You may recall a number of years ago when Google experimented with delivering broadband from balloons in an effort labeled Project Loon. The project was eventually dropped, but a remnant of the project has now resurfaced as Taara - broadband delivered terrestrially by lasers. more
A fledgling attempt to create a new global Internet governance clearinghouse has run into trouble as leading business and civil organizations said they are not yet prepared to participate in the NETmundial Initiative (NMI) championed by ICANN President Fadi Chehade. In highlighting that there remain several unanswered questions, the Internet Society (ISOC), Internet Architecture Board (IAB), and International Chamber of Commerce (ICC-BASIS) raised serious concerns... more
The new "dot-anything" domain extensions or "gTLDs" have been a major point of debate in the domain community for years now -- ever since they were just a glimmer in ICANN's eye -- and it's all come down to a few very important dates over the next six to nine months. more
In the last few weeks we've seen two very different approaches to the full disclosure of security flaws in large-scale computer systems. Problems in the domain name system have been kept quiet long enough for vendors to find and fix their software, while details of how to hack Transport for London's Oyster card will soon be available to anyone with a laptop computer and a desire to break the law. These two cases highlight a major problem facing the computing industry, one that goes back many years and is still far from being unresolved. Given that there are inevitably bugs, flaws and unexpected interactions in complex systems, how much information about them should be made public by researchers when the details could be helpful to criminals or malicious hackers? more
Confusion is a basic element in both cybersquatting and trademark infringement. It appears twice in the UDRP; once in paragraph 4(a)(i) in the adjectival phrase "confusing similarity", and once in paragraph 4(b)(iv) in the phrase "likelihood of confusion." Each use of the distinctive phrases is directed to a different observer. More of this in a moment. The first relates to standing; the second to infringement. Unless a party has standing it can have no actionable claim. more
One of the key elements in any domain space is usage. It doesn't matter how potentially "cool" or "interesting" a Top-Level Domain (TLD) is if nobody is actually using it to provide content. It may be overused and totally abused, but "content is king"! The guys in dotMobi posted yesterday about some of the more interesting domains that they had come across recently. What did that lead to? Well I actually got out my phone and browsed the sites to see what all the fuss was about and I was truly impressed. more
A Swiss Del Monte entity that had a license to use the "DEL MONTE" mark applies to operate the .delmonte generic top level domain (gTLD). Another Del Monte entity, based in Delaware, filed a "legal rights objection" (LRO) - under WIPO-established procedures - to the Swiss Del Monte's application. A three member panel sustained the Delaware company's LRO... The Swiss entity sued in federal court seeking a declaration that it had sufficient rights in the "DEL MONTE" mark to operate the TLD... more
On the World Standards Day of 2013 it seems appropriate to recognize that on the Internet and throughout the Web, nothing goes anywhere without standards. These technical standards - communication protocols, data exchange formats, and interfaces - allow different computers and networks to talk to each other. They are the lifeblood around the world for multibillion dollar industries that didn't exist 20 years ago. They are born of a collaborative, open process that prides itself on technical expertise and measures success by the depth and breadth of their acceptance across a hodgepodge of vastly different technologies all interconnected to what we euphemistically call "the Global Internet." more
On July 2, 2002, Damien Cave published an interview on Salon.com with John Gilmore, "original 'cypherpunk' and all-around Internet supergeek," titled "It's time for ICANN to go." In this wide-ranging interview, Gilmore -- an early employee of Sun Microsystems who also co-founded Cygnus Software (acquired by Red Hat) and was an early supporter of the Electronic Frontier Foundation and the Internet Society (ISOC) -- offered blunt insight and eye-opening historical detail... more
The Telecom World converged in greater numbers than ever before on Barcelona last week for the annual Mobile World Congress (MWC). This years' motto: Redefining Mobile. To see one of the worlds' leading automotive industry executives, Ford Motor's Bill Ford Jr. delivering a keynote was yet another illustration of the growing osmosis between Telecommunications and other industry verticals. more
How to properly balance the commercial rights of a complainant with the free speech rights of a respondent has challenged a generation of Uniform Domain Name Dispute Resolution Policy (UDRP) panelists. Panelists have adopted a variety of approaches and consensus has been elusive. Paragraph 4(c)(iii) of the Policy provides that a respondent may have a right or legitimate interest in a disputed domain name... more
Think for a moment of the enduring legacy of African slavery in America. Think of the way it tainted this country's culture and politics; think of the bloody Civil War, the ghettos... What if we could roll back the clock and ensure that our society was "designed" so that slavery was never permitted and never happened? ... But what if I told you that my computer science lab was working on a "new Internet" that would solve all the terrible security and privacy problems of the existing one? Would you find this claim more credible than a proposed retroactive solution to the problem of slavery? more
When Kurt Pritz briefed the Generic Names Supporting Organization (GNSO) Council (and observers) in Los Angeles April 10th and 11th, the new generic Top-Level Domain (gTLD) process model flows transition through an "auction" state in two of the three paths where two or more applications existed for the same (or similar) strings. At that time Kurt, speaking for Staff, was clear that the existence of a well-defined community was not dispositive, which surprised the Council members from the Intellectual Property Constituency... more
It's unclear what this means in the long run. Do bad actions and actors go undetected? Do we lose our visibility into network management? What is a "secure" network, and how do we secure it using traditional techniques of network perimeter traffic inspection when all the network traffic is opaque? If we can't see inside the DNS anymore, then how can we tell if (or when) the DNS has been captured by one or two digital behemoths? more
The following is a selected summary of the recent NANOG 63 meeting, held in early February, with some personal views and opinions thrown in! ...One view of the IETF's positioning is that as a technology standardisation venue, the immediate circle of engagement in IETF activities is the producers of equipment and applications, and the common objective is interoperability. more
Sponsored byDNIB.com
Sponsored byCSC
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byWhoisXML API
Sponsored byRadix
Sponsored byVerisign