The Uniform Domain Name Dispute Resolution Policy (UDRP) is not an exclusive forum for the resolution of domain names accused of cybersquatting even though registration agreements use the word "mandatory" in the event of third-party claims. The UDRP is mandatory only in the sense that respondents are "obliged by virtue of the [registration] agreement to recognize the validity of a proceeding initiated by a third-party claimant." more
There's lots of security advice in the press: keep your systems patched, use a password manager, don't click on links in email, etc. But there's one thing these adages omit: an attacker who is targeting you, rather than whoever falls for the phishing email, won't be stopped by one defensive measure. Rather, they'll go after the weakest part of your defenses. You have to protect everything -- including things you hadn't realized were relevant. more
The longer I have been in the tech industry, the more I have come to appreciate the hidden complexity and subtlety of its past. A book that caught my attention is 'Open Standards and the Digital Age' by Prof Andrew Russell of Stevens Institute of Technology in New Jersey. This important work shines a fresh light on the process that resulted in today's Internet. For me, it places the standard 'triumphant' narrative of the rise of TCP/IP into a more nuanced context. more
The story of America's lacklustre broadband performance is relatively well known. Part of that story relates to its low broadband penetration levels when compared with other developed economies... Another aspect of the story relates to broadband speeds... in terms of broadband technology levels, the USA still trails behind leading countries such as Japan and Korea, and some European countries such as France and Italy, by a full generation. more
A few weeks ago, the New York Times published an article saying that the Stuxnet worm, which infected a large number of Iran's nuclear power plants, was a joint effort between the United States and Israel. The program began under former president George W. Bush and continued under President Obama. Last month, the Washington Post ran an article saying that the US and Israel collaborated in a joint effort to develop Flame and that work included Stuxnet. more
Antony Van Couvering from names@work writes that ICANN's constituencies are a "bad idea". While I am not sure to agree with him on the general principle, he makes some interesting remarks. Among others, he points out that the Generic Names Supporting Organization (GNSO) includes groups that seem to be redundant (the Business and Intellectual Property constituencies) and others like domainers which are not represented in the ICANN arena, yet are an integral part of the domain name business... more
When all you have is a hammer, everything appears to be a nail. The generic Top-Level Domains (gTLDs) are not just about trademark filing and battle posturing or cyber-squatting. They are about the potential to create unusual global intellectual properties offering multiple opportunities for rapid image expansion and - most importantly - the achievement of market domination via name identity. more
In an important test of ICANN's primary accountability mechanism, its Independent Review Process (IRP), the organization has been handed a stinging blow over its mishandling of the bid for the new generic Top-Level Domain (gTLD) .AFRICA. At the crux of the issue are two competing applications for the .AFRICA new gTLD and the decision by ICANN's Board to abdicate its responsibility to ensure that ICANN's evaluation and subsequent rewarding of the domain was carried out fairly, transparently, and in accordance with the organization's Bylaws, Articles of Organization, and established policies. more
I'm attending only my second ICANN meeting here in Prague since I left the role as Executive Officer and Vice President Corporate Affairs at ICANN in January 2010... Today at the meeting's opening, outgoing President and CEO Rod Beckstrom said that on his first day on the job he was given a 'blank sheet of paper' and told that the Memorandum of Understanding (MoU) with the US Department of Commerce was not going to be renewed by ICANN and "you better come up with something better and you have to get it done in 90 days because the MoU is going to expire." It's great rhetorical flourish but the reality is vastly different. more
In a recent article, I read about increasingly intrusive tracking of online users, which has lead to a proposal at the FTC, "FTC Chairman Jon Leibowitz said the system would be similar to the Do-Not-Call registry that enables consumers to shield their phone numbers from telemarketers." Maybe I'm dense, but even if this weren't a fundamentally bad idea for policy reasons, I don't see how it could work. more
There's a new sheriff in town and he's riding the horse of "predictive policing". Back in July the Santa Cruz Police Department began deploying police officers to places where crime is likely to occur in the future -- making use of new predictive modeling programs that are designed to provide daily forecasts of crime hotspots -- thereby allowing the Department to preempt more serious crimes before they occurred. In essence, this is another physical-world application of machine learning and clustering technologies -- applied to preempting a criminal problem. In the cyber-world we've been applying these techniques for a number of years with great success. more
We stand by our analysis from March 2010, in which we indicated that a national wireless broadband plan remains a second-class option as the infrastructure for the emerging digital economy in America. In his State of the Union address President Obama set the goal of enabling businesses to provide high-speed wireless services to at least 98% of all Americans within five years. To pay for this the government hopes to raise nearly $28 billion from spectrum auctions. more
This week, I ran into an interesting article over at Free Code Camp about design tradeoffs... If you think you've found a design with no tradeoffs, well... Guess what? You've not looked hard enough. This is something I say often enough, of course, so what's the point? The point is this: We still don't really think about this in network design. This shows up in many different places; it's worth taking a look at just a few. more
As described in New RIPE Atlas Features in the Making, each RIPE Atlas probe performs "anycast instance discovery" measurements. This means, for each DNS root name server, we determine which instance of a name server a probe uses. We compile the data from all probes and build maps showing these results for each Atlas probe. In other words, the map shows the "gravitational radius" for root DNS server instances. more
The number of possible new generic top-level domains (gTLDs) to apply for is daunting. Where do you start? This essay warns against some common pitfalls and outlines three logical steps that you need to follow in making your selection. Remember that there is money to be made in owning the right gTLD. Skeptics focus on the success, or lack of it, of previous expansions such as .name, .biz, and .info. They're using the wrong lens. more
Sponsored byIPv4.Global
Sponsored byRadix
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byCSC
Sponsored byVerisign