It is with a heavy heart that we note the passing of a dear friend, colleague and member of the CAUCE board of directors, Don Blumenthal, on September 28, 2019, in Ann Arbor, Michigan. He was 67. Don was an anti-spammer for as long a there was an anti-spam community: he helped design, deploy and maintain the famous 'Spam Fridge,' the repository of junk email maintained by the Federal Trade Commission (FTC). more
Like the Internet Corporation for Assigned Names and Numbers (ICANN), the Uniform Domain Name Dispute Resolution Policy (UDRP) is consensus-driven; from the bottom up, not the top down. The result is a jurisprudence of domain names that develops in common-law fashion through Panel decisions that over time and through "deliberative conversations" among panelists resolve into consensus. more
This year is the twentieth anniversary of the formation of the Wi-Fi Alliance and the launch of commercial Wi-Fi. Wi-Fi has become so ubiquitous in our lives that it's hard to believe that it's only been twenty years since all broadband connections came with wires. In 1999 most people were still using dial-up, and that's the year when early adapters started buying DSL. I remember having incredibly long phone cords so that I could use my laptop at different places around the house. more
At EuroDIG 2019 a workshop was organised around the topic of consolidation on the Internet. It was organised around four angles: technique, competition, society and human rights and; future research. One thing became extremely clear: no one contested that consolidation is taking place nor that this already has and will have an impact on the Internet and consecutively on society. more
Tonight (27 Sep 2019) you can watch the 2019 Internet Hall of Fame induction ceremony streaming live out of Costa Rica. Eleven individuals from six countries will be inducted into the Internet Hall of Fame (IHOF) today. The 2019 class of inductees have expanded the Internet's reach into new regions and communities, helped foster a greater understanding of the way the Internet works, and enhanced security to increase user trust in the network. more
There's a well-documented crisis facing the domain name system: very few who rely on domain name registration data from the Whois database to perform vital functions can do so any longer, which is escalating consumer harm and abuse on the internet worldwide. And the problems, thanks to ICANN's overly restrictive policy post-GDPR and a failing policy process, are piling up. more
Since the first undersea cable was completed in 1858 to deliver telegraph messages between the US and England, we've had an extensive network of undersea cable networks that enable communications between continents. Earlier this year there were 378 undersea fiber cables in place that stretch over 745,000 miles. Here's an interactive map that shows all of the cables... What's most intriguing about the map is that there are a few cities around the world where numerous cables terminate. more
The ICANN Security and Stability Advisory Committee (SSAC) and the Internet Society Deploy360 Programme are planning a DNSSEC and Security Workshop on Wednesday, 06 November 2019, during the ICANN66 meeting held from 02-07 November 2019 in Montreal, Canada. The original DNSSEC Workshop has been a part of ICANN meetings for many years and has provided a forum for both experienced and new people to meet, present and discuss current and future DNSSEC deployments. more
Ren Zhengfei tells the Economist and the NY Times he is prepared to give the US essentially everything the President has asked, including the crown jewels: the complete design and source code of Huawei's 5G system. Ren would "license the entire Huawei 5G platform to any American company that wants to manufacture it and install it and operate it, completely independent of Huawei." more
One of the ongoing recommendations to improve deliverability is to send email that is timely and relevant to the recipient. The idea being that if you send mail a recipient wants, they're more likely to interact with it in a way that signals to the mailbox provider that the message is wanted. The baseline for that, at least whenever I've talked about timely and relevant, is that the recipient asked for mail from you in the first place. more
Over at the ECI blog, Jonathan Homa has a nice article about the importance of network planning: In the classic movie, The Graduate (1967), the protagonist is advised on career choices, "In one word – plastics." If you were asked by a young person today, graduating with an engineering or similar degree about a career choice in telecommunications, would you think of responding, "network planning"? Well, probably not... more
In July 2019, Netzpolitik and others leaked an internal document by DG Connect that outlines the European Commission's thoughts on an update of the E-Commerce Directive. Based on this document, it seems that the domain name system and its actors will be prominently addressed in the Ursula von der Leyen's Commission-cycle from 2019 to 2025. more
In an age where cyber threats and attacks have reached a point of ubiquity, managing your organization's network security single-handedly may no longer be sufficient. The increasing volume and sophistication of threats, not to mention the continuous advancement in attack tools and their perpetrators' skills and know-how, has led to concerns on whether potential targets can keep up. more
I haven't seen it talked about a lot, but the FCC has set aside millimeter wave spectrum that can be used by anybody to provide broadband. That means that entities will be able to use the spectrum in rural America in areas that the big cellphone companies are likely to ignore. The FCC set aside the V band (60 GHz) as unlicensed spectrum. This band provides 14 GHz of contiguous spectrum available for anybody to use. This is an interesting spectrum because it has a few drawbacks. more
With two simultaneous processes getting underway in the UN General Assembly's First Committee, the UN Group of Governmental Experts (GGE) and the Open-Ended Working Group (OEWG) on Cybersecurity, and several technology and multi-stakeholder initiatives pushing cybersecurity improvement, the world of cyber norms has become both more interesting and more complicated. more
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byIPv4.Global
Sponsored byCSC
Sponsored byRadix
Sponsored byWhoisXML API
Sponsored byVerisign