency Act

Bandwidth Needed to Work from Home

The Internet Is for All

Time to Stop Talking About Unserved and Underserved

Trust Binding

Is Teleworking Here to Stay?

Is the Lockdown Driving Domain Registrations?

The Upload Crisis

Zoom Cryptography and Authentication Problems

Zoom Security: The Good, the Bad, and the Business Model

Zoom Faces Class-Action Lawsuit, Accused of Overstating Its Privacy Standards

Vint Cerf Has Tested Positive for Coronavirus

Technology Vendors Must Be Proactive in Dealing With COVID-19 Problems

Namecheap, EFF and the Dangerous Internet Wild West

Firefox Starts the Roll Out of DNS Over HTTPS (DoH) by Default for US-Based Users

Why Are the U.S. Broadband Prices So High?

France to Stop Using Google as Part of Its Plan to Establish Digital Sovereignty

Strange Email Used to Inform Marriott Customers About the Massive Data Breach

Hackers Behind Marriott Breach Left Clues Suggesting Link to Chinese Government

Why Foldering Adds Very Little Security

HTTPS Interceptions Are Much More Frequent Than Previously Thought

Russian Hackers Have Penetrated U.S. Electric Utilities

US Govt Formally Asks Whether It Should Reassert Its Control of Internet, Reversing ICANN Handover

Schneier and Kerr on Encryption Workarounds

Russian-Based Kaspersky Lab Planning on Swiss Data Center to Address Russian Exploit Concerns

'First True' Native IPv6 DDoS Attack Reported

1.3 Tbps DDoS Attack Against GitHub is Largest Attack Seen to Date, Says Akamai

Washington State Passes Country's Toughest Net Neutrality Legislation

IPv6 Deployment Around the World: A New Digital Divide?

The Rise of a Secondary Market for Domain Names (Part 4/4): Facilitating the Secondary Market

Transition of the Telecoms Industry Is Overdue

Is It About to Get Much Harder to Own a Domain Name?

Are We Giving Up On Broadband Equality?

Is It Time for a Breakthrough in Securing Cyberspace?

IPv6 Subnetting - The Paradigm Shift

Silly Bing

Google's Secret Strategy With the Kansas City Fiber Project

Cloud Redundancy: How Amazon Should Repair Credibility

Measuring World IPv6 Launch: Comparing IPv4 and IPv6 Performance

Ethiopia Shows That Congress Is Right to Be Worried About UN Control of the Internet

Fixing Holes

Mobile Apps vs. Mobile Web

ICANN's New gTLDs: The Game Changers Have Landed

Wow, That's a Lot of Applications

Big Brands Trying to Corner Generic Domain Namespaces?

Why Comcast will Vehemently Fight a DOJ Investigation

About That Second, Third and Fourth Wireless "Attachment"

IPv4: Business As Usual

Don't Make Us Treat Our Customers Like Criminals!

Running DNSBLs in an IPv6 World

"Toll Free" Broadband Service: Double Billing Ripoff Or Better Than Best Efforts Premium Option?

Canadian Telcos Fast Tracking FttH to Combat Cable Operators

Business Case for IPv6 - Part 1

Intune Collapses the OSI Model

BYOD Woes and Worries

Global Payments Breach Confirmation

IPv6 DNS Blacklists Reconsidered

Wither WHOIS!: A New Look At An Old System

Spectrum Key to Broadband Utility

DNS Changer

There Are at Least 10 Million DNS Resolvers on the Internet Today

Growth in IPv6-Capable DNS Infrastructure

ICANN's Contract Not Enforceable on WHOIS Accuracy

Port 43 Failures Continue to Haunt

How Spam Has Damaged Mail Forwarding - And Ways to Get Around It

Nominet to Apply for .Wales and .Cymru Top-Level Domains

US-NL Cybercrime Treaty Signed

Feds Ask for DNSChanger Deadline Extension As Millions of PCs Could Be Cut Off from the Web

Email and Social Media Accounts Under the Spotlight in UK's Proposed New 'Spy' Plan

Spectrum Crisis: Wireless Auctions Preferred Method

The .net Top Level Domain and Cross-Coupled Failures

Closer Look at Domain Name Transfer Policy and the Hijacking of

Preventing A New World Internet Order

Customer Service is Law: The Panix Story

Hijacking of A Call for An Emergency Rollback Procedure

A Year of CAN SPAM

IP or NAT IP: Mostly IP

Using Whois to Enforce Law?

WSIS: What Is It 'Really' All About?

ICC and the U.N. Takeover

Blacklisting Under Wrong Assumptions

NAT: Just Say No

An Unsanctioned Whois Database

Topic Interests

IPv6 Transition IPv4 MarketsVoIPCybersecurityTelecomNetworksDNSWhoisDomain NamesICANNSpamMalwareDDoS AttackThreat IntelligenceInternet GovernanceMultilinguismPrivacyCensorshipNew TLDsRegistry ServicesBroadbandWirelessPolicy & RegulationWhite SpaceLawCyberattackCybercrimeEmailMobile InternetInternet ProtocolAccess ProvidersNet NeutralityIPTVWebCloud ComputingData CenterDomain ManagementDNS SecurityCoronavirus

Recent Blogs

There are no featured blogs by this member yet.

Popular Posts

There are no featured blogs by this member yet.