With lessons learnt from the first Round, what does a new applicant need to know to prepare for the coming Round? Which example should he follow to increase his chances of success? I have had the chance to read about new domain names sales figure expectations, prior to the launching of Round one of the ICANN new gTLD program. Comments that I read and feed-backs that I have today are: "our expectations are the one we wrote on the paper and we are happy with them". more
The Internet is currently full of news articles describing how the FCC will soon be putting to bed the last vestiges of its order a few years ago to eliminate net neutrality rules. The order that is widely being called the net neutrality ruling was a far-reaching change at the FCC that essentially wrote the FCC out of any role in regulating broadband. more
Despite deep geopolitical divides, the WSIS+20 outcome document was adopted by consensus, preserving a multistakeholder vision for the digital future while deferring controversial issues to a time more conducive to progress. more
The idea that the US would maintain a strategic position in the Internet was always a pipe dream. Allowing the US to pick the DNS contractors is one thing, allowing the US the power to arbitrarily shut countries off the net is quite another. And that is what deployment of DNSSEC and the rPKI under the current models would do. The idea that some US congressman would promote a bill to force ICANN to drop Cuba, Palestine or the enemy of the moment off the Internet is really not far fetched. The US government was just shut down for over two weeks in a bizarre act of political theater. more
A remote exploit in the BIND 9 DNS software could allow hackers to trigger excessive memory use, significantly impacting the performance of DNS and other services running on the same server. A flaw was recently discovered in the regular expression implementation used by the libdns library, which is part of the BIND package. The flaw enables a remote user to cause the 'named' process to consume excessive amounts of memory, eventually crashing the process and tying up server resources to the point at which the server becomes unresponsive. more
No baby boomers had been born when Congress enacted Title II of the Communications Act in 1934 as a means of regulating the Bell telephone monopoly, and the first Millennials were in elementary school when that monopoly was broken up in 1983. Title II was set to die along with plain old telephone service until the Obama administration decided Title II should be used to implement net neutrality -- the principle that consumers should have reasonable access to internet functionality. more
"First they ignore you, then they laugh at you, then they fight you, then you win!" quote by Gandhi pretty much summarizes the evolution of the domain name monetization and development business. I have watched this business come of age for more than half a decade... In the beginning nobody cared... then when people started talking about how great it was, 'smart people' and the "legitimate web" laughed. Then the trucks with money showed up... A significant double-digit percentage of global Internet traffic is now owned by domain holders with generic names. So the fight is on. more
The announcement last month of a new approach by the Internet Corporation for Assigned Names and Numbers (ICANN) to Africa is welcome, and significant for a number of reasons. Africa must participate in ICANN's activities to help shape its policies, and benefit from the domain name industry (estimated at $2 billion in 2008), where it lags behind other regions, given the few African registrars, and that there are no generic top-level domain names (gTLDs) registries that are African. more
The American industry lobby (AT&T, Verizon, and Comcast) successfully pushed the regulator to get rid of net neutrality, but they are not stopping there. They can sense the opportunity under the Trump Administration to roll further back any regulations that stand in the way of maximising their profits. As all three largely enjoy geographic monopolies in their regions of operation, there is little competition driving innovation forward, so their aim is to milk the networks that they currently have in place for as long as possible. more
Last week I took a Cab on my way back from the Montparnasse Station in Paris. My wife had ordered a Taxi and it was waiting for us at the Taxi station. We had ordered it because we arrived late in Paris that night. Surprisingly, the Cab was a black Limousine with no Taxi sign on its top and the driver, who wore a costume, was gentle and polite. If you ever took a Taxi in Paris, you probably know why I am adding this to this paragraph. more
As I wrote last week, ICANN is proceeding along with "delegating" the "new generic top-level domains (newgTLDs)" and while last week's .GURU may have provoked some chuckles, this week's block of 11 newly "delegated" newgTLDs brings us... more
Tomorrow Internet Governance Forum (IGF) starts. The overall discussion topic this year is How to reach the next billion(s), and that builds on the fact that today we have around one billion Internet users. A number that will explode when all different kinds of devices, from cellphones, to TV sets to toasters will be Internet connected... Some workshops have been cancelled and panelists have been replaced as many people and organisations have made the decision to not go to India. more
There has recently been some good and bad news about WiMAX. On the good news part, an announcement made by the WiMAX Forum this month regarding the launching of the Mobile WiMAX certification program through which vendors can get their IEEE 802.16e-2005 equipment tested and possibly certified... On the bad news part, there was the Sprint-Clearwire breakup after three months of announcing a plan to join forces in building a nationwide WiMAX network in the US. Although it is anticipated that each company would carry on with its own WiMAX plans, analysts believe that the breakup would have negative impact on WiMAX deployment in the US... more
According to recent news reports, the administration wants new laws to require that all communications systems contain "back doors" in their cryptosystems, ways for law enforcement and intelligence agencies to be able to read messages even though they're encrypted. By chance, there have also been articles on the Stuxnet computer worm, a very sophisticated piece of malware that many people are attributing to an arm of some government. The latter story shows why cryptographic back doors, known generically as "key escrow", are a bad idea. more
Almost a year ago I wrote about Google Chrome: Cloud Operating Environment and [re]wrote the Google Chrome Wikipedia article, discussing the ways in which Google was changing the game through new and innovative features... Similar features were quickly adopted by competitors including Opera (which Chrome quickly overtook at ~2%) and Firefox (which still has an order of magnitude more users at ~20-25%). more
Sponsored byRadix
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byDNIB.com
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byCSC