Weekend Reads 101422

Pinpointing Urban Broadband Gaps

The City of Chicago asked some researchers at the University of Chicago for help to identify the neighborhoods and the number of households that are not connected to broadband.

Recently ten Democratic Members of Congress wrote a letter to Alan Davidson, head of the NTIA, requesting that the “NTIA immediately cease the public disclosure of personal information about users of .US” country code top-level domain (ccTLD).

This makes a comprehensive, holistic brand protection program crucial for any brand owner, including monitoring to identify potentially damaging third-party content, and using enforcement strategies to take down infringing material

A fundamental mechanism that secures the internet has been broken

National research center for Cybersecurity ATHENE says it has found a way to easily bypass this security mechanism, and in a way that means affected network operators are unable to notice.

While he uses content creation as a lens for talking about mental health and the pressures he faces, he also draws parallels between making videos for the community and making tools for the community

One of the key issues for the Domain industry is how to accurately predict year-on-year how many customers will renew their domain names.

WhoisXML API threat researcher Dancho Danchev obtained a publicly accessible list of email addresses known to be owned and used by Iranian hackers.

In this post, I will be examining the routing security of operators in Singapore (according to APNIC registration data) and how .sg ccTLD domains are performing from a Resource Public Key Infrastructure (RPKI) point of view.

The Steady Hand Guiding AMD’s “Prudently Expanding” Datacenter Business

The old AMD – the one before Lisa Su took over – was often brilliant with its instruction set architecture and CPU designs, but sometimes perplexingly careless with its design choices and chip roadmaps.

Within the United States (US), there are 20 industry-centric Information Sharing and Analysis Centers (ISACs), numerous other sharing alliances, and commercial vendors that curate and manage threat feeds. The ISACs are responsible for information sharing with members within their respective sectors.

With the selection of a significantly different new slate of elected officials by the ITU’s governing body, it seems appropriate to contemplate the potential for an ITU renaissance going forward.

GIFs—particularly “reaction GIFs,” such as Michael Jackson chomping on popcorn and Mariah Carey muttering “I don’t know her”—were a lingua franca of the internet and significant enough culturally that in 2014, the Museum of the Moving Image in New York even put on an exhibit of reaction GIFs (titled “Moving Image as Gesture”).

Surveyed IT leaders reported ransomware as one of the biggest threats to tech-related business in North America, with 45% citing ransomware as their top concern overall.

The Syrian Electronic Army (SEA) is a group of threat actors that have been around since 2011. Some of their possible victims are PayPal, eBay, Twitter, media outlets, and some U.S. government websites.

That’s because the companies that created videoconferencing tools seemed not to understand that interoperability is critical. They all seemed to believe they could create closed ecosystems and move the market forward.