On April 21st the Internet Commerce Association submitted a formal request to Mr. Frank Fowlie, ICANN Ombudsman, requesting an immediate investigation of the non-compliance of the Implementation Recommendation Team (IRT) with applicable provisions of ICANN's Bylaws. The IRT was created by a March Resolution adopted by the ICANN Board during its Mexico City meeting, and was charged with proposing "solutions" to the concerns of trademark holders. Unfortunately, the IRT has chosen to operate in a non-transparent manner... more
In response to customer feedback, Time Warner Cable has discontinued its trials of tiered Internet service. [Corporate Announcement here.] It was quite a stuff-storm, but to TWC's credit, they put their finger up, felt the howling gale, and changed course right away. This is in marked contrast to their larger competitor, Comcast... more
Internet users are acutely aware of their exposure on the Internet and clearly concerned about their safety. Increased downloads of scareware as Conficker made headlines in the mainstream media are only the latest evidence. Desktop software is often viewed as a one-stop shop for fighting Internet threats such as viruses, worms and other forms of malware and phishing. These solutions have served us well but more protections are needed to address the dynamic and increasingly sophisticated web based exploits being launched... more
As widely reported, Credit Suisse analysts have estimated Google's YouTube may lose $470M in 2009 and more in the future. However, their estimates say Google will pay $360M for bandwidth in 2009. I don't know how Google figures their cost of bandwidth, but anyone who understands anything about Internet transit/peering knows Credit is way off base. more
Without rehashing the mainstream headlines, it's clearly on the table now that eBay has given up trying to create synergies with Skype, so the focus now is on making the best of things as distinct entities. The preferred route for eBay would be to keep Skype and recoup their investment via an IPO sometime next year. That would certainly bring an end to things with both parties leaving on a high note. Of course this hinges heavily on the state of capital markets... more
With the Online Trust Alliance Town Hall Meeting and Email Authentication Roundtable next week as well as the RSA Conference, I decided to pause and think about where we are and where we might be headed with regard to email authentication. Over the years, many of us have collectively worked to provide a framework for authenticating email... more
Internet Corporation for Assigned Names and Numbers (ICANN) has been holding a public comment period on the second draft of the new generic Top-Level Domains (gTLD) handbook. This period was due to close yesterday. Prior to yesterday afternoon there was a healthy number of comments, but in the past 24 hours a significant number of new comments have been submitted... more
Four senators (Rockefeller, Bayh, Nelson, and Snowe) have recently introduced S.773, the Cybersecurity Act of 2009. While there are some good parts to the bill, many of the substantive provisions are poorly thought out at best. The bill attempts to solve non-problems, and to assume that research results can be commanded into being by virtue of an act of Congress. Beyond that, there are parts of the bill whose purpose is mysterious, or whose content bears no relation to its title. more
40 years ago the Request for Comments (RFC) process for the Internet was born. The RFC process continues to be the way Internet protocols are expressed today. We have one very special man to thank for this and his name is Dr. Stephen D. Crocker. He has played a key role in shaping the modern day Internet. For this, I felt that a special tribute to him was in order as we take a look at his countless contributions from the foundation of the Internet to the Internet as we know it today. more
We read and hear a lot of complaints from trademark interests about allegedly rampant cybersquatting and other forms of trademark infringement, but it's rare to see a story about reverse domain name hijacking and other abuses committed by them. That's what made it so refreshing to see an article in the Saturday, April 4th Wall Street Journal titled "The Scariest Monster of All Sues for Trademark Infringement – Fancy Audio-Cable Outfit Defends Its Brands; A Mini Golf Course Fights Back". more
Potential trademark Rights Protection Mechanisms (RPM) at the 2nd level can be divided into three main areas -- each defined by their time relative to Top-Level Domain (TLD) launch... Of these, we believe the third, "After Launch," is the most fruitful path to explore. We believe it offers the most potential to protect the rights of trademark holders, the best balance between TM rights and the legitimate rights of others who may want to register names , and the most benefit to the trademark community at the lowest cost to them... more
So this Internet thing, as we discussed in our last article, is broken. I promised to detail some of the specific things that are broken. Implicit trust is the Achilles heel of the Internet... All of the communication between the resolver and the DNS server is in plain text that can be easily seen and changed while in transit, further, the resolver completely trusts the answer that was returned... more
A cybersecurity bill introduced in the U.S. Senate on April 1st, 2009 would give the United States federal government extraordinary power over private sector Internet services, applications and software. This proposed legislation is a direct result of a review ordered by the Obama administration into government policies and processes for defending against Internet-born attack. The focus of the bill, according to a summary released by the sponsoring senators, is on establishing a new partnership between the public and private sectors in a joint effort to bolster Internet security... more
The ongoing witch-hunt from the incumbent telcos in the USA against municipalities that are trying to build their own broadband networks is continuing unabated. This is nothing new... With the economic crisis there has been a new focus on regulatory rules and the importance of the common good, next to the free market. However that message has not yet got through to the incumbent players in the USA. more
Wuhan in 1911 led the revolt that overthrew the Qing Dynasty and now hopes to dethrone the world's fiber leaders. China this year or next will surpass Japan as world fiber leader, with estimates as high as 30M homes connected. Wuhan's FiberHome is now #2 in the world according to Infonetics, ahead of Alcatel, Motorola, and Tellabs. more
Sponsored byCSC
Sponsored byVerisign
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byIPv4.Global
Sponsored byRadix