The digital domain encompasses the different spaces and spheres we use to relate and interact with the people and things that surround us using digital technologies. The Universal Declaration of Human Rights, UDHR, as the globally accepted standard, should serve us as the guiding light when it comes to striking the delicate balance between our rights and responsibilities on and off-line. more
I recently became aware of the new pay-by-mobile phone service Venmo.com. "Pay friends with your phone, skip the ATM, Settle up on meals, rent, bills and drinks" ... Venmo are using Facebook connect as a way of verifying user identities, at least that is what they claim. more
I recently learned about a meeting that took place between ICANN staff and Noncommercial Users Constituency (NCUC) members Kathy Kleiman and Konstantinos Komaitis regarding the Implementation Recommendations Team (IRT) recommendations for the protection of intellectual property rights in new generic Top-Level Domains (gTLDs). My comment relates to the White Paper published by Ms. Kleiman and Mr. Komaitis with respect to the notion of having multiple Regional Trademark clearinghouses (TMCs). For the reasons stated in this comment, the KK Proposal fails a number of the benchmarking checklists used by the IRT in evaluating proposals. more
Few months ago in a talk given at the Institution of Engineering and Technology organised here in London by the Society for Computers and Law, Professor Lessig recounted a conversation he had with former US Counter Terrorism Czar Richard Clarke, where Larry asked the question that many had in mind... how the US Government managed to conceptualize, design and draft a piece of legislation as vast and complex as the USA PATRIOT Act in such a short period of time (a month and 15 days after 9/11), and the answer was what many people had imagined... more
The Internet Governance Forum (IGF) has, for several years, experienced technical problems that have nothing to do with the local staff or host countries of the event. In fact, the volunteers who were part of the local staff of its 17th edition, held in the Ethiopian capital of Addis Ababa, were constantly overcompensating for issues with a great deal of goodwill. more
First the Los Angeles Times, now the New York Times have both printed editorials critical of the PROTECT-IP bill. Both the LAT and NYT support copyright - and announce as much in their opening sentences. That doesn't mean we should sacrifice Internet security and stability for legitimate DNS users, nor the transparency of the rule of law. more
Incumbent carriers, such as AT&T, Comcast and Verizon, have made countless "curtains for the Free World" assertions in the Network Neutrality debate. They claim that if the FCC reclassifies as common carriage aspects of Internet access, it will create "regulatory uncertainty" and "disincentive investment." Not one of the countless sponsored researchers funded by incumbents has provided a shred of empirical evidence to support these assertions. more
Last week I blogged about the way that lots of otherwise legitimate companies leak e-mail addresses to spammers. Here's a few more thoughts. One person asked how I knew that these were leaks, and not dictionary attacks, since the addresses I use are fairly obvious, the name of an often well known company @ my domain. It's a reasonable question, but the answer is simple... more
There was an interesting phenomenon that happened in September when Starlink launched 49 new satellites. The satellites were successfully deployed by the rocket, but as the satellites were being maneuvered to reach the final orbital slots, there was a geomagnetic storm that caused 38 of the satellites to fall back to earth. Space storms happen when radiation affects the magnetosphere that surrounds the earth. more
Wouldn't it be nice if turning on IPv6 really was 'press one button and the rest is magic' easy? For some things, it is. If you're talking about client-side, enabling an IPv4-only home service on DSL or fibre really can be this simple, because all the heavy lifting is being done inside your ISP: you're not enabling IPv6 in the network, you're turning on the last mile. It was knocking at your door and you just had to let it in. more
At the recent IETF meeting there has been considerable discussion about interconnection of Content Delivery Networks. A lot of this is being driven unfortunately by the incumbent telco/cableco's who never understood CDN in the first place, and now want to assert control over this critical new Internet architecture, much in the same way that they want to take control over open WiFi hot spots as part of an integration strategy with their 3G/4G networks. more
RIPE Atlas, the new active measurements network maintained by the RIPE NCC, gives you a way to easily measure the quality of your Internet services. RIPE Atlas is designed in such a way that it can collect data for analysis from a great number of locations on the Internet. The actual measurement devices, or "probes", are so small that they can be easily deployed in a home environment. more
An increasing number of domain name disputes are being conducted in languages other than English, a trend that presents a new challenge for some trademark owners. In 2015, 85.77% of all domain names disputes at the World Intellectual Property Organization (WIPO) were conducted in English - down from an all-time average of 88.01% and a record high (in 2000) of 99.84% (disregarding 1999, the first year of the UDRP, because only one case was filed - in English -- that year). more
When a service is constructed using diverse components, then the way in which service revenues are distributed to the various suppliers of the components of the service can follow a number of quite distinct models. There are various forms of revenue redistribution models where the revenue per transaction is distributed to the various suppliers according to their inputs to support each transaction. more
The COVID-19 Pandemic is causing huge social and financial shifts, but so far, its impact on network security has gone under-reported. Yet with thousands of companies worldwide requiring millions of employees to work remotely, network administrators are seeing unprecedented changes in the ways that clients are using their networks and new threats that seek to leverage the current crisis. more
Sponsored byWhoisXML API
Sponsored byRadix
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byCSC