In January we presented the glorious history of the MIT spam conference, today we present the schedule for the first day. Opening session will be from this author, Garth Buren with a topic entitled The Internet Doomsday Book, with details be released the same day as the presentation. Followed by Dr. Robert Bruen with a review of activities since the last MIT spam conference... more
Online fakes can be a lucrative business and difficult to crack down on, due to the ease and low-cost of setting up multiple virtual storefronts and the ability to obfuscate an operation's identity. A federal lawsuit filed on March 1, 2010 by Polo Ralph Lauren and VF Corp. illustrates these points and highlights many of the intricacies of an online counterfeit ring. more
The ICANN Board meeting undertaken recently in Nairobi was indeed eventful and there were many vital topics on the agenda, in particular for the new gTLD program that kept many interested parties on the edges of their seats as the meeting unfolded. ... One of the more controversial decisions was in regard to the Expression of Interest (EOI), a program intended to allow potential new gTLD applicants to pre-register for their desired TLD and provide ICANN and the community with invaluable information regarding likely volumes of applications. more
China's insomniac twitterati were on fire this afternoon U.S. time, powered no doubt by much caffeine and sugar in the the wee hours of the morning in China. Half an hour before Google's David Drummond posted his announcement that Google.cn is now effectively operating from Google.com.hk, Guangzhou-based open source programmer @LEMONed broke the
news that google.cn was being redirected to the Hong Kong service. Reacting to the news, @wentommy quipped: "One Google, One World; One China, No Google." more
The FCC proposal in its recently launched National Broadband Plan to share infrastructure is a very smart initiative indeed. Sharing infrastructure makes a lot of sense. Without it the business model for universal high-speed broadband will not stack up -- the costs of infrastructure is one of the most critical elements in any national broadband plan. Australia is following an identical course with the rollout of their National Broadband Network. In all six current rollout sites utilities are either already involved or are negotiating to become involved. more
There is an old saying that "bad news comes in threes." Domain name service providers have witnessed two unsettling developments in the past few weeks. The third, still winding its way through the U.S. Congress, could have enormous ramifications. Registries and registrars, in particular, need to speak up or resign themselves to the consequences. more
I have come to acceptance that the community proposal for Expressions of Interest in new gTLDs (EoI) was removed from consideration during ICANN's March 12th Board Meeting in Nairobi. It should have passed, but it got lobbied into oblivion by some in attendance at the Nairobi meeting. They deserve their say, those who oppose it, but quite frequently the arguments used fail logic once one reflects upon them, or contrast them against the facts. more
Last week at the ICANN meeting in Nairobi, a plan was announced by ICANN staff to create a "CERT" for DNS. That's a Community Emergency Response Team (CERT) for the global Domain Name System (DNS). There are all kinds of CERTs in the world today, both inside and outside the Internet industry. There isn't one for DNS, and that's basically my fault, and so I have been following the developments in Nairobi this week very closely. more
Until today's announcement by Canon, no large brand had broken the "thin brand line" by revealing their plan to apply for their own new top-level domain. Now with Canon's announcement, other major companies have been challenged to either announce their TLD plans or else state that they plan to forgo the chance to brand themselves at the top level of the domain name space. more
With $72 billion invested in mobile broadband it would be hard to argue that this market is suffering from a lack of investment. More than half of this is taking place in Asia. Over the last two years close to 300 mobile operators in 120 countries have launched mobile broadband networks (using the 3G HSPA technology) and some 70 of these are already planning the next upgrade of their networks using the LTE technology -- the first $5 billion of investment money has been committed to that technology. more
This article on cloud appeared in the Economist.com on April 12th 2001 titled "The Beast of Complexities" Stuart Feldman of IBM, mentions these examples. Quote 'Picture yourself as the product manager of a new hand-held computer whose design team has just sent him the electronic blueprint for the device. You go to your personalized web portal and order the components, book manufacturing capacity and arrange for distribution. With the click of a mouse, you create an instant supply chain that, once the job is done, will dissolve again." unquote. ...In the same article he also lamented that so far, nobody has found a silver bullet to kill the Beast of Complexity. more
The FCC recently published some tools to let consumers measure some internet characteristics. The context is the FCC's "National Broadband Plan". I guess the FCC wants to gather data about the kind of internet users receive today so that the National Broadband Plan, whatever it may turn out to be, actually improves on the status quo. The motivation is nice but the FCC's methodology is technically weak. more
For those closely following the ICANN Meeting in Nairobi this week, the EOI (Expression of Interest) model seemed like a foregone conclusion. In fact, ICANN had scheduled a webinar on March 18th to explain the process despite the complaints of the community and large-scale disagreement amongst proponents of the EOI. more
Following in the footsteps of Lethic, Waledac and Mariposa, yet another botnet has been taken offline. Not completely, though, it was only a partial disconnect. The Zeus botnet, also known as Zbot, is a trojan password stealer that captures passwords and sends them to the attacker. more
For those participants that have been working rearranged hours and participating remotely in connection with ICANN's Nairobi meeting, here is a chance to sleep in. While ICANN Board tea leaf reading is not an exact science, there is a great deal of predictability to ICANN's actions so here are my big three predictions for tomorrow. more
Sponsored byCSC
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byRadix
Sponsored byVerisign
Sponsored byWhoisXML API
Sponsored byDNIB.com