Mike Hammer's thoughtful article, A Few Thoughts on the Future of Email Authentication, should trigger thoughtfulness in the rest of us. Email abuse has been around a long time. Anti-abuse efforts have too. Yet global abuse traffic has grown into the 90+% range, with no hint of trending downward. The best we hear about current effectiveness is for last-hop filtering, if you have the money, staff and skills to apply to the problem... more
Several years ago, vulnerability disclosure programs, also called "bug bounty" programs, were novel and eyed with suspicion. Given sensitivities and potential liabilities, companies are wary of public disclosure and hackers seeking to exploit research. When a hacker presented a flaw to a company, the company was more likely to be concerned about taking legal action than making a public announcement or offering a reward. That is changing. more
Solutions to cybersquatting and phishing must target brand customers instead of the trademark infringers, who are in effect liars. This post outlines why online-based traditional solutions fail, and it offers solutions to two types of lying (cybersquatting and phishing). more
Most international Medias picked the story wrong. And I see it being repeated. It is true that there is some legislative initiative regarding the regulation of VoIP calls and mainly the telecommunication sector in Ethiopia. But the initiative is just a draft, noting more. Besides there is no such a thing as 15 years punishment in the draft law for using Skype. Here are the provisions in the draft law that are stretched in many news headlines to bemoan that the use of Skype in Ethiopia entails 15 years punishment. more
2013 was one of the most exciting and forward-looking year for our Industry, and here we are, right at the beginning of 2014. Shall we look into the crystal ball and see what the horizon up ahead likely holds for us? We hope and foresee that a lot of everyone's hard work will eventually begin to pay off this year. We also believe that the industry will witness a huge change; opportunities and possibilities that were never before thought of. more
The IRP Panel that was tasked with deciding the Booking.com vs. ICANN IRP that was filed regarding the application for the .hotels new gTLD name has made a decision that seems favorable to ICANN as the Defendant. However, this is not a victory for ICANN but an indictment of the ICANN procedures and accountability systems which are widely viewed as detrimental to new gTLD applicants. more
There is probably no worldwide community without at least one member located in the US. But does this qualify the closing of a community to only US based members and, by extension, to exclude all other eligible entities from around the world solely because of arbitrary geographical circumstances based upon company whims? more
There are 4 applications related to the wine business in the new gTLD program. Yesterday the new gTLD prioritization draw took place where each application was assigned a randomly-drawn priority number. These priority numbers are used to determine the order in which initial evaluation results are released. In the 1917 applications, 4 applications are related to wine. more
This morning I learned about MicroIDs from Doc Searls. Jeremy Miller has proposed MicroIDs as a microformat that "allows anyone to simply claim verifiable ownership over their own pages and content hosted anywhere." A MicroID is a hash of two hashed values. The first is a verified communication ID. The second is the URI of the site that the content will be published on. You end up with a unique, long string of gibberish that can be put in the header of a Web page or even wrapped around one part of a page... more
Teledesic was the first company to plan to offer broadband connectivity using a constellation of low-earth-orbit (LEO) satellites. Craig McCaw, who had sold McCaw Cellular to AT&T, founded Teledesic in 1990 and it got a big visibility and credibility boost when Bill Gates made a small ($5 million) investment in the company. McCaw and Gates were able to attract capital - $200 million from a Saudi Prince, $750 million from Motorola, and $100 million from Boeing, which signed on as the prime contractor. more
This post outlines the advantages (good) and threats (bad) that can make or break a gTLD, and the eternal fact that some applications will doom themselves to failure (ugly). The Good... Waiting until the second round to apply for a gTLD may end up being a virtue for the following reasons... more
After a widespread blackout hit the United States and Canada, the so-called network domino effect attracted high public attention. Modern physicists have paid attention to the effect of network dominos. Especially, scientists who have studied complex systems have warned that a network domino effect, if it occurs, will bring chaos to a society that is well connected through the Internet. The cause of the blackout in the United States and Canada was not traced down quickly. But it apparently shows a typical network domino effect. more
When April Fools' Day rolls around each year, Google is generally one of the front runners for jokes -- often making headlines for its quirky gimmicks. This year was no exception. On April 1st, Google launched its first domain name under the recently delegated .google Top-Level Domain (TLD), a massive milestone for all .brand TLD owners. Google is encouraging millions of people around the world to visit: www.com.google. more
I have come to acceptance that the community proposal for Expressions of Interest in new gTLDs (EoI) was removed from consideration during ICANN's March 12th Board Meeting in Nairobi. It should have passed, but it got lobbied into oblivion by some in attendance at the Nairobi meeting. They deserve their say, those who oppose it, but quite frequently the arguments used fail logic once one reflects upon them, or contrast them against the facts. more
There was a meeting in Geneva a few weeks ago dealing with Internet names and addresses. Known as the Second Informal Expert Group Meeting of the Fifth World Telecommunication / Information and Communication Technologies Policy Forum, it was yet another of the endless blathering bodies on this subject that have met for the past fourteen years. more
Sponsored byRadix
Sponsored byCSC
Sponsored byWhoisXML API
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byVerisign
Sponsored byDNIB.com