One could think that the authors of The Universal Declaration of Human Rights (UDHR) -- adopted in 1948 -- had the Internet in mind when they declared in Article 19: "Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers." All human beings are entitled to certain rights, and it makes no difference if they choose to exercise them in a town square or an Internet chatroom. more
I've been ruminating on this for a while, this follow-up that was a decade in the offing. My article Trench Warfare in the Age of The Laser-Guided Missile from January 2007 did pretty good in terms of views since I wrote it. Less so in terms of how well the ideas aged or didn't, but that's the nature of the beast. Everything gets worse, and simultaneously, better, and so here we are: Using embarrassingly ancient approaches to next-generation threats. Plus ça change. more
Over the past decade Simplified Chinese has grown to become one of the most popular languages on global websites, second only to English. According to the Web Globalization Report Card, which has long monitored languages supported by the world's leading brands, Chinese was seen on only about six out of ten websites in 2006. Today, it is seen on virtually every global website. more
The argument for end-to-end encryption is apparently heating up with the work moving forward on TLSv1.3 currently in progress in the IETF. The naysayers, however, are also out in force, arguing that end-to-end encryption is a net negative... The idea of end-to-end encryption is recast as a form of extremism, a radical idea that should not be supported by the network engineering community. Is end-to-end encryption really extremist? Is it really a threat to the social order? more
Yesterday law enforcement officials arrested 6 people and charged them with running a massive internet fraud ring. Over 4 million PCs were part of the botnet. According to the FBI, "the cyber ring used a class of malware called DNSChanger to infect approximately 4 million computers in more than 100 countries. There were about 500,000 infections in the U.S., including computers belonging to individuals, businesses, and government agencies such as NASA." more
This year's Cisco Collaboration Summit was a step up from last year, and I say that for good reason. Last year's event was good -- all of Cisco's events are good -- but the venue was too small and it took away from the messaging. For 2010, Cisco went out of town to the classy and classic Arizona Biltmore in Phoenix. They don't build them like this anymore, and to me, this setting did far more justice for what Cisco has to say about collaboration. more
People have been trying to measure the global diffusion of the Internet and the digital divide between rich and poor nation for twenty five years. The first to do so was Larry Landweber, who noted whether or not a nation had an Internet (or other) connection. It was a binary metric -- yes or no -- and it was suitable to its time because there were only a handful of users who were restricted to teaching and research, using a few applications like email, file transfer, news groups and remote login. more
The new gTLD program of 2012, based on the Generic Names Supporting Organization (GNSO) policy recommendations of 2007, has been both a success and mess. In terms of its success, many new and innovative names are being introduced on the Internet, more most every day. The mess has involved ad-hoc, independent decisions by the Board and implementation decisions by ICANN staff that have resulted in variety of problems including a broken community evaluation process... more
The approach is growing in popularity, and Google, Microsoft and Amazon are among the many large companies working on ways to attract users to their offerings, with Google Apps, Microsoft's Live Mesh and Amazon S3 all signing up customers as they try to figure out what works and what can turn a profit... In the real world national borders, commercial rivalries and political imperatives all come into play... The issue was recently highlighted by reports that the Canadian government has a policy of not allowing public sector IT projects to use US-based hosting services because of concerns over data protection. more
When I first entered the domain industry as head of finance and operations at .MOBI, the company had just acquired its licence from ICANN. I did a quick overview of the business environment through a financial lens. My first impressions were predominantly positive. Sales were generated up front on a cash basis, which put registry operators in an enviable operational cash flow position... Outsourcing the back-end registry operations meant that we could tie cost of goods sold (COGS) to activity. But I had a steep learning curve... more
On 6 March 2017, ICANN's GDD finally responded to an applicant letter written on 14 August 2016 to the ICANN Board. This was not a response from the ICANN Board to the letter from 2016 but a response from ICANN staff. The content of this letter can best be described as a Null Response. It reminded the applicants that the Board had put the names on hold and was still thinking about what to do. more
For anyone wondering how Internet development is evolving in the Caribbean, an international conference held in Bridgetown, Barbados, hosted by the American Registry for Internet Numbers (ARIN), provided more than a few positive clues. The second annual ARIN Caribbean Forum attracted Internet policymakers, computer networking and cybersecurity experts and law enforcement officials from across the Caribbean, North America and Europe for high-level talks under the theme "Caribbean priorities for the global Internet." more
Domain name owners have traditionally complained that ICANN does not listen to us, and there is indeed plenty of evidence demonstrating the group’s obliviousness to community input. Nevertheless, as domain owners, we need to begin giving ourselves a share of blame too. It’s time to reflect on our failures so we can come up with an actionable solution... more
Does "voice" communication really matter as much today in business communications? Think about it. When you need to reach someone today, what do you do? Do you call them on the phone? Or do you send them email? Or a text message? or IM? I know personally that my normal communication flow usually goes something like this: Instant Messaging; I check first to see if I can reach the person on some form of IM... SMS; if the matter is relatively important... E-mail/Facebook/Twitter/other; Previously that would have just been email, but these days I find myself very often sending messages via Facebook or Twitter... more
The case I'm reporting on today has garnered attention from a number of quarters. One commentator, Andrew Allemann tells us that "[he's] struggling with this UDRP decision" and Nat Cohen of Telepathy Inc. in a couple of Tweets and a private conversation is concerned that the holding could be a Trojan Horse by erasing the distinction between merely confusing and confusingly similar. The problem centers on the Panel's holding that everyfamily.org is confusingly similar to EVERYTOWN... more
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byCSC
Sponsored byWhoisXML API
Sponsored byRadix
Sponsored byVerisign
Sponsored byDNIB.com