It looks as if the big boys like AT&T, Verizon and Comcast are passing on the stimulus money. The official reason is that they don't need it, that they enough cash on hand to build out their networks on their own. Fair enough. Perhaps the funding should be reserved for those more in need, those that just need a boost to fund a new business model or expand service. But there are probably other reasons. more
I read this to the ICANN Board Thursday morning, in Sydney, after more prep work than I care to recall. If you don't know that the DAGv3 is delayed, or what the IRT is, this is a good time to bush up on current ICANN state. "Good morning. My name is Eric Brunner-Williams, and I am speaking to you on behalf of the initial signatories of the Step-by-Step proposal. I represent one of the signatories as the principal of the native, aboriginal, and indigenous cultural and linguistic Top-Level Domain (TLD) project, one of many similar efforts to preserve living languages and cultures..." more
In ICANN circles these days, accountability is the buzz word. Nearly everybody is talking about it. Generally everybody is in favor of it, but that's where the agreement ends. This paper urges action by ICANN to provide a means for redress of grievances as an essential element of accountability. I would like to review the ICM case (the delegation of the .xxx domain), and the role of ICANN's Independent Review Panel (the IRP). As you will recall, the ICANN Board had originally awarded .xxx to ICM, but in a subsequent reconsideration had reversed the award. more
Between December 10th and 11th 2015, the China Future Network Development and Innovation Forum, jointly hosted by the Chinese Academy of Engineering and the Nanjing Municipal Government, is scheduled to be held in Nanjing, Jiangsu, China. The forum will be jointly organized by Jiangsu Future Networks Innovation Institute and Beijing Internet Institute, with the theme of "Building future network test facilities and promoting network development & innovation", and it will invite nearly a hundred industrial experts at home and abroad, to establish a platform marked by security, innovation, openness, cooperation where the policy, industry, academics, and application are integrated. more
In passing the baton for combating cybersquatting to the Internet Corporation for Assigned Names and Numbers (ICANN) the World Intellectual Property Organization (WIPO) recommended that "claims under the administrative procedure [should not] be subject to a time limitation" (Final Report, Paragraph 199). ICANN agreed and the UDRP contains no limitation period for making a claim. The absence of a limitation period does not necessarily forego applying equitable defenses for delay, but the consensus of Panels appointed to decide disputes under the Uniform Domain Name Dispute Resolution Policy (UDRP) is that they are not applicable in countering cybersquatting claims. more
When a new TLD goes into General Availability or Land Rush, the first few days are filled with registrations that reflect how the market perceives the TLD. Registrants may register domain names to develop or for speculative purposes. Others register to protect their brand. The first major web usage survey for a new TLD is generally a Signs of Life survey where the early stages of development can be detected. These surveys were based on the May 19th, 2018 .APP zone file. more
The registries (gTLDS) are all moving towards signing in about a year. PIR and .org is going to be first with .edu, .biz, and others closely behind. The root is scheduled to be signed in the beginning of July (end of June looking at the holiday calendar) being the biggest milestone. Some of the roots already contain DNSSEC information. Other ccTLDs continue to turn DNSSEC on with countries on every continent signed. more
Cyber security was a hot topic in 2014. It seemed not a week went by without details of a high profile data breach hitting the headlines. To recap, the Sony breach was one of the most notable, as was the Home Depot hack, while details of widespread security vulnerabilities such as Heartbleed, Shellshock and Poodle were also revealed. But what will 2015 bring? Will it be more of the same, or have cyber criminals got some new tricks up their sleeves? more
The impact of the recently revealed US government data collection practices may go well beyond the privacy ramifications outlined in the Internet Society's statement: expect a chilling effect on global, resilient network architecture. As governments of other countries realize how much of their citizens' traffic flows through the US, whether or not it is destined for any user or service there, expect to see moves to curtail connections to and through the US. more
This Friday, it looks as though the ICANN Board will follow the clear conclusions drawn by its independent review and approve dot-xxx. Given the importance of the first use of the review process, the importance of the Board being seen to be accountable and the fact that the community was pretty unanimous in recent public comment, it is pretty much the only reasonable course of action. The question then is: how do things move forward? more
There is a classic scene in the movie, "Jaws," when Roy Scheider gets a look at the size of the shark circling his fishing vessel and says, "We're going to need a bigger boat." The same case can be made for CIOs dealing today with application security. Hackers from all over the world are circling business and government like great whites looking for vulnerabilities in Internet-facing applications. The growth of applications is great for doing business but they have become chum in the water for predators. more
The Ninth Annual Internet Governance Forum (IGF) Meeting is taking place all this week, September 2-5, 2014, in Istanbul, Turkey and live video streams are available for all the sessions... I watched the opening session live stream today from my home office in New Hampshire, USA, and the quality was excellent. There was also a live text transcription. more
For the last decade and a bit, banking customers have been relentlessly targeted by professional phishers with a never-ending barrage of deceitful emails, malicious websites and unstoppable crimeware -- each campaign seeking to relieve the victim of their online banking credentials and funds. In the battle for the high-ground, many client-side and server-side security technologies have been invented and consequently circumvented over the years. Now we're about to enter a new era of mitigation attempts... more
Tunnel vision is a rather serious medical condition and the Internet or at least a number of service providers could be at risk if not treated soon enough. Symptoms of inter AS (Autonomous System) tunnel vision are many slower connections with IPv6 compared to IPv4 with some failing all together. Reason is that tunnels, especially inter-AS tunnels, can lead to long paths and non-optimal routing. more
Artificial intelligence has important uses in the domain name industry. With the use of AI, domain name registration, management, and valuation have been made more efficient and accurate. Here are some specific ways AI is affecting domain names... AI-powered domain name generators can suggest relevant and available domain names based on specific keywords, making the search process easier and faster. more
Sponsored byRadix
Sponsored byVerisign
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byWhoisXML API
Sponsored byCSC
Sponsored byDNIB.com