At the recent ISOC Asia conference in Kuala Lumpur a rather innocuous coffee break question was raised: could any one around the table name some of the major Top-Level Domains (TLDs) still delinquent in their IPv6 support? Nobody could answer on the spot but the question intrigued me. A logical place to start looking for an answer was ICANN. more
ICANN has operated on the fundamental principle that there should be separation within the domain name marketplace between registries (wholesale) and registrars (retail). This fundamental principle has been a pillar upon which ICANN has provided registrants (consumers) with increased choice, innovation, and price savings. Therefore it was with great surprise when ICANN staff unilaterally undertook this initial vertical separation analysis through exclusive consultation with ICANN contracting parties (registrars and registries), while totally excluding non-contracting parties (individual, business and non-commercial registrants)... more
Around the world governments, regulators and the industry are struggling with the old regulatory legacy systems. These have become a major stumbling block in the transition to a new environment. Increasingly countries are beginning to understand the social and economic benefits a national broadband infrastructure can offer, but it is impossible to bring that about while the systems are based on the present regulatory regimes. To take these broader benefits into account we will need to develop government policies to facilitate the digital economy... more
Gordon Crovitz's Op-ed in the Wall Street Journal about the relationship between ICANN and the future of free speech quotes me a couple of times... Crovitz emailed me last week when he was researching his column. I was somewhat more critical of ICANN's status quo in our exchange than in the quotes he ended up using. Following are my full answers, emailed to him on Thursday. more
Your corporate domain names send implicit messages (signals) through their Top-Level Domains (TLDs) and their second-level words. Shape your domain names so to send the right messages and to avoid sending unintentionally confusing messages. The post focuses on a framework to help bidders determine which TLDs send messages that are potentially profit generating... Soon TLDs such as ".car," ".cars," ".green," and ".eco" will be available to any qualified body whose request is favored by the allocation system. The system being discussed is a combination of beauty contests and auctions. more
Google has undertaken a beta-test of a telephony platform that includes the opportunity to route incoming calls to multiple devices and telephone numbers as well as free domestic long distance service. Google offers a service that fits somewhere between computer-to-computer, Internet telephony and Voice over the Internet Protocol telephony with access to and from the public switched telephone network. These service categories present polar opposites for U.S. regulatory purposes... more
As a follow up to Susan Brenner's Networks and Nationalization and my comment there, I will go further in this post and talk about the "cyberwar" and "offense" aspects of her article. I think I made this point elsewhere as well... but before getting into a war, it'd be a brilliant idea to actually know that you can win. Cyberwarfare is the sort of game where you don't really need to be a huge government with the largest standing army in the world and sophisticated weaponry in order to win... more
I recently followed an interesting international discussion on FttH vs. cable. With the fiber to the home (FttH) debate hotting up, driven by the possibility of using FttH as the new infrastructure for the digital economy, the cable companies are putting up a stiff fight, both in Europe (Netherlands) and the USA, claiming FttH is not necessary, and that DOCSIS 3.0 can do the job just as well. In these debates the longer-term national interest is often disregarded. The debate is confined to the technology -- what it can and cannot do -- and it also concentrates on a rather short-term timeframe, say of the next five years. more
This post isn't about -- or isn't only about -- the use of computer technology to commit crimes. It's more about the use of computer technology to commit war. A few weeks ago, I was part of a conversation about the legal issues cyberwarfare raises. We were talking about various scenarios -- e.g., a hostile nation-state uses cyberspace to attack the U.S. infrastructure by crippling or shutting down a power grid, air traffic control systems, financial system, etc. Mostly, we were focusing on issues that went to the laws of war, such as how and when a nation-state that is the target of a cyberattack can determine the attack is war, rather than cybercrime or cyberterrorism. more
In 2008, ICANN made it known to the community that it is finally ready to discuss Internationalized Domain Names regarding Top-Level Domains (TLDs) after several years of working groups, technical trials, studies and considerations. It was highly anticipated by the Chinese, Japanese and Korean (CJK) community. It was also with great disappointment when the New gTLD Application Guidebook, published on 24th Oct 2008, included the following paragraph... more
On Friday, the decision to deregulate "special access" circuits was upheld. The case had been brought by the Ad Hoc Committee, a long standing body of large business users, one of the main categories of buyers of high capacity leased lines to interconnect business premises. more
A web-based poll on the Mobile Broadband Genie site had participants 1160 who were asked: "Is your mobile broadband fast enough?" 133 yes; 740 no; 287 don't know. Perceptions of the term "mobile broadband" appear to far exceed what is being delivered. While operators have been competing to offer cross-subsidized laptop and netbook deals with higher usage caps and ever cheaper mobile Internet deals, they seem to have overlooked the quality of the service. more
In my department, we block about 92% of our total email (around 2.5 billion per day) at the network edge without accepting the message. When we do that, we don't see any traffic from that IP anymore and don't keep stats on it due to the overwhelming volume of mail. However, we do keep stats on mail that we block with our content filter. I decided to go and calculate how much spam we receive from each country by mapping the source IP back to its source country... more
The classic view of a wireline or mobile carrier is that it was an "operator", it ran out cables, raised poles, installed switches, constructed central offices and base stations and the like. However, the figures from Nokia Siemens Networks (NSN) show that firm is making 45% of its sales from services, meaning it is constructing and managing networks on behalf of "carriers". NSN is "carrying" a lot of telecoms traffic. This has been accelerated by the global financial crisis... more
Since my last post about DNS subversion we have had some good feedback. We had 29 responses, I agree a small sample, but what we found is very interesting. Let's remind ourselves of what we are looking at? Does your ISP redirect DNS queries? Specifically, if you try to make a port 53 UDP or TCP connection to a server outside of your ISP's network does it get there? more
Sponsored byIPv4.Global
Sponsored byRadix
Sponsored byCSC
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byWhoisXML API
Sponsored byVerisign