DNS root servers function as part of the Internet backbone, as explained in Wikipedia, and have come under attack a number of times in the past -- although none of the attacks have ever been serious enough to severely hamper the performance of the Internet. In response to some of the common misconceptions about the physical location and total number of DNS root servers in the world, Patrik Faltstrom has put together a visual map on Google, pin-pointing the approximate location of each server around the world. more
Damien Allen of VTalk Radio recently interviewed Professor Eric Goldman of the Santa Clara University School of Law on the topic of "Domaining". The interview covers the nature of domaining as a business and how it differs from cybersquatting. From the interview: "Often times the domainers are not particularly interested in profitable resale and, in fact, in my experience many times when domainers get complaints about domains, they'll just hand the domain name back, no questions asked and no money charged. They're not looking to make money from the resale of the domain names..." more
Microsoft has filed 3 cybersquatting cases at the beginning of September 2007, as reported in an Inside Indiana Business article. I took the liberty of accessing the cases via the PACER system, and posted the major documents... It looks like they're stepping up efforts to defend their trademarks, and seeking big damages in court, rather than go the way of the UDRP. These cases demonstrate that new TLDs should not be a priority with ICANN until the problems in existing TLDs are addressed. more
When a network is subject to a rapid increase in traffic perhaps combined with a rapid decrease in capacity (for example due to a fire or a natural disaster), there is a risk of congestion collapse. In a congestion collapse, the remaining capacity is so overloaded with access attempts that virtually no traffic gets through. In the case of telephony, everyone attempts to call their family and friends in a disaster area. The long standing telephony approach is to restrict new call attempts upstream of the congested area... This limits the amount of new traffic to that which the network can handle. Thus, if only 30% capacity is available, at least the network handles 30% of the calls, not 3% or zero... more
Zango, a company that used to be called 180 solutions, has a long history of making and distributing spyware. (See the Wikipedia article for their sordid history.) Not surprisingly, anti-spyware vendors routinely list Zango's software as what's tactfully called "potentially unwanted". Zango has tried to sue their way out of the doghouse by filing suit against anti-spyware vendors. In a widely reported decision last week, Seattle judge John Coghenour crisply rejected Zango's case, finding that federal law gives Kaspersky complete immunity against Zango's complaint... more
On August 23 ( while I was in China) a list member Lee S. Drybrugh wrote in jest: I happened to bump into Peter Cochrane stating, "The good news is -- bandwidth is free -- and we have an infinite supply." Next by sheer accident I bumped into this in relation to Gilder, "Telecosm argues that the world is beginning to realise that bandwidth is not a scarce resource (as was once thought) but is in factinfinite." Can anyone explain this infinite bandwidth as I think I am getting ripped off by my ISP if this is true? Craig Partridge then offered what I think is a very good commentary of a difficult question where the answer depends very much on context... more
As if there weren't enough problems with lawyers sending out improper cease-and-desists, Wired News reports that a Nevada man has pleaded guilty to impersonating a lawyer to extort domain registrants to turn over their domain names. "A Nevada man pleaded guilty Thursday to his plotting to steal domain names from their legitimate owners by impersonating a California intellectual property lawyer and send threatening letters to domain name owners in hopes of convincing them to turn over the domains to him..." more
I remember being told three years ago that, in general, internet backbone issues weren't really a subject for regulatory involvement, and didn't need to be. Although the last mile was a problem, the upstream fat-pipe relationships weren't - they were all competitive and thriving. Or at least that's what people thought. Over the last couple of days I've been looking around trying to figure out what the facts are about backbones and peering. It seems that we don't even know what we don't know... more
I loved John Todd's ETel presentation (podcast) on FreeNum, a scheme for bringing phone numbers to the Internet. Of course, I love identifiers and addresses and all that they enable, so it was a natural. Suppose you were a university campus and when you looked at your phone bill, you noticed that a lot of calls were to other universities. You've got a VoIP telephone system; they've all got VoIP telephone systems. You might wonder "isn't there some way to route these calls over the Internet and save some serious money?" The answer, of course is "yes" but making it usable is a little harder... more
We the people like to own stuff and not pay rent to use it (BTW, rent includes taxes but that's another story). They the oligarchs like to own the stuff and charge us rent to use it. The rise of a middle class has historically meant the rise of a property-owning class. The underclass pays exorbitant rents. The telecommunications world -- or at least the US part of it -- is a battle of rent vs. buy. Economics says that ownership or rentership is all based on access to capital. Certainly capital is a huge part of the equation -- can you spell "home loan"?; but it's not the whole story... more
Last week I wrote a note the ICANN WHOIS privacy battle, and why nothing's likely to change any time soon. Like many of my articles, it is mirrored at CircleID, where some of the commenters missed the point. One person noted that info about car registrations, to which I roughly likened WHOIS, are usually available only to law enforcement, and that corporations can often be registered in the name of a proxy, so why can't WHOIS do the same thing? more
The Seventh Circuit has issued its opinion in the continuing saga of E360 Insight vs. the Spamhaus Project. While it is not a complete victory for Spamhaus, they did about as well as anyone could have hoped for under the circumstances. E360 won on the procedural issue, while Spamhaus won on the substance. The procedural issue was whether the default judgement against Spamhaus was properly granted last September. The court session was so odd that the appeals decision quotes several pages of the transcript. more
Every once in a while I look in on the white spaces, to see how things are going. You'll recall that the white spaces are unused, non-contiguous ("swiss cheese" ) frequencies between broadcast stations around the county. Commr. McDowell of the FCC has said that initial rules for the white spaces will be released sometime this fall. If the white spaces are made available on an unlicensed basis for use by opportunistic, "smart," low-power mobile devices, entrepreneurial engineers will think of ways to use this wealth of spectrum (300 MHz wide, if fractured) to provide mobile connections to whatever fiber installations are nearest. more
EURid, the entity charged with managing the .eu namespace, is reported to have taken action against an alleged cybersquatter based in China, Zheng Qingying... The last suspension "en masse" was directed against Ovidio when over 74 thousand domains were suspended. This time round the number is much lower -- a paltry ten thousand! In this instance there seems to have been a pattern of cybersquatting, with over a dozen ADR proceedings against the registrant in question. more
As faithful CircleID readers will know, iREIT (Internet REIT, Inc.), a Texas domain name portfolio investment corporation, has been sued by Verizon and by Vulcan Golf for cybersquatting. It appears iREIT is taking steps to clean up its portfolio by deleting obvious typos of famous trademarks... more
Sponsored byWhoisXML API
Sponsored byRadix
Sponsored byCSC
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byDNIB.com