I just came across a post telling of the Security and Human Behavior workshop. As some of you may be aware, I've been researching this subject for about two years now, and I am very excited that a conference has now happened! It means I did not waste the last two years of my life after all! more
A fabled, serial cybersquatter of the early Internet argued that typographical errors in domain names were not cybersquatting at all because they had their own distinct identities. Moreover, "I have" (he argued) "just as much right to own the [misspelled] Domain Names as the person who owns the correct spelling of [a] domain name." That dispute involved and <wallstreet journel.com>. Dow Jones & Company, Inc. and Dow Jones LP v. John Zuccarini, D2000-0578 (WIPO September 10, 2000). more
When I first read this post about Predictable Network Solutions on the excellent Telco 2.0 blog, I thought it was an April Fool's Day hoax. Then I remembered that it's a UK site, and some Googling confirmed that it's a real company. So my question is, will this technology -- or something like it -- eventually make network neutrality a non-issue? Or will it be the means for network operators to implement the discrimination that everyone is worried about? more
I had hoped to take a longer break from the theme of Net Neutrality, but a piece on Om Malik's blog by Daniel Berninger seems to be screaming for a reply. Berninger hails from Tier 1 Research; his credentials show a close association with Jeff Pulver's Free World Dialup, and hence a piece that is sympathetic to the 'Save the Internet' movement. His legalistically styled piece attempts to suggest that, in the absence of conformance to network neutrality principles, telephone companies will lose their common carrier status and therefore should lose their access to low cost rights-of-way. Good try, Dan... more
A lot of people are fascinated by the news story that Anonymous managed to listen to a conference call between the FBI and Scotland Yard. Some of the interest is due to marvel that two such sophisticated organizations could be had, some is due to schadenfreude, and some is probably despair: if the bad guys can get at these folks, is anyone safe? more
For a brief moment earlier this week, I thought my days spent dreaming of hover-boards, flying cars and Biff's elusive Sports Almanac were finally over. From reports circulating online, we had finally reached "Back to the Future Day". Those movie buffs out there will know exactly what I'm referring to... But it got me thinking. What would the Domain Name world look like if that crazy cat Doc Brown swung past in his DeLorean, with a fully-charged flux capacitor and a return ticket to October 21st 2015? more
There's been a lot of ink and pixels spilled of late over the Heartbleed bug. Yes, it's serious. Yes, it potentially affects almost everyone. Yes, there are some precautions you should take. But there's good news, too: for many people, it's a non-event. Heartbleed allows an attacker to recover a random memory area from a web or email server running certain versions of OpenSSL. The question is what's in that memory. It may be nothing, or it may contain user passwords (this has reportedly been seen on Yahoo's mail service), cryptographic keys, etc. more
Once upon a time in a universe not very long ago phone service in the US was provided by regulated monopolies. AT&T was the big one and there were (and are) hundreds of small ILECs (Independent Local Exchange Carriers) around the country. These monopolies were regulated both at the federal and state level. Then we began on the long road toward competition and deregulation. more
Since Verisign published its second SSR report a few weeks back, recently updated with revision 1.1, we've been taking a deeper look at queries to the root servers that elicit "Name Error," or NXDomain responses and figured we'd share some preliminary results. Not surprisingly, promptly after publication of the Interisle Consulting Group's Name Collision in the DNS [PDF] report, a small number of the many who are impacted are aiming to discredit the report. more
My new essay, "Valuing Trademarks in Domain Names," outlines the various approaches to valuing trademarks, pointing out the approaches’ different strengths and weaknesses, with emphasis on domain names. Using court cases, the essay points out that there is no one right way to value intangible assets but there are wrong ways. more
M-commerce (mobile e-commerce) incorporates a range of mobile-driven applications, including payments for parking and theatre tickets (m-payments) to mobile banking (m-banking). M-commerce is a broad field incorporating a large variety of services and business models. In 2011, according to Gartner Group, over 15 billion apps are expected to be downloaded worldwide via app stores. They also estimated app store revenues alone reached over $5 billion in 2010 (incorporating revenue generated from both apps purchases and advertising). more
When .org prices rise, who suffers – nonprofits or speculators? Will Ethos Capital raise prices more aggressively than ISOC would? Vint Cerf attributed concerns about higher prices to speculators: "Of course, companies that hold domain names in the tens of thousands for speculative purposes might find such increases more troubling, but I don't have much sympathy for that business model in the context of the organizations the .org brand is intended to serve." more
When he wanted to show the transformative and unifying power of the Internet to open this week's ICANN meeting in Seoul, ICANN President Rod Beckstrom had an ace in the hole: Korean guitarist Jay (Jeong-hyun Lim), who became a global YouTube sensation with his hard-rocking version of Pachelbel's Canon. As I watched Jay wail on his gold-plated guitar to standing ovations, I couldn't help but think of Rod waxing that the Internet was a "symphony" of ideas and voices from around the world. more
Ok, so I had a day in Wellington that was not busy with other things so I thought I'd wander over to the ICANN venue and sit in on the PUBLIC Forum... I saw friends on the walk over and we entered the venue, chatting about several different things. They pulled out their badges. I didn't have one. They were admitted, I was denied entrance... more
If you've followed the telecom industry at all, you've heard of the effort to rip-and-replace Chinese network gear used mostly in cellular networks and in some fiber networks. The U.S. government ordered that such equipment be replaced, although it has funded the replacement in dribs and drabs. There has been heightened scrutiny of Chinese electronics since the recently discovered Beijing-sponsored cyberattacks that have been reported to have infiltrated the networks of major U.S. more
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byDNIB.com
Sponsored byCSC
Sponsored byRadix
Sponsored byWhoisXML API
Sponsored byVerisign