I am proud (or disappointed) to announce the 8th annual MIT Spam Conference, March 25th and 26th at MIT in Cambridge, Massachusetts. A regular research competition that brings out the best minds in the fight against unsolicited email. At this point it would be helpful to provide a little background on the conference and remind everyone that the Call For Papers is still open. more
DNS tunneling -- the ability to encode the data of other programs or protocols in DNS queries and responses -- has been a concern since the late 1990s. If you don't follow DNS closely, however, DNS tunneling likely isn't an issue you would be familiar with. Originally, DNS tunneling was designed simply to bypass the captive portals of Wi-Fi providers, but as with many things on the Web it can be used for nefarious purposes. For many organizations, tunneling isn't even a known suspect and therefore a significant security risk. more
The 3rd meeting of the Inaugural Coordination Council of the Net Mundial Initiative (NMI.CC), hosted by Telefonica in Madrid on February 27, 2016, paved the way for the second phase of the innovative NMI platform. The council discussed how to adjust the strategic orientation and the structural design of the initiative, so that future activities are more focused on implementation of the Sao Paulo principles and roadmap. more
Yesterday will go down in history as a bellwether moment. Few among us will soon forget the excitement of Obama's election. But there was an equally historic vote yesterday that for geeks, policy analysts, and technologists represents an entirely new trajectory in telecommunications. In essence, the FCC has begun the transition from command-and-control, single-user spectrum licensure to a more distributed system that holds the potential to eliminate the artificial scarcity that prevented widespread access to the public airwaves since 1927. more
HaAretz, an Israeli newspaper, quotes Major-General Yaldin as saying: "Fighting in the cyber dimension is as significant as the introduction of fighting in the aerial dimension in the early 20th century." (my translation) If this statement is to be believed, Israel is active in cyberspace. And yet, why would Israel admit that, regardless of if it really happens? One option is... more
Universal Acceptance (UA) is a fundamental requirement for a truly multilingual and digitally inclusive Internet. UA is important because it ensures that all domain names, including new long top-level domains (TLDs) and Internationalized Domain Names (IDNs), and email addresses are treated equally and can be used by all Internet-enabled applications, devices, and systems. more
Crime, fraud, scams etc., they're all very bad things. They're also not going to go away anytime soon. As a domain name registrar and hosting provider we're constantly "at risk", as we sell a lot of services that are both cost-effective and also give criminals the tools they need to attack 3rd parties. Again, this isn't exactly news. We've always taken a very pro-active approach to dealing with criminal activity and network abuse... But recently I've been losing sleep. more
Some pretty big companies are beginning to show an active interest in ICANN's new TLD project. The most recent of them is bookseller Barnes & Noble. The letter, which is available both on the ICANN website, is quite narrow and pointed in its scope and focusses on the perceived competition issues with Amazon's bids for several "closed generics". more
The World Intellectual Property Organization (WIPO) has sent to ICANN a letter proposing Paperless Uniform Domain Name Dispute Resolution Policy (UDRP)... This would save considerable amounts of paper, reduce courier charges (as the notice weighs far less than the full complaint), and thus would be good for the environment. more
The FCC recently published some tools to let consumers measure some internet characteristics. The context is the FCC's "National Broadband Plan". I guess the FCC wants to gather data about the kind of internet users receive today so that the National Broadband Plan, whatever it may turn out to be, actually improves on the status quo. The motivation is nice but the FCC's methodology is technically weak. more
The JPA is dead, and in its place is the Affirmation of Commitments. Much debated, this change is anticipated to bring more global participation into ICANN's governance. Increased globalization may turn out to be beneficial for the Internet community, if it helps to shore up ICANN's institutional weaknesses. But the Affirmation leaves important questions unanswered... more
Mike Hammer's thoughtful article, A Few Thoughts on the Future of Email Authentication, should trigger thoughtfulness in the rest of us. Email abuse has been around a long time. Anti-abuse efforts have too. Yet global abuse traffic has grown into the 90+% range, with no hint of trending downward. The best we hear about current effectiveness is for last-hop filtering, if you have the money, staff and skills to apply to the problem... more
Heartbleed, for anyone who doesn't read the papers, is a serious bug in the popular OpenSSL security library. Its effects are particularly bad, because OpenSSL is so popular, used to implement the secure bit of https: secure web sites on many of the most popular web servers such as apache, nginx, and lighttpd. A few people have suggested that the problem is that OpenSSL is open source, and code this important should be left to trained professionals. They're wrong. more
A dispute policy for the new '.bible' top-level domain name requires panelists who agree to hear cases to affirm that they "enthusiastically support the mission of American Bible Society" and that they "believe that the Bible is the Word of God which brings salvation through Christ." The DotBible Community Dispute Resolution Policy appears to be the first domain name dispute policy that requires panelists to take a religious oath - or, for that matter, an oath other than anything related to maintaining neutrality. more
As digital transformation has been picking up momentum, leading analysts such as 451 Research have suggested that hybrid multi-clouds and automated DevOps will become key constituents powering enterprises in the new era. At the heart of these enabling technologies lies Lifecycle Service Orchestration (LSO) designed for near-autonomous application deployment across hybrid infrastructures consisting of traditional on-premise data centers and public clouds. more
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byRadix
Sponsored byDNIB.com
Sponsored byIPv4.Global
Sponsored byCSC
Sponsored byVerisign