Bandwidth is the basic foundation for Internet traffic as a connector to everything important in our lives. Whether it is basic bandwidth for connecting to family and friends, or a super fast highway for global reach and competitiveness in the business world, bandwidth constitutes the speed at which we connect as a global presence within the expanding sphere of Internet communication. ... To understand why bandwidth is important to all Americans, including personal and business uses, we must understand the different types Internet traffic. more
Recently, I had time to reflect on various matters after the alternator in my vehicle decided that the middle of a mountain pass was the appropriate time and place to go to that great big pick-and-pull scrapyard in the sky while leaving me stranded with no cell signal on the side of the road in the middle of nowhere. Until that point, I had been seriously considering applying to ICANN's Nominating Committee for one of the three open seats on ICANN's Board of Directors. more
I've been looking into IP address filtering by content providers. I understand that IP addresses can be attached with confidence to geographical locations (at the country level, at least) about 80% of the time. You have to make up the rest with heuristics. So there are companies that are in the business of packaging those geolocation heuristics for sites. ...How widely are these services used? ...does it now make sense to put content sites to the burden of complying with the laws applicable to the people/machines they know are visiting them? more
The phenomenal growth of the Internet has resulted in a proliferation of domain names. The explosion of '.com' registrations coincided with an increase in domain name disputes, and with it the legal branch of intellectual property devolved into virtual mayhem. ICANN's Uniform Domain-Name Dispute-Resolution Policy (UDRP) was created... The UDRP was brought into force in October 1999, and it can be said that it has contributed handily to the resolution of domain name disputes. However, deeper investigation into the UDRP paints a different picture. more
The UK government is proposing new regulations to strengthen cyber resilience in the private sector. Their intention is to expand cybersecurity rules for critical infrastructure (CI) operators to include managed service providers (MSPs), more stringent breach notification requirements, and legislation to establish the UK Cyber Security Council as the standards development organization for the cybersecurity profession. This is a welcomed development, but more details about implementation and enforcement are needed. more
The new Clearwire could be game-changing, but the rules of the game may not be quite as Clearwire presents them. I have been wondering since last July whether something significant would happen in the Google/Sprint world. The deal announcement earlier this weekseems to be that key development... In a nutshell, Sprint will contribute its substantial spectrum licenses in the 2.5 GHz range and its WiMAX-related assets and intellectual property. Google, Intel, Comcast, Time Warner Cable, and Bright House Networks will invest a total of $3.2 billion. more
Let's take a second to look back some 50 years to the world of 1972 and the technology and telecommunications environment at that time. The world of 1972 was one populated by a relatively small collection of massive (and eye-wateringly expensive) mainframe computers that were tended by a set of computer operators working around the clock and directed by specialized programmers, trained in the obscure symbol set used by the job control systems on these computers. more
Michael Froomkin, a Professor of Law at the University of Miami School of Law and one of the founding members of ICANNWatch has recently written an article for the Harvard Law Review called, "[email protected]: Toward a Critical Theory of Cyberspace". One of the areas covered in this article is a comparison made between the ICANN model and that of the Internet Engineering Task Force (IETF).
Michael Froomkin has underlined several lessons that can be learned from this contrast, including a suggestion "that claiming kinship with the IETF model is a way of claiming legitimacy, but that not every one who makes this claim is entitled to do so".
What follows is a two-part interview with Michael Froomkin and a closer look at his recent article in the Harvard Law Review. more
The recent announcement at the ICANN 50 London, by all stakeholder groups and constituencies comprising of ICANN's Generic Names Supporting Organization (GNSO) to endorse a joint statement in support of the creation of an independent accountability mechanism "that provides meaningful review and adequate redress for those harmed by ICANN action or inaction in contravention of an agreed upon compact with the community" is a very welcome development to the Multistakeholder framework. more
I'm not even sure how to begin this post, but let me tell you -- my head explodes when I try to contact WHOIS "contacts" about criminal activity - FAIL. I think ICANN wants to do the right thing here, and has stated on multiple occasions that inaccurate WHOIS data is reason for registrar termination. That's a Good Thing... more
In January Jörg Schweiger, DENIC's CTO from 2007 to 2014 and CEO since 2014, announced he was stepping down from his position in December. It's been quite a ride, and the domain name industry has evolved quite a lot. So we asked Jörg a few questions about his time with DENIC and the changes he's seen... he came up with some insightful views on why he thought new TLDs missed a great opportunity to do something with "innovative new business models," the importance of security to DENIC... more
The DNS is normally a relatively open protocol that smears its data (which is your data and mine too!) far and wide. Little wonder that the DNS is used in many ways, not just as a mundane name resolution protocol, but as a data channel for surveillance and as a common means of implementing various forms of content access control. But all this is poised to change. more
On November 2, 2009, Microsoft released its seventh edition of the Security and Intelligence Report (SIR). The SIR provides an in-depth perspective on the changing threat landscape including software vulnerability disclosures and exploits, malicious software (malware), and potentially unwanted software. Using data derived from hundreds of millions of Windows computers, and some of the busiest online services on the Internet, this report also provides a detailed analysis of the threat landscape and the changing face of threats and countermeasures and includes updated data on privacy and breach notifications. The following is an excerpt from the SIR, pp 29-32, about the Conficker worm and the industry response that showed an incredible amount of collaboration across vendors. more
Internet Archive contains a vast library of screenshots of websites that its Wayback Machine captures sporadically over the course of domain names' histories. While it doesn't compile daily images it opens a sufficient window to past use which is unique, invaluable, and free. (There are also subscription services, but they come at a hefty cost!). How it's used (and why the Wayback Machine should be in a party's toolkit) for supporting and opposing claims of cybersquatting is illuminated in a number of recent UDRP cases. more
Attention so far has been focusing on the ethics of the move (positively satanic), its effects on DNS and non-Web applications (Considered Harmful), and on possible technical responses (Software Aimed at Blocking VeriSign's Search Program). On the legal side of the fence, though, we're not just talking about a can of worms. We're talking about an oil drum of Arcturan Flesh-Eating Tapeworms. more
Sponsored byDNIB.com
Sponsored byIPv4.Global
Sponsored byRadix
Sponsored byCSC
Sponsored byVerisign
Sponsored byWhoisXML API
Sponsored byVerisign