It is supremely ironic. A rogue national leader with the stroke of a pen, dictates that its companies will expose a foreign company's end users to cyberattacks. This is the net effect of denying security patches or operating system updates pursuant to Trump's order. In the US Great Rogue Leader's bizarro world, this is the very behavior that he claims makes his actions necessary. In fact, this Trump malware attack is worse because of the mass exposure to exploits. more
I don't usually write sequels to my articles, but this time, it's warranted. My last column, "VoIP in 2008 -- I'm Not Dead," served as a year-end review and, for me, there were a lot of interesting things in 2008 related to VoIP that formed the basis of that article. I did not intend to rattle cages, but it did, and set off a lot of subsequent conversation, primarily in the blogosphere. more
I don't know much about Copenhagen, except that Princess Mary of Denmark is really 'our' Princess Mary from Tasmania, Australia. The other thing I know is that it will be really cold. In terms of the ICANN meeting, there continues to be an element of dismay over the scheduling for this meeting, most notably reflected in a letter to ICANN's CEO from the GNSO Commercial Stakeholder Group. While it's good to get these issues on the table ... community should take ownership... more
Many who attended the ICANN Durban meeting this summer will recall the open forum were speakers lined up to call on ICANN to either speed up or slow down the new gTLDs depending on their position or interest. I chose to address a different topic that no one was yet willing to tackle publicly. It was PRISM and the NSA surveillance scandals. In my intervention I was also the first to also publicly warn ICANN and Fadi Chehade directly that "Trust" in ICANN and Multistakeholderism face serious perils from the Snowden revelations... more
Lord Carter's Digital Britain report contains few surprises given that its essential thrust has been much discussed during the past six months. What remains unequivocal is that the report and its (political) backers trumpet a national broadband network which promises to deliver an insufficient network. It also lacks a broader vision... more
On Thursday, March 17, 2016, a U.S. Congressional committee will hold a hearing on the topic of "Privatizing the Internet Assigned Numbers Authority" (IANA) starting at 10:15am US EDT (UTC-4). You can learn about the hearing and view the written testimony at and watch live on the included pages. The hearing is before the Communications and Technology Subcommittee of the U.S. House of Representatives Energy and Commerce Committee. more
The best and most knowledgeable experts of dot Brand met in the Brands and Domains conference, on October 2 and 3 in the Hague, Netherlands. Brand and project owners were also present, coming from all around the world -- from Australia or Japan to the USA and Canada. The keynote by Georges-Edouard Dias, CEO of Quantstreams and founder of the concept of brand hospitality, explained how customers are not anymore the targets of brands. more
As an unwavering stalwart of ICANN's obligation to honor its commitments under the bylaws to "operate to the maximum extent feasible in an open and transparent manner" I make it a point to read the minutes of its board and committee meetings in large part because I spent most of my three years on the ICANN Board trying to get these documents timely published. In reviewing the recently published IANA Committee minutes the following item caught my attention. more
There is much hype around 5G, but none of it is new. We saw the same propaganda -- fueled by the manufacturers -- in the run-up to the launch of the 3G and 4G versions of the mobile technology. Driverless cars and a range of other IoT applications can indeed potentially open new revenue streams. The reality, however, is that these markets might not eventuate until somewhere between 2025 and 2030. more
The UK's regulator has undertaken much commendable work in recent years, which has helped to establish the country's telecom sector as one of the most competitive and vibrant in the world. The regulator stood up to BT's intransigence in the early days of Local Loop Unbundling (LLU), enforcing the creation of BT Openreach in January 2006 to operate as the company's wholesale division. The results have been very impressive... more
One of the central goals of a brand protection program is detecting infringing third-party activity that falls outside the firewall - that is, external to a brand owner's portfolio of official core and tactical domains. Brand threats occur across a range of internet channels, but domain name abuse is one of the most significant areas for concern, both in terms of the visibility and potential for confusion of branded domain names by potential customers, and the enforcement options available. For this reason, domain monitoring is considered a core component of a brand protection service. more
We see the Internet as a critical enabler for sustainable development. Our vision is that it can unlock human capabilities and we are committed to working with all stakeholders to fulfill the Internet's development potential. To that end, next week in New York the United Nations will be convening an Expert Group Meeting on "Advancing a Sustainable Information Society for All". The Internet Society (ISOC) has been invited to participate to this discussion among other experts. more
ICANN community has a lot on its plate for 2015, and at this first full meeting of the year, we are all jumping into the work with both feet. Here are some of the main issues for brand owners: Sorting out the long-awaited transition from U.S. Government oversight to a truly multi-stakeholder model of governance; ensuring Registrant data (Whois) accuracy, accessibility and privacy (where appropriate); launching reviews of the new gTLD program; and protecting/preserving the robust business and brand voices in the process. more
Admittedly, I'm a not Johnny-come-lately with regards to surveillance, intelligence, telecommunications, network security, law enforcement, and a cross-pollination of all-of-the-above. I actually have a very colorful background of working within all of the aforementioned disciplines - at one time or another - either through the U.S. Military, U.S Government contractors, private industry, etc. ... And unfortunately, I am not generally "shocked" very often by much of the abuses being perpetrated on unwitting Internet users, both by supposedly "trusted" entities (e.g. Democratic Governments, ISPs, etc.) more
This study analyzes the differences in domain name and IP address strategies among a number of current mainstream artificial intelligence (AI) service providers. We find that these technical choices not only reflect deployment decisions but also deep-seated corporate knowledge and capabilities in Internet infrastructure service provision, as well as brand positioning and market strategies. more
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byRadix
Sponsored byVerisign
Sponsored byCSC
Sponsored byWhoisXML API