Inspired by a belief that ICANN and IANA extend First Amendment protections to Internet users worldwide, representatives in Congress successfully thwart budget provisions for a transition plan.
A security upgrade process just begun by ICANN on its zone domain transfer system revealed a compromise whose signature implies the hacker knew what he or she was doing.
If you're scared by the idea of a central server out there in the world granting you access to your company network, maybe you'd feel easier with your company network granting you access to the world.
The era of logging onto the Web using a real, physical key may have just begun. Of course, if things start to get cumbersome and that key is easily bypassed, it may have just ended.
Most intelligent people actually know what the Internet is. So why, when we get into one of the most important debates of our time, does intelligence fail us and we suddenly get this wrong?
I'm already on record as somewhat skeptical about enterprises deploying yet another chief something-or-another officer. One key reason is that it isn't exactly clear who has responsibility for what initiative.
It may not be an official re-definition of "broadband" just yet, but the FCC's alteration of its Universal Service Fund order does give it double-digit download speeds. The question remains, will enough carriers sign up?
IT organizations aching for more data that could lead them to a decision about whether to abandon Windows as their company desktop may get a few morsels next month.
One of the objectives that the FIDO Alliance 1.0 Specification sets forth is to strengthen authentication through a choice of multiple factors. And one of its compromises is allowing passwords to be one factor.
One of the most productive and useful innovations in the history of communications may not happen because some folks are making headway characterizing it as unnecessary.
The "last mile" leading from customer distribution points to customer premises can remain paved with copper, now that a standard for interfacing fiber to copper has at last been published.
It remains the conversation we're afraid to have: the one that leads us to the conclusion that the only way to secure our communications is with a system that reliably identifies us.
A coalition of major providers, many of whom have been burned by security breaches, proposes a standard for gaining authenticated access over the Web. Hopefully the Web's still around when the standard's adopted.
Now that Linux in the enterprise can be described using the Latin phrase de facto, the proverbial shoe finds itself on the other foot. It may be too soon for any Linux vendor to adopt a Microsoft-style swagger.
"We've got to monetize it differently," says the man responsible for implementing the business model that will define what it means to be a PC in the year 2015.
I've said any number of times, in these pages and elsewhere, that we as a society are not ready for the convergence of all the concepts we are creating that culminate from these new technologies, into one arena of public discourse.
If cost remains the key inhibitor to deploying virtual desktops on thin client devices, then could Dell's incorporation of Wyse into the entire company drive those costs down? Or should I say, drive them down enough?
Europe's "way out" of the net neutrality debacle appears to be to divide the Internet into a quality-of-service tier and a free-for-all tier. Now, the E.U.'s most provocative member is on board.