Here's another example of a domain name dispute where the top-level domain (TLD) was essential to the outcome of the case -- because it formed a part of the complainant's trademark: mr.green. In this decision under the Uniform Domain Name Dispute Resolution Policy (UDRP), the panel joined a short but (slowly) growing list of disputes in which the TLD plays a vital role. more
I ought to explain why I've suddenly gone cold on VoIP. It's just I've watched my own behaviour. I've grown tired of the inconsistency of PC VoIP calls, and instead I've reverted to using landlines, mobiles and Jajah (for callback). But I'm still using IM to set up many of those calls! The problem isn't unique to any one client - they're all proving unsuitable for business use with clients (which is most of my telephony needs covered). The worst of all seems to be Skype conference calling... more
Many C-level executives are unaware their IT organizations could be sitting on a lucrative sellable supply of unused IPv4 addresses. Assessing and executing on the opportunity takes planning, but there's a clear path for getting it done. In 2014 and 2015, buyers had their pick of large block holders with millions of available and unused numbers. This surplus allowed large buyers to shop around for the lowest offer and, as a result, drive prices down to a low of $4/number. more
The internet is a shared resource. Different access providers begin mixing traffic at different places, but sooner or later, my internet gets mixed into yours. The Canadian Association of Internet Providers (CAIP) application to the Canadian Radio-television and
Telecommunications Commission (CRTC) seems to acknowledge this shared nature with its reference (at paragraph 50 of its application) to the description of the Gateway Access Service its members resell, a description complete with a graphic of a cloud -- a sign that the resource is being shared... more
The IETF published RFC8200 last week, which officially makes IPv6 an Internet Standard. While this move was a long time coming -- IPv6 has now reached about 20% deployment -- a more interesting question is: what has changed since RFC2460, which was a draft standard, was published in 2013? After all, the point of moving from the experimental to the draft standard to the internet standard states is to learn more about the protocol as it operates on the wire... more
There has been a lot of talk, blogging, tweeting and press reportage about the Epsilon breach, but little in the way of concrete information to consumers as to where they stand, if their personal information (PII) such as their name and email address has been lost to criminals. The CAUCE Board of Directors have developed the following FAQ that provides facts and guidance for those affected by the breach. more
I recently followed an interesting international discussion on FttH vs. cable. With the fiber to the home (FttH) debate hotting up, driven by the possibility of using FttH as the new infrastructure for the digital economy, the cable companies are putting up a stiff fight, both in Europe (Netherlands) and the USA, claiming FttH is not necessary, and that DOCSIS 3.0 can do the job just as well. In these debates the longer-term national interest is often disregarded. The debate is confined to the technology -- what it can and cannot do -- and it also concentrates on a rather short-term timeframe, say of the next five years. more
In this article, published in the Federal Communications Law Journal (FCLJ), the authors (Reed E. Hundt and Gregory L. Rosston) have proposed sweeping changes to the current telecommunications regulatory regime. With impending reform in telecommunications laws, the authors argue that an important first step is the creation of a bipartisan, independent commission to examine and recommend implementation of more market-oriented communications policy. The following excerpt from the article looks into service competition with respect to VoIP... more
In an entry in the ICANN blog, Paul Levins says they've arranged to move Registerfly's domains to another registrar. They won't say who the other registrar is beyond "an existing accredited Registrar with a demonstrated record of customer service" which could be just about anyone other than Registerfly. They have "most" of the registrant data. All is to be unveiled next week. In the meantime, read the comments on the blog... more
Large Language Models (LLM) like GPT -- 4 and its front-end ChatGPT work by ingesting gigantic amounts of text from the Internet to train the model and then responding to prompts with text generated from those models. Depending on who you ask, this is either one step (or maybe no steps) from Artificial General Intelligence, or as Ted Chiang wrote in the New Yorker, ChatGPT Is a Blurry JPEG of the Web. more
Earlier this April, the largest ICANN meeting ever -- more than 2,500 attendees -- kicked off in Beijing. Given the imminent addition of hundreds of "dot Brands" to the Internet, the topic of new gTLDs was at the top of the discussion list for all attendees. So far, well over 100 new gTLD applications have passed the Initial Evaluation stage, meaning they're on their way to becoming live domains. more
Traditionally, the Internet Corporation for Assigned Names and Numbers (ICANN) coordinates the Internet Assigned Numbers Authority (IANA) functions, which are key technical services critical to the continued operations of the Domain Name System (DNS)... ICANN has also evolved in its structures to use the 'Multistakeholder Model' in the dissemination of some of its functions and this has seen the creation of working groups and constituencies. more
As an admin, app security should be a top priority - but SaaS apps represent a difficult challenge in that regard. How can you protect your business from their risks, while enjoying all their rewards? Within the average enterprise, there are 508 unique cloud applications in use. That number's overwhelming enough on its own without considering that 88% of those applications aren't enterprise ready, or the fact that one in five cloud applications has data sharing as a core functionality. more
Two approaches can be taken towards the development of Fiber to the Home (FttH). One is all about its commercial potential - the sale of the most awesome commercial applications in relation to video entertainment, gaming and TV. The other is a perhaps more sophisticated approach - from the perspective of social and economic development. Of course the two are not mutually exclusive. more
Last week we heard of yet another egregious security breach at an online provider, as crooks made off with the names, address, and birth dates of eBay users, along with encrypted passwords. They suggest you change your password, which is likely a good idea, and you better also change every other place you used the same password. But that's not much help since you can't change your name, address, and birth date, which are ever so handy for phishing and identity theft. more
Sponsored byIPv4.Global
Sponsored byWhoisXML API
Sponsored byRadix
Sponsored byVerisign
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byCSC