Featured Blogs

Latest

Sprint’s Big Deal: New Life for WiMax

The Wall Street Journal is reporting the terms of a yet unannounced deal which will finance a massive rollout of WiMax by a Sprint-Clearwire joint venture. Outside funding is to be provided by Intel, Google, Comcast, and Time Warner Cable as well as Bright House, a small cable company. Assuming the deal is for real, this is good news for US users of broadband and, indirectly, other users around the world. more

700 MHz Update: Will VZ Comply with the Rules?

Last Friday (HT: IPDemocracy), Google filed a petition [PDF] asking that the Commission ensure that Verizon understands what those "open platform" requirements for the C Block really mean. Verizon has taken the position in the past that its own devices won't be subject to the "open applications" and "open handsets" requirements of the C Block rules, and Google says it is concerned that Verizon doesn't plan to follow those requirements in the future. This is big. Here's the background... more

Jeremy Jaynes Gets One More Chance

n 2004 Jaynes became the country's first convicted spam felon under the Virginia anti-spam law. He's been appealing his conviction ever since, most recently losing an appeal to the Virginia Supreme Court by a 4-3 decision in February. As I discussed in more detail at the time the key questions were a) whether the Virginia law had First Amendment problems and b) whether Jaynes had standing to challenge it. The court answered No to b), thereby avoiding the need to answer a), the dissent answered Yes to both. more

New CIRA Whois Policy Strikes Balance Between Privacy and Access

My weekly technology law column focuses this week on the new CIRA whois policy that is scheduled to take effect on June 10, 2008. The whois issue has attracted little public attention, yet it has been the subject of heated debate within the domain name community for many years. It revolves around the whois database, a publicly accessible, searchable list of domain name registrant information (as in "who is" the registrant of a particular domain name). more

Colorado Has a New Spam Law

The governor of Colorado recently signed a new anti-spam law [PDF] into effect. Since CAN SPAM draws a tight line around what states can do, this law is mostly interesting for the way that it pushes as firmly against that line as it can. Other observers have already done a legal analysis of the way it's worded to avoid being tossed out as the Oklahoma law was in Mummagraphics, and to make it as easy as possible for suits to meet the falsity or deception limits in CAN SPAM. To me the most interesting part of this law is its one-way fee recovery language... more

Fun and Games In the ccTLD World

There must be something in the air. I'm not sure exactly what it is, but there are a lot of things going on in the ccTLD world at the moment. In the UK Nominet's Annual General Meeting (AGM) is being held this week. This would normally provoke a yawn from most people -- it's an AGM -- how exciting can that be? This year's AGM looks like it could be quite entertaining, although it probably isn't going to be particularly beneficial for its membership. more

IPv6… Becoming a Hot Topic Again?

Is IPv6 a hot topic again in the wake of the increased coverage of the looming IPv4 address depletion? This was the theme of a coffee break discussion we had at the recent MENOG3 conference in Kuwait. With as many opinions as participants, I turned to "Google Trend" to help me get a better feel... Using IPv6 as search word and varying the time line indeed provided some interesting perspective and tidbits on when and where IPv6 seems to be or have been a hot topic indeed. more

Brand Complementors: Implementing a Cooperative Domain-Name Use

The essay expands a cooperative solution to third-party use of brands in domain names. Like any approach that depends on cooperation, the solution will require both sides to change behavior but also allow both sides to take credit for the resulting benefits, i.e. a triangular solution. If not immediately addressed, the problem of third-party use can become a major threat to the industry. But we already know one thing: when it comes to this issue, legal action and bullying don't work. more

Microsoft’s Contribution Was TCP/IP

There's a fascinating blog discussion going on here, here and here. The conversation is around Marc Andreessen's refusal to trash Microsoft and Bill Gates on stage. Andreessen points to the way in which the company drove the industry forward in the 1990's, and Mathew Ingram says "love them or hate them, at least Microsoft standardized the operating-system market"... more

China’s 3G License Delay is a Smoke Screen

Last week there was a flurry of stories about China's 3G plans after Jonathan Dharmapalan of Ernest & Young was quoted as saying he expected it to take 12 to 24 months from the start of China's commercial TD-SCDMA trials, i.e. from now, until 3G licenses were issued. But there was little analysis or comment on what's really happening. 3G licenses are a formality. They delay the deployment of 3GSM & CDMA 2000 which could otherwise happen rapidly -- just plug new cards into existing radios and offer established handsets (already being manufactured, in China, for the world market). more

The End of End-to-End?

One of the major principles of the architecture of the Internet was encapsulated in a paper by Saltzer, Reed and Clark, "End-to-End Arguments in System Design". This paper, originally published in 1981, encapsulated very clearly the looming tension between the network and the application: "The function in question can completely and correctly be implemented only with the knowledge and help of the application standing at the end points of the communication system. Therefore, providing that questioned function as a feature of the communication system itself is not possible." At the time this end-to-end argument was akin to networking heresy! more

Important New Jersey Supreme Court Decision in Internet Privacy

The New Jersey Supreme Court has issued an important decision on Internet users' right to privacy. The case involves a dispute about whether an ISP violated a user's privacy rights by turning over subscriber information (name, address, billing details) associated with a particular IP address. It ends up that the subpoena served on the ISP was invalid for a variety of reasons. As the user had a 'reasonable expectation of privacy' in her Internet activities and identifying information, and because the subpoena served on the ISP was invalid, the New Jersey court determined that the ISP should not have turned over the personal data... more

CNN.Com, Politically Motivated DDoS, and Asymmetric Warfare

Once again I find myself thinking about the nature of the asymmetric warfare threat posed by politically motivated DDoS (Estonia in 07, Korea in 02, and now China vs. CNN in 08). I keep thinking about it in terms of asymmetric warfare, a class of warfare where one side is a traditional, centrally managed military with superior uniformed numbers, weaponry, and skill. On the other we have smaller numbers, usually untrained fighters with meager weapons, and usually a smaller force. Historical examples include the North Vietnamese in the 20th century and even the American Revolution in the 18th century. Clearly this can be an effective strategy for a band of irregulars... more

ICANN GNSO Votes to Kill Domain Tasting

The ICANN Generic Names Supporting Organization has had tasting on its agenda since last fall, with a staff report issued in January, and a proposed anti-tasting policy written in March. On Thursday the 17th, the GNSO put the proposed policy to a vote, and it passed overwhelmingly. Under ICANN rules, the ICANN board has to take up the resolution at its next meeting, and since it was approved by a supermajority, it becomes ICANN policy unless 2/3 of the board votes against it, which in this case is unlikely. more

FCC’s Stanford Hearing on Broadband Practices

About 300 people attended to the net neutrality hearing Thursday hearing which began with testimony from Larry Lessig, a Stanford Law School professor and founder of the Center for Internet and Society... The meeting was called by the FCC in reaction to the news that US net firm Comcast had been exposed as managing traffic by stopping some of its 13m customers uploading files to BitTorrent and other peer-to-peer networks. The FCC has started a formal investigation to see if Comcast merits a fine for its actions. more

Topics

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

Threat Intelligence

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days