Today's Internet is a network of networks and seen through the lens of the web. We need to look beyond the engineering history to see the Internet in the context of the broader vision of JCR Licklider, an acoustic psychologist, and his vision of man/computer symbiosis... JCR Licklider would've been thrilled to see such a powerful man-machine symbiosis becoming so normal and having it work so well. Lick, as he was called, can be considered the grandfather of the Internet. more
To those of us who have worked on crypto policy, the 1990s have become known as the Crypto Wars. The US government tried hard to control civilian use of cryptography. They tried to discourage academic research, restricted exports of cryptographic software, and -- most memorably -- pushed something called "escrowed encryption", a scheme wherein the government would have access to the short-term keys used to encrypt communications or stored files. more
When the Internet outgrew its academic and research roots and gained some prominence and momentum in the broader telecommunications environment it found itself to be in opposition to many of the established practices of the international telecommunications arrangements and even in opposition to the principles that lie behind these arrangements. more
Don't worry about the bad guys turning out the lights. Worry about everything they're stealing while the lights are still on. The theft of intellectual property ranging from Hollywood films to defense secrets is underway by cyber-criminals of various stripes. Maintaining control over intellectual property may be the single most important challenge to American economic security. Implementing a cyber-reliant infrastructure is a national challenge which crosses the traditional boundaries between economic sectors and between public and private domains. more
Now that new gTLD registries have been operating for more than a year, a few registries have already experienced going through an audit and a few more are now receiving notifications that they are next in line. For all, the process of going through an ICANN audit is a first. Once you receive the Request for Information (RFI), you will have 15 days to respond, or seek an extension of time. Extensions may be available on a case by case basis. more
To the annoyance of some, surely, the issue of abuse in the domain name system (DNS) has been high on the list of critical issues in internet governance circles. Personally, in my more than 20 years of internet governance experience, tackling DNS abuse is one of the more important issues I've participated in and seen debated. Despite this intense scrutiny, common-sense solutions (such as contract improvements) have been so far elusive, even as they fall squarely within its ICANN's remit. more
Imagine a scenario. Your website analysis shows that your page has stopped receiving visitors, yet there are no complaints that your domain is unreachable. Strange, isn't it? You are certainly wondering: What's going on? Where are my customers? You see, what happened is that you are facing the consequences of the lack of domain name system (DNS) security. more
As the head of the registry for the .CA top-level domain, I can tell you that few things get Canadians riled up as much as the performance of their Internet service. Their concerns aren't entirely unfounded -- according to OECD data, Canada's ranking for broadband speed and price relative to its OECD counterparts has been on a downward trend over the past dozen years. And for those of us who travel overseas, especially to countries with advanced Internet infrastructure like South Korea and Sweden, we've experienced firsthand just how green the grass is on the other side of the fence. more
The ICANN Board has just announced its selections for the next Nominating Committee's leadership. As a reminder, the Nominating Committee (NomCom) is designed to ensure skilled individuals go into key ICANN leadership position. Every year, its recruitment and selection process leads to appointments for positions on the GNSO (Generic Names Supporting Organisation - ICANN's policy-making body for generic domains), the ccNSO (country code Names Supporting Organisation) and ALAC (At Large Advisory Committee). more
In the past year ICANN has been putting a lot more effort into its compliance activities, which is a good thing, since the previous level was, ah, exiguous. That's the good news. The bad news is that while they're paying more attention to misbehaving registrants, the registrars, gatekeepers to the world of domains, have serious issues that ICANN has yet to address. more
The following is based on my experience and interpretation of the UDRP and the relevant laws of the United Kingdom and European Union. This is not legal advice but just my own experience and interpretation. How does a UK citizen create a non-commercial trademark.tld parody criticism website and avoid harassment from the trademark holder? Here are the steps... more
I was sitting around on a Sunday afternoon catching up with a backlog of work watching the Philadelphia Eagles beat the New York Giants in an unbelievable comeback, when I visited the ICANN website and noticed the new logo for the upcoming 40th ICANN regional. ...I personally thought the original choice of the San Francisco logo looked confusingly similar to Cisco's registered trademark. more
There's more than a hint of theatrics in the draft PROTECT IP bill that has emerged as son-of-COICA, starting with the ungainly acronym of a name. Given its roots in the entertainment industry, that low drama comes as no surprise. Each section name is worse than the last: "Eliminating the Financial Incentive to Steal Intellectual Property Online" (Sec. 4) gives way to "Voluntary action for Taking Action Against Websites Stealing American Intellectual Property". more
It probably won't raise any eyebrows to know that for practically every penetration tester, security researcher, or would-be hacker I know, nothing is more likely to make their eyes glaze over and send them to sleep faster than a discussion on Governance, Risk, and Compliance (i.e. GRC); yet the dreaded "C-word" (Compliance) is a core tenet of modern enterprise security practice. more
That's what Europeans are now calling the venerable old International Telecommunication Union -- EATU for short. In fact, based on current metrics, this transformation is exactly what has occurred. The shift began occurring almost a decade ago, and has dramatically accelerated in recent years. At the ITU-T's key Study Group 17 meeting on security now underway, fully 90% of the input contributions and more than half of those participating are from only three countries -- China, Japan, and Korea. Indeed, there has long been a semi-formal organization known as CJK that has been manifested here. more
Sponsored byVerisign
Sponsored byVerisign
Sponsored byWhoisXML API
Sponsored byRadix
Sponsored byCSC
Sponsored byDNIB.com
Sponsored byIPv4.Global