Last weekend C-Span, the public service network that broadcasts proceedings of the U.S. Congress and other U.S. government functions, aired a segment of its series "the Communicators" featuring ICANN CEO Fadi Chehade; C-Span describes the show as "Half-hour conversations with the leaders who shape our digital future". While the interview is actually just 28 minutes long, and appears to have been recorded on January 28th, it contains some surprising statements that raise some intriguing questions. more
Responding to the .xxx intervention by the US Commerce Department, the Internet Governance Project has produced a "STATEMENT OPPOSING POLITICAL INTERVENTION IN THE INTERNET'S CORE TECHNICAL ADMINISTRATIVE FUNCTIONS." You can view the statement here and add your name as a signatory at the bottom. Over 60 people have endorsed it. The Statement claims that "The NTIA's recent intervention in the .xxx proceeding undermines assurances" that the U.S. government's special unilateral authority over ICANN "would never be used to shape policy but was only a means of protecting the stability of the organization and its processes." The NTIA's open acknowledgment of the influence of religious groups made the intervention particularly dangerous. more
The European Union's cloud computing strategy couldn't come at a better time as the region lags behind the rest of the world when it comes to cloud computing usage. The EU announced its cloud computing strategy last month and is optimistic it will create new jobs and help boost a struggling economy. An information campaign is necessary if the EU is to overturn the misunderstanding and general lack of knowledge about the cloud. more
In most industries, businesses that blatantly act against the interests of their customers to favor their own internal profit centers would either not be allowed or else subject to controls and oversight by the government. It is universally regarded as an unfair and deceptive business practice. In the domain name registrar business, however, the normal practices of legitimate business dealings and customer protection seem woefully wanting. Kelly's Case described here illustrates the point... more
In Ripley Scott's classic 1982 science fiction film Blade Runner, replicant Roy Batty (portrayed by Rutger Hauer) delivers this soliloquy... "I've...seen things you people wouldn't believe... Attack ships on fire off the shoulder of Orion. I watched C-beams glitter in the dark near the Tannhäuser Gate. All those... moments... will be lost in time, like (cough) tears... in... rain. Time... to die." more
From will they ever learn department, we are once again seeing attempts by incumbent carriers to skirt rules around network neutrality. They tried and failed with UBB. Now they are at it again with "speed boost" technologies. The two technologies at question are Verizon's "Turbo" service and Roger's "SpeedBoost". more
In the transition from IPv4 to IPv6, the preferred solution for network endpoints is to have both native IPv4 and IPv6 connectivity (also called dual-stack connectivity). If a site cannot get native IPv6 connectivity, however, the IPv4 network endpoints can choose from a number of conversion technologies to connect to the IPv6 Internet. The most commonly used conversion mechanisms are 6to4, Teredo and tunnel-brokers. At recent RIPE meetings there have been claims that 6to4 connectivity is quite often broken. We were interested to find out how broken it really is. more
For administrative convenience and not as required by law, the FCC likes to apply an either/or single regulatory classification to convergent operators. Having classified ISPs as information service providers, the Commission unsuccessfully sought to sanction Comcast's meddling with subscribers' peer-to-peer traffic. Now Chairman Genachowski wants to further narrow and nuance regulatory oversight without changing the organic information service classification. more
January 2014. The first registry contracts have been signed. The first Sunrise priority registration periods have been opened. The new gTLD program is well on the way. So maybe now, at last, we can start to find out the real costs of opening up the Internet root? And how much revenue doing so has brought ICANN! Short answer: ICANN has taken in USD 344.958 million from the first round of new gTLD applications. The figure comes from the first of ICANN's quarterly financial statements, covering the three months up until September 30th. more
Choosing the right domain name is like choosing a Trademark, it has to be taken seriously because it is a long time image investment. If new gTLDs have brought new options to those in charge of creating a name (precision, availability, novelty) and registering its (their) domain name(s), they also brought the possibility to make a terrible mistake when choosing the right extension for a domain name. more
DMARC is what one might call an emerging e-mail security scheme. It's emerging pretty fast, since many of the largest mail systems in the world have already implemented it, including Gmail, Hotmail/MSN/Outlook, Comcast, and Yahoo. DMARC lets a domain owner make assertions about mail that has their domain in the address on the 'From:' line. It lets the owner assert that mail will have a DKIM signature with the same domain, or an envelope return (bounce) address in the same domain that will pass SPF validation. more
With much awaited fanfare, .EU is inching ever closer to becoming real! I am a bit reluctant to say it is actually here until the gates are actually open, but I can imagine that there are many who are grateful as I am that the process has gotten as far as it has. On March 23rd, 2005, ICANN announced that they had approved an agreement earlier that week with EURid to have .eu added to the root zone... more
The recent ICANN meeting in Vancouver touched upon many issues important to ordinary Internet users: privacy in domain name registration; the cost and terms of .com domain names; internationalized domains; introduction of new domain suffixes. But there were few "ordinary Internet users" at the meeting. Few people can roam the globe to keep up with ICANN's travels, and not many more participate in online forums. more
Bitcoin's unreal hype has obscured that it is mostly used to facilitate drug deals, ransomware, tax evasion, and even the occasional murder for hire. After the 60% price drop, demand for bitcoin mining gear has fallen so much TSMC has to lower sales estimates for 2018... Now, Austrian Ambassador in Tehran Stefan Scholz has suggested it could be a powerful boost to the European intent to bypass the U.S. economic blockade. That could provide demand for $billions of bitcoins. more
Because domain names represent the online identity of individuals, businesses and other organizations, companies and organizations large and small have expressed increasing concern over reports of "domain name hijacking," in which perpetrators fraudulently transfer domain names by password theft or social engineering. The impact of these attacks can be significant, as hijackers are typically able to gain complete control of a victim's domain name - often for a significant period of time. more
Sponsored byVerisign
Sponsored byWhoisXML API
Sponsored byRadix
Sponsored byCSC
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byIPv4.Global