ICANN critics often focus on ICANN's expenditure. The organisation's overall budget had been growing for years prior to the new TLD program launch. However with the new TLD launch it mushroomed very quickly, with the organisation collecting $185k per application. With 1930 applications that gave them $357,050,000 ... ICANN's overall budget is big and how it decides to spend that money will always be subject to quite a bit of scrutiny. more
As I type these words, I am perched on one of the benches in the main thoroughfare of the cavernous venue hosting Mobile World Congress (MWC). Above me is a video screen warning me of the perils of the infamous local pickpockets, so I know I'm definitely in Barcelona! In its current form, MWC has been the mainstay event of the telecoms business for a decade, and its roots go back to the late 1980s. The slogan of this year's event is "Mobile is Everything". I believe this phrase is a symptom of an industry suffering from dangerous strategic drift. Here's why. more
While most of the recommendations included in the Cross Community Working Group on Enhancing ICANN Accountability (CCWG-Accountability) Report are much needed reforms to ICANN's accountability mechanisms, the proposal also contains a fundamental flaw, which jeopardizes its overall acceptance and risks delaying the IANA transition process further: it changes the role of governments from "advisory" to "decisional" over ICANN's governance, and it separately enhances the power of governments over ICANN's board of directors. more
When 2015 began, there were several million IPv4 numbers still in the American Registry for Internet Numbers (ARIN) IPv4 free pool, ARIN was processing 4-5 unique IPv4 transfer transactions per month, and fewer than 5 million numbers had been transferred publicly in the prior 12 months. The end of 2015 told a different story. In late September, the ARIN free pool was depleted. more
Tomorrow afternoon at 1pm EST Apple will be giving testimony to the House Judiciary Committee. The session that Apple and others will be taking part in is aptly named, The Encryption Tightrope: Balancing Americans' Security and Privacy In common with other hearings the various witnesses called to speak have already submitted their written testimony, so we can already look at it and analyse it. more
For years, the question of exactly when to register a domain name has been one asked by legal departments, as they've sought to formalize their internal processes. If you were to think about it logically, it would make most sense to register it after the trademark had been cleared. After all, why bother to register a domain, if you aren't going to use it to support a product, service or campaign? more
The 3rd meeting of the Inaugural Coordination Council of the Net Mundial Initiative (NMI.CC), hosted by Telefonica in Madrid on February 27, 2016, paved the way for the second phase of the innovative NMI platform. The council discussed how to adjust the strategic orientation and the structural design of the initiative, so that future activities are more focused on implementation of the Sao Paulo principles and roadmap. more
Encryption is key to commerce online. Anything that weakens it is a threat to the digital economy, so the FBI vs Apple case is something that a lot of people are watching very closely... The most recent development is that Apple has filed "Motion to Vacate the Order Compelling Apple Inc. to Assist Agents in Search, and Opposition to the Government's Motion to Compel Assistance." Legal filings aren't light bedtime reading, but this one explores the legal issues as well as the privacy and security implications from multiple angles and underlines why this case is so important. more
It is rather amazing to follow the reporting on the FBI vs Apple case in relation to the FBI's order to Apple to provide them with software that would allow them to crack the security code on all Apple phones. In some of those reports spin doctoring from the FBI -- especially through the public media -- led you to believe that Apple is not willing to assist the FBI in the San Bernardino murder case. This is, however, blatantly false. more
The North American Network Operators Group (NANOG) continues to be one of the major gatherings on network operators and admins, together with the folk who work to meet the various needs of this community. Their program committee produces a program that never fails to provide thought provoking interest. Here are my reactions to some of the presentations I heard at NANOG 66, held in San Diego in February. more
Departing ICANN CEO Fadi Chehadé has penned a goodbye letter to the organisation's Board as he prepares to leave this March. The 7-page letter reads like a long list of Chehadé's achievements since he took over the helm in 2012. Whilst there can be little doubt about Chehadé's tireless energy and dedication to making ICANN a more effective governance mechanism for the Internet, his celebration of the last four years seems to overlook one important opportunity. more
Distributed Denial of Services (DDoS) attacks have been the frustration of information technology professionals for many years. When asked, most tell you they wish their internet service providers (ISPs) would simply provide them "clean pipes" all the time and take care of DDoS attacks upstream before they ever get to them. Unfortunately, the resources (equipment and personnel) necessary to clean Internet connections all the time are very expensive and come with several downsides. more
On 18th February, 2016, Uganda Communications Commission, the Telco regulator, ordered all ISPs to sever access to Facebook, Twitter and WhatsApp. 11 million Internet users, including myself were forced to live through a four-day Internet blackout. With this unprecedented move, Uganda joined Syria, Russia, Egypt, Burundi and other regimes that have weaponized the Internet to curtail free speech and access to information. more
The much-maligned Uniform Rapid Suspension System (URS) is not only failing to catch on -- it's actually starting to fade. Once envisioned as a popular rights-protection mechanism for trademark owners under the new generic top-level domain names (gTLDs), the URS instead is seldom used. In fact, despite the growth in new gTLD registrations, the URS is in decline. more
We tend to make a number of assumptions about the Internet, and sometimes these assumptions don't always stand up to critical analysis. We were perhaps 'trained' by the claims of the telephone service to believe that these communications networks supported a model of universal connectivity. Any telephone handset could establish a call with any other telephone handset was the underlying model of a ubiquitous telephone service, and we've carried that assumption into our perception of the Internet. On the Internet anyone can communicate with anyone else - right? more
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byRadix
Sponsored byDNIB.com
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byCSC