ARIN has just released a statement on the future of addressing policy. Specifically addressing the future of IPv4 addressing. What ARIN does is to emphasize the current policies and say they will be enforced even stronger than today if needed. I.e. there is no announcement of a change in policy. more
On Dec. 12, 2013, the Internet Engineering Steering Group (IESG) announced the formation of a new working group, Extensible Provisioning Protocol Extensions (eppext). The working group was formed to create an Internet Assigned Numbers Authority (IANA) registry of Extensible Provisioning Protocol (EPP) extensions and to review specifications of extensions for inclusion in the registry. EPP is the standard domain name provisioning protocol for generic top-level domain (gTLD) name registries that operate under the auspices of ICANN. more
If you will be at ICANN 52 in Singapore in February 2015 (or can get there) and work with DNSSEC or the DANE protocol, we are seeking proposals for talks to be featured as part of the 6-hour DNSSEC Workshop on Wednesday, February 11, 2015. The deadline to submit proposals is Wednesday, December 10, 2015... The full Call For Participation is published online and gives many examples of the kinds of talks we'd like to include. more
It is wonderful to see the floodgates open and see so many new gTLDs launch -- 417 delegated as of October 4th. As registry senior management's focus switches to operational matters post launch, it is now time to consider how the new registries will deal with revenue recognition and its impact on financial reporting. This is primarily the CFO's responsibility, but senior management must be mindful that improper domain revenue accounting will lead to corporate reputational damage. more
Crypto-anarchism (or crypto-anarchy) is a form of anarchy accomplished through computer technology. Crypto-anarchists develop and employ their own cryptographic techniques to prevent knowledge of the information or even the identity of parties communicating over networks. The motivations vary - from just having fun and causing turmoil, to achieving perceived status within a crypto-anarchy community, to furthering socio-economic views about information availability, absolute privacy, political advocacy and spreading anti-government paranoia. more
Back in March, it was widely reported that RSA had suffered a serious security breach that (to some extent) weakened the security of its SecurID token. However, the NY Times reported then that the chairman said that the penetration wasn't absolute but "it could potentially reduce the effectiveness of the system in the face of a 'broader attack.'". more
An assignment in a Media and Democracy course I teach at Penn State invites students to select a telecommunications advocacy web site for analysis. I want my students to decode the message and attempt to identify whether a bias exists and who financially supports the site. The exercise typically fails miserably... Most students cannot infer that a site that advertises books by Ann Coulter trends to the right and one that talks about social justice trends to the left. more
After decades of talk, the time for IPv6 has finally arrived. There are several transition options available, but whatever approach you choose, the challenge will be to make sure that your subscribers don't experience a reduction in quality of service. IPv4 is likely to co-exist with IPv6 for some time, so a native dual-stack migration strategy will be the best transition option for most providers... With dual-stack mode, there is no disruption to the service if a client requests an IPv4 address. more
According to a filing with the SEC, the Department of Commerce renewed the .COM agreement for six more years. The renewal was held up until the last minute (the old agreement expired yesterday) due to antitrust concerns, specifically about pricing. The main change in the new agreement is that Verisign is no longer allowed to increase the price above the existing $7.85... more
As the last strike of the clock signals the end of 30 May 2012 there will be quiet relief from the back offices and consultants of most top-level domain name (TLD) applicants. And finally after the drama of the TAS system gremlins we have closure. Still there may yet be squeals of anguish as someone, somewhere got it wrong. A glitch in the applicant's computer, a lost bank transfer, a last minute switch of provider: all may be reasons for failure. ...as the quip attributed to Gore Vidal so aptly put it, "It's not enough to succeed. Others must fail." So lets discuss some additional points of failure. more
Potential trademark Rights Protection Mechanisms (RPM) at the 2nd level can be divided into three main areas -- each defined by their time relative to Top-Level Domain (TLD) launch... Of these, we believe the third, "After Launch," is the most fruitful path to explore. We believe it offers the most potential to protect the rights of trademark holders, the best balance between TM rights and the legitimate rights of others who may want to register names , and the most benefit to the trademark community at the lowest cost to them... more
While couched in noble terms of promoting competition, innovation and freedom, the FCC soon will combine two initiatives that will enhance the likelihood that Sprint and T-Mobile will stop operating as separate companies within 18 months. In the same manner at the regulatory approval of airline mergers, the FCC will make all sorts of conclusions sorely lacking empirical evidence and common sense. more
I've discussed Telesat's LEO broadband project in earlier posts, but the project has progressed, so an update is needed. The original plan was to launch 117 satellites but that has changed. The phase 1 constellation will now have 298 satellites and the second phase will add 1,373 for a total of 1,671. The revised plan has been submitted to the FCC, and they expect it to be approved next year. more
Of all the candidates for the Democratic nomination, Howard Dean raised the most amount of money over the Internet. On March 15th, the Dean campaign launched the first official weblog in presidential campaign history, six days after Dean himself first stumped in the blogosphere. What follows are Dean's principles for Internet Policy.
This nation -- and not just this nation -- needs to have an honest conversation about what's real, possible and desirable when it comes to the gift of the Internet. Conversations need shared ground. Here are the beliefs we think should guide the development of a fact-based federal policy. We put these forward as part of a continuing Great American Conversation. more
Studies have found only limited, insufficient agency adherence with FISMA's (Federal Information Security Management Act) continuous monitoring mandates. One survey found almost half of federal IT professionals were unaware of continuous monitoring requirements. A recent GAO report found that two-thirds of agencies "did not adequately monitor networks" to protect them "from intentional or unintentional harm." more
Sponsored byDNIB.com
Sponsored byCSC
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byRadix