What if there was a relatively simple fix that could be applied to home WiFi routers, cable modems and other gateway devices that would dramatically speed up the Internet access through those devices? Many of us may have heard of the "bufferbloat" issue where buffering of packets causes latency and slower Internet connectivity, but at IETF 86 last month in Orlando I got a chance to see the problem with an excellent demonstration by Dave Täht as part of the "Bits-And-Bytes" session. more
News reports say that the Israeli government is close to passing a law that requires portable e-mail addresses, similar to portable phone numbers. Number portability has been a success, making it much easier to switch from one provider to another, and address portability might ease switching among ISPs. But e-mail is not phone calls. Is it even possible? more
ICANN's GNSO council had WHOIS on its agenda for today. The options on the table: (1) Accepting the outcome of years of policy development processes; (2) rejecting that outcome (again?), but calling for some kind of fact-gathering to feed into future policy work, in order to keep the space occupied; (3) acknowledging that there is broad dissent in the Internet community, and calling for a sunset on the WHOIS clauses in current agreements, as these clauses are not backed by community consensus any more. Not very surprisingly, motions (1) and (3) failed; (2) was accepted; all that after lengthy discussion, with lots of procedural bells and whistles. more
In response to ICANN's request for proposal (RFP) for the selection of new sponsored Top-Level Domains, Wendy Seltzer for the At-Large Advisory Committee (ALAC) urges ICANN to move quickly beyond "testing" to more open addition of a full range of new gTLDs in the near future and offers some general principles to guide that expansion. more
A 'decade from hell', according to Times Magazine, a 'dazing decade' says Newsweek. In Copenhagen, at the Climate Change Conference, the World Meteorological Organization talked of the 'hottest decade on record'. BusinessWeek characterized the decade as one of 'innovation interrupted'. All this gloom made me wonder how to qualify our IPv6 decade? more
This is the first in a series of releases that tie extensive code injection campaigns directly to policy failures within the Internet architecture. In this report we detail a PHP injection found on dozens of university and non-profit websites which redirected visitor's browsers to illicit pharmacies controlled by the VIPMEDS/Rx-Partners affiliate network. This is not a unique problem, however the pharmacy shop sites in question: HEALTHCUBE[DOT]US and GETPILLS[DOT]US should not even exist under the .US Nexus Policy. more
The April NETmundial meeting was a seminal event in the history of Internet Governance. Fears that the meeting might fail to reach consensus were not realized. Instead, the participants achieved a high degree of harmony -- the "Spirit of NETmundial" -- that resulted in issuance of a consensus Statement that, while lacking in precise detail, was effused with positive energy. Since that meeting there has been considerable discussion within the Internet Governance (IG) community as to what lessons have been learned from NETmundial, and how its work might best be carried into the future. more
A couple of recent articles have caught my attention because they offer scathing criticism of ICANN. The first is a long and convoluted article by Kieren McCarthy on the .JOBS debacle. Kieren has basically written a feature that only a seasoned ICANN insider can hope to understand and that's a pity, because the points he makes appear very valid. Namely that ICANN is incapable of looking at itself in the mirror and admitting when it's wrong. more
"ICANN remains the frontier institution and the test case for global governance in the IT sector," writes Zoe Baird in an article in the November-December 2002 issue of "Foreign Affairs". Baird is the President of the Markle Foundation. Her article "Governing the Internet: Engaging Government, Business and Nonprofits" appears in "Foreign Affairs", a magazine usually devoted to the discussion of American foreign policy interests.
The opening line of the article is striking. "The rapid growth of the Internet," Baird writes, "has led to a worldwide crisis of governance." On the surface, a serious problem has been identified. There is the promise of a fruitful discussion to follow. more
The claim that the *only* way that reliable wait listing can be done by *the* registry is not true. The registrars could, as a technical matter, if they chose to do so, "wrap" the registry with a new entity that mediates all acquisitions and releases. Whether this accords with ICANN's hyper intricate contractual scheme or with laws against restraint of trade, I don't know.
Personally I consider WLS to be contrary to the idea that a contract contains an implied covenant of good faith and fair dealing - it seems to me that WLS violates that implied covenant - It is as if my doctor is selling contracts on parts of my body should I die while under his care. more
As the industry-wide paradigm shift to cloud computing and software-as-a-service gradually continues to make the transition from buzz to reality, security and availability continue to emerge as the main barriers to customer adoption. A recent ISACA survey of over 1,800 US IT professionals found that only 17 percent believe the benefits of cloud computing outweigh the risks. Only one in 10 respondents said they would consider using software-as-a-service (SaaS) for mission-critical applications. more
A recent piece in The Markup called Swinging the Vote? attempts to figure out how Google decides where to deliver political e-mail. They were startled to discover that only a small fraction of it was delivered into the main inbox, and a fair amount was classed as spam. They shouldn't have been. This is an example of the fallacy We're so nice that the rules don't apply to us, which is far too common among non-profit and political mailers. more
Over three-quarters of the more than 55,000 UDRP cases decided since 1999 have been undefended. Requiring adequate evidentiary support of the complainant's allegations in disputes where the respondent has not filed a response, is therefore critical for producing just outcomes under the UDRP. While most UDRP disputes involve clear cybersquats that are indefensible, a significant number involve domain names that are not clearly cybersquats... more
Digital Transformation (DX) is picking up speed. According to a recent announcement by IDC, the market is expected to grow at a Compounded Annual Growth Rate (CAGR) of 17.9% to reach a whopping 321 billion dollars by 2021. In 2018 alone, IDC expects that 326 billion will be spent on transforming how people and things communicate. Based on these numbers, it looks like Digital Transformation has become the real deal. more
WannaCry, originated firstly in state projects but spread by other actors, has touched upon myriads of infrastructure such as hospitals, telecommunication, railroads that many countries have labelled as critical. IT engineers are hastily presenting patching codes in various localized versions. The other patch needed, however, is more than technical. It is normative and legislative. The coding of that patch for a situation like this is in two layers of dilemma. more
Sponsored byDNIB.com
Sponsored byWhoisXML API
Sponsored byRadix
Sponsored byVerisign
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byCSC