The SWOT analysis (alternatively SWOT Matrix) is a structured planning method used to evaluate the Strengths, Weaknesses, Opportunities, and Threats involved in a project or in a business venture. The following is an attempt to apply the SWOT Analysis to ICANN's new gTLD program. more
Around 350 attendees came from Russia in the east to Ireland in the west, as well as a few people from elsewhere around the globe, to attend Domain Pulse 2008 in Vienna on February 21 and 22. Day one's focus was internet governance. The future of the DNS was one of the key issues addressed by Michael Nelson of Georgetown University in Washington DC, with domain names becoming less important, but their numbers still increasing, as online access by a myriad of devices skyrockets connect -- everything from the television, refrigerator, washing machine, pets, sprinkler systems and cars. more
The debate surrounding "closed generics", which has been covered several times in the past, has attracted a lot of attention in recent weeks. At the centre of the debate were a number of new TLD applications from large companies including Google, Amazon and others. Google had stated that they planned to establish a number of domain extensions and operate them as "walled gardens". At the ICANN public meeting in Toronto Google attempted to defend their plans and their position until today was unchanged. more
Last month, I announced our Open Data Hub to the CircleID community, inviting anyone interested in making the digital sector more transparent to join our efforts. Today, I am excited to share summaries of our three-part series describing our vision for a sustainable European cloud. It’s a key part of our Roadmap to Sustainable Digital Infrastructure by 2030, and one that is meant to not merely challenge the dominance of the big, non-European cloud providers, but offer an entirely different paradigm that is open-source, fair, sustainable, and creates economic opportunities for all. more
Most people take it for granted that domain names are property. As such, there shouldn't be much dispute that domain names are subject to the claims of judgment creditors. But I've seen enough resistance to this position that I thought a recent case was worth a quick mention. more
In the U.S., it is a federal crime to use malware to intentionally cause "damage without authorization" to a computer that is used in a manner that affects interstate or foreign commerce. Most, if not all, U.S. states outlaw the use of malware to cause damage, as do many countries. The Council of Europe's Convention on Cybercrime, which the United States ratified a few years ago, has a provision concerning the possession of malware. Article 6(1)(b) of the Convention requires parties to the treaty to criminalize the possession of malware "with intent that it be used for the purpose of committing" a crime involving damage to a computer or data... more
A factual paper prepared in October 2009 for and endorsed by the Chief Executive Officers of ICANN and all the Regional Internet Registries that provides answers to commonly asked questions about IPv6 such as: How are allocations made, and to whom? How are IPv6 addresses actually being allocated? And why did such large IPv4 address allocations go to US organizations, including the US Government, and its Department of Defense? more
Huawei's Cloud is growing faster than Amazon, Microsoft, or Google, Iain Morris writes. He cites U.S. Senator Tom Cotton on growth in "Egypt, Indonesia, Malaysia, Mexico, Saudi Arabia, Turkey, and the United Arab Emirates." Cotton further says: "In addition, Huawei's cloud services revenues reportedly rose by almost 170 percent in 2020. This accelerating revenue stream threatens to undermine U.S. efforts to curtail Huawei's power, influence, and financial strength." I think Cotton is a little high on Huawei Cloud growth... more
Verisign posted preliminary public comments on the "Mitigating the Risk of DNS Namespace Collisions" Phase One Report released by ICANN earlier this month. JAS Global Advisors, authors of the report contracted by ICANN, have done solid work putting together a set of recommendations to address the name collisions problem, which is not an easy one, given the uncertainty for how installed systems actually interact with the global DNS. However, there is still much work to be done. I have outlined the four main observations... more
Time Warner Cable's planned experiment with tiered charging for Internet access has generated a flurry of coverage in the blogsphere, but no new insights (at least that I've seen). The primary problem ISP's complain about is that 5% of their customers use 90% of the available bandwidth and when they examine this traffic, it's mostly peer-to-peer file sharing... more
I recently saw that AT&T is offering a $10,000 reward to anybody who provides information that leads to the arrest and conviction of people stealing copper wiring. The particular announcement is related to a recent theft of copper in South Dallas, Texas, but there have been numerous other thefts. This is not a small problem, and the estimated value of stolen telephone copper is between $1.5 and $2 billion annually. more
Although I don't have a lot of sympathy for the trademark lawyers' argument that trademark holders need to register .sucks domains cheaply before anyone else can, there is one point at the end of their letter that's worth a look. The registry contract for .sucks, between Vox Populi and ICANN, has this sentence that appears (as far as I know) in no other registry contract, in the section on Registry-Level fees. more
At last week's Chinese Internet Research Conference, much discussion of the "myths and realities" of the Chinese Internet revolved around images, metaphors, and paradigms. In his award-winning paper titled The Great Firewall as Iron Curtain 2.0, UPenn PhD Student Lokman Tsui argued that "our use of the Great Firewall metaphor leads to blind spots that obscure and limit our understanding of internet censorship in the People's Republic." more
Starting Dot ("SD") is a French new gTLD applicant which applied for five strings: .ARCHI, .BIO, .DESIGN, (which has been withdrawn) .IMMO and .SKI. It is the only French applicant to have applied for several open new gTLDs. Some French brands have applied too but as closed Top-Level Domains... While Starting Dot may be one of the smaller portfolio applicants, there is a considerable difference here in the way their projects are handled when compared to some of the larger applicants. more
Traceroute is a network tool that helps determine the path packets take as they travel from one location to another, identifying all of the "hops" along the way. I wonder why they are called hops*? Almost all operating systems have traceroute utilities built in. The command is just that "traceroute", Windows systems abbreviate the command as "tracert" to deal with the 8.3 file naming convention of old... So, let's look at what information traceroute gives you. more
Sponsored byVerisign
Sponsored byRadix
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byWhoisXML API
Sponsored byIPv4.Global
Sponsored byCSC