In order to be able to reply to the question of whether a new set of governance mechanisms are necessary to regulate the new Global Top Level Domains (gTLDs), one should first consider how efficiently the current Uniform Domain-Name Dispute-Resolution Policy (UDRP) from the Internet Corporation for Assigned Names and Numbers (ICANN) has performed and then move to the evaluation of the Implementations Recommendations Team (ITR) recommendations. more
Late last year a colleague quipped: you spent one third of your time on IPv6 this year, yet it still only generates 1% or so of the traffic. What are the chances of him uttering the same sentence coming December with IPv6 traffic still hovering barely over the one percent mark? more
Around 350 attendees came from Russia in the east to Ireland in the west, as well as a few people from elsewhere around the globe, to attend Domain Pulse 2008 in Vienna on February 21 and 22. Day one's focus was internet governance. The future of the DNS was one of the key issues addressed by Michael Nelson of Georgetown University in Washington DC, with domain names becoming less important, but their numbers still increasing, as online access by a myriad of devices skyrockets connect -- everything from the television, refrigerator, washing machine, pets, sprinkler systems and cars. more
The SWOT analysis (alternatively SWOT Matrix) is a structured planning method used to evaluate the Strengths, Weaknesses, Opportunities, and Threats involved in a project or in a business venture. The following is an attempt to apply the SWOT Analysis to ICANN's new gTLD program. more
As we go into 2012, I am encouraged that there are many, including top officials and leaders in Washington DC, who believe in ICANN's leadership of the multi-stakeholder model, and that the organization should be allowed to successfully midwife the new gTLD program. The Honorable Senator John 'Jay' Rockefeller for example was reported in the ICANN Blog as giving his full support: "I think we have to get used to dot-hotels. I think we have to get used to dot-auto." more
Stepping back from the DMARC arguments, it occurs to me that there is a predictable cycle with every new e-mail security technology... Someone invents a new way to make e-mail more secure, call it SPF or DKIM or DMARC or (this month's mini-fiasco) PGP in DANE. Each scheme has a model of the way that mail works. For some subset of e-mail, the model works great, for other mail it works less great. more
The debate surrounding "closed generics", which has been covered several times in the past, has attracted a lot of attention in recent weeks. At the centre of the debate were a number of new TLD applications from large companies including Google, Amazon and others. Google had stated that they planned to establish a number of domain extensions and operate them as "walled gardens". At the ICANN public meeting in Toronto Google attempted to defend their plans and their position until today was unchanged. more
At last week's Chinese Internet Research Conference, much discussion of the "myths and realities" of the Chinese Internet revolved around images, metaphors, and paradigms. In his award-winning paper titled The Great Firewall as Iron Curtain 2.0, UPenn PhD Student Lokman Tsui argued that "our use of the Great Firewall metaphor leads to blind spots that obscure and limit our understanding of internet censorship in the People's Republic." more
Wikileaks is still accessible -- via Google. Does that change anything? For many Internet users IP addresses as well as domain names are completely transparent. Further, Google (and other search engines) and often the first stop when these users wants to find a service, or a web site. Thus, many of us discussed over the years the eventual viability of Google (... and other search engines) as "DNS" (note the "'s). Now, don't jump at my throat quite yet... more
A number of comments to ICANN's proposed Post Delegation Dispute Resolution Process for new gTLD Registry Operators support a proposal by the World Intellectual Property Organization (WIPO) to hold a registry operator accountable for trademark infringement that occurs within a TLD if it "knowingly permitted, or could not have reasonably been unaware of" infringing domain names within the TLD. more
A cybersecurity bill introduced in the U.S. Senate on April 1st, 2009 would give the United States federal government extraordinary power over private sector Internet services, applications and software. This proposed legislation is a direct result of a review ordered by the Obama administration into government policies and processes for defending against Internet-born attack. The focus of the bill, according to a summary released by the sponsoring senators, is on establishing a new partnership between the public and private sectors in a joint effort to bolster Internet security... more
Where does this idea that the employees of all non-profit organizations alike shall lead a public-transportation lifestyle come from? ICANN's monetary resources do not come from war widows and pensioners, for ICANN to feel guilty about every penny that it spends on administration. Nor does its resources, wherever they come from, are any that are earmarked to be spent on famine relief or on basic health care for the most unfortunate. more
Time Warner Cable's planned experiment with tiered charging for Internet access has generated a flurry of coverage in the blogsphere, but no new insights (at least that I've seen). The primary problem ISP's complain about is that 5% of their customers use 90% of the available bandwidth and when they examine this traffic, it's mostly peer-to-peer file sharing... more
In the U.S., it is a federal crime to use malware to intentionally cause "damage without authorization" to a computer that is used in a manner that affects interstate or foreign commerce. Most, if not all, U.S. states outlaw the use of malware to cause damage, as do many countries. The Council of Europe's Convention on Cybercrime, which the United States ratified a few years ago, has a provision concerning the possession of malware. Article 6(1)(b) of the Convention requires parties to the treaty to criminalize the possession of malware "with intent that it be used for the purpose of committing" a crime involving damage to a computer or data... more
In a previous post, I suggested that Cuba might be able to leap over 4G to 5G wireless infrastructure using satellite and terrestrial networks for backhaul. While that would require political and policy change, it would be a good fit with Cuban culture and skills. Before talking about Cuba, let me say a bit about wireless generations. Each mobile technology generation used new technology and enabled new applications. more
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byRadix
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byCSC