Does the "technical issue" announced today in ICANN's TLD Application System (TAS) and the subsequent extension of the submission deadline call into question the stability and integrity of the new gTLD program? This development underscores the notion that ICANN could consider a more metered and staged approach to the introduction of gTLDs... more
Searching decisions under the Uniform Domain Name Dispute Resolution Policy (UDRP) is important - for evaluating the merits of a potential case and also, of course, for citing precedent when drafting documents (such as a complaint and a response) in an actual case. But, searching UDRP decisions is not always an easy task. It's important to know both where to search and how to search. Unfortunately, there is no longer an official, central repository of all UDRP decisions that is freely available online. more
The APNIC Blog has recently published a very interesting article by Willem Toorop of NLnet Labs on the relationship between Security Extensions for the DNS (DNSSEC) and DNS over Transport Layer Security. Willem is probably being deliberately provocative in claiming that "DoT could realistically become a viable replacement for DNSSEC." If provoking a reaction was indeed Willem's intention, then he has succeeded for me, as it has prompted this reaction. more
ARIN deployed a series of enhancements to its Whois-RWS service today. This includes enabling CIDR support and IPv6 lookups in the search box on the web page, provided plain text rendering of lists of ASNs and networks on the web - plus enhanced CIDR query matching on WHOIS port 43. more
The proposal "The Internet an International Public Treasure" ("Public Treasure") offers a means of creating a prototype for an international collaborative management structure for the Internet (see Part I of this article).
more
An unprecedented cyberattack on the Canadian government also targeted Defence Research and Development Canada, making it the third key department compromised by hackers, CBC News has learned. ... While there is no definitive proof, of course, that China was behind these attacks, there is a lot of circumstantial evidence that points in that direction. China (allegedly) has a long history of engaging in espionage activities in order to gain access to information. In the United States, this is sometimes referred to as cyber warfare, but I think that cyber espionage is a better choice of terms. more
Having a single price index for the domain name industry would be worse than useless. Such an index is presented in a recent study by Thies Lindenthal. The index is intended to be a benchmark for domain owners and investors. But it's out of line with other studies and the common sense of how a market operates. A much better barometer to follow is average prices for groups of domain names with similar characteristics. more
Just when you thought making phone calls couldn't get any cheaper, along comes last week's news from Google about their latest iteration of Google Voice. There have been several steps along the way for Google to get to this point, and there are a host of reasons why this news is of interest to service providers of all stripes. I often write about how certain technologies and disruptive forces change the business of being a service provider, and this is but the latest example. more
The first part of this article reviewed the actions taken by ICANN in response to a March 27th letter from the Intellectual Property Constituency (IPC) alleging that the pricing of Trademark Clearinghouse (TMCH) registered terms by the .Sucks registry were "predatory, exploitative and coercive" and requesting that ICANN halt the registry's rollout. This second part explores additional ramifications of ICANN's decision to request two national regulators to review the legality of the registry's operation. more
If you haven't been reading the news of late, venerable anti-spam service Spamhaus has been the target of a sustained, record-setting Distributed Denial-of-Service (DDoS) attack over the past couple of weeks... Of course, bad guys are always mad at Spamhaus, and so they had a pretty robust set-up to begin with, but whoever was behind this attack was able to muster some huge resources, heretofore never seen in intensity, and it had some impact, on the Spamhaus website, and to a limited degree, on the behind-the-scenes services that Spamhaus uses to distribute their data to their customers. more
Several people pointed out that although the suit still hasn't appeared in PACER, copies of the complaint are available online, including this one [PDF] at Lextext. Having read it, I'm rather underwhelmed... I do not purport to be a lawyer (nor do I usually play one on the net), but it's hard to see how the facts, which are not in serious dispute, would support any of these charges. more
All the talk early this year seems to be about LTE deployment to alleviate chronic Apple and other smartphones induced indigestion on the AT&T and other major Mobile Networks swamped by data traffic. The telluric shift albeit the user will not care or should not notice is that when he or she will power on that smartphone or whatever the communicating Swiss Knife will be called, it will request an IP address to complete an IP based call. more
Finland's national broadband strategy (NBS) was set up in 2004 by the Ministry of Transport and Communications with the practical goal of increasing the number of broadband connections. The strategy, part guided by the EU's i2010 'Broadband for all by 2010' plan which focuses on rolling out broadband through a range of measures while promoting competition in and between networks, included an implementation program of 50 separate measures. Broadband access in sparsely populated and rural areas was to be supported by structural funds from the EU and central government. more
The Internet Society (ISOC) has been working with the African Union (AU) to facilitate the African Internet Exchange System (AXIS). This AXIS project funded by the EU-Africa Infrastructure Trust Fund and the Government of Luxembourg will help keep Internet traffic in Africa internal to the continent and avoid expensive international transit costs and delay latency in routing Internet traffic through other continents. more
An acquaintance asked whether there's been any progress in the oft-rumored project to come up with a more secure replacement for SMTP. Answer: No. Truly, spam isn't a technical problem, it's a social one. If we could figure out some way to make mail recipient networks and hosts willing to shun known bad actors, even at the cost of losing some real mail for a while until the bad actors cave, it would make vastly more difference than any possible technical changes. more
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byVerisign
Sponsored byCSC
Sponsored byDNIB.com
Sponsored byIPv4.Global
Sponsored byRadix