Sometime later this year - at a venue still unknown - something short of a thousand people from around the world will gather together and engage in a now meaningless ritual almost exactly like they did in 1924. In the 1990s the name of the gathering was changed from the CCITT Plenary Assembly to a World Telecommunication Standardization Assembly (WTSA). more
Several posts have been made on the topic of contention resolution and private auctions around the new gTLD program over the last few weeks on CircleID. Many of the Applicants we spoke to thought it was appropriate to weigh in from the RightoftheDot.com perspective. We want you to know that the RightOfTheDot auction offering for contention resolution for new gTLD's, unlike other offerings, remains unchanged from when it was first announced to the Domain Industry. more
With ICANN's announcement that the application window for new TLDs will be opening in January 2012 there has been an influx of media coverage directed at our bid for .ECO, as well as the bids of many other organizations the world over. To date, many articles related to our bid have drawn immediate reference to the involvement of Mikhail Gorbachev and Al Gore. more
I've said many times that winning a domain name dispute under the Uniform Rapid Suspension System (URS) is much more challenging than under the Uniform Domain Name Dispute Resolution Policy (UDRP). But, that doesn't mean trademark owners should take the UDRP for granted. One complainant learned that lesson an especially hard way -- first by losing a URS determination and then by losing a UDRP decision on the same domain name. more
Shadow IT -- the use of unsanctioned software and services by employees -- is a problem. It's a big one. According to Forbes, 72 percent of executives don't know how many "shadow" apps are being used on their network. Beyond overloading network resources and impacting data compliance, there is also the real threat of security breaches from unapproved apps. Managing IT you can't see is no easy task, but fortunately it's not impossible. Here are five tips to help bring light to the shadows. more
Last week during the ICANN meeting in Barcelona I attended a short presentation from the Internet Watch Foundation (IWF). Their mission is pretty simple: ...eliminate child sexual abuse imagery online. Fortunately, the presentation I was at did not include any of the actual material (which would have been illegal anyway) but even without seeing any of it the topic is one that I think most people find deeply disturbing. more
Edward Mc Nair, executive director of the North American Network Operators Group (NANOG), delivered the keynote at the seventeenth regional meeting of the Caribbean Network Operators Group (CaribNOG), held from April 10 to 12 at the Hilton in Bridgetown, Barbados. McNair's keynote focused on the important role that network operator groups, or NOGs, play in building an Internet that serves the specific needs of the people in the region. more
Once you've determined that you can trust the signer of a message, as we discussed in part 3, it's easy to extrapolate that various portions of the message are equally trustworthy. For example, when there's a valid DKIM signature, we might assume that the From: header isn't spoofed. But in reality, DKIM only tells us two basic things... more
I think every client who is considering building a fiber network asks me how long the fiber will last. Their fear is having to spend the money at some future point to rebuild the network. Recently, my response has been that fiber is a hundred-year investment -- and let me explain why I say that. We're now seeing fiber built in the 1980s becoming opaque or developing enough microscopic cracks that impede the flow of light. more
This post I've been pondering on for a long time, but never found the right angle and perhaps I still haven't. Basically I have these observations, thoughts, ideas and a truckload of questions. Where to start? With the future prospects of us all. Thomas Picketty showed us the rise of inequality. He was recently joined by Robert J. Gordon who not only joins Picketty, but adds that we live in a period of stagnation, for decades already. "All great inventions lie over 40 years and more behind us", he points out. more
Are you concerned about the recent reports about government surveillance programs? Are you concerned about security and privacy online? If so, you may want to attend (in person or remotely) the INET Washington DC event happening on Wednesday, July 24, from 2:00 - 6:00 pm US Eastern time at George Washington University. Sponsored by the Internet Society and GWU's Cyber Security Policy and Research Institute, the event is free and open to the public and will also be streamed live on the Internet for those who cannot attend in person. more
A company that registers a domain name containing someone else's trademark may be engaging in the acceptable practice of "defensive registration" if (among other things) the domain name is a typographical variation of the registrant's own trademark. That's the outcome of a recent decision under the Uniform Domain Name Dispute Resolution Policy (UDRP), a case in which the domain name in dispute, idocler.com, contained the complainant's DOCLER trademark -- but also contained a typo of the respondent's DOLCER trademark. more
The Fund for Internet Research and Education - FIRE - is an initiative of AFRINIC that gives Grants and Awards to outstanding projects that use the Internet to provide innovative solutions to Africa's unique education, information, infrastructure, and communication needs. FIRE Africa is part of an initiative called The Seed Alliance that has LACNIC's FRIDA Program, APNIC's ISIF.Asia program, and the Internet Society as members. more
The Seventh Annual Internet Governance Forum (IGF) is underway now in Baku, Azerbaijan, from November 6-9, 2012. Very appropriately, it is possible to listen in to any of the sessions remotely across the Internet. Details can be found here... more
The Sunday Herald reported on Sunday that Best Western was struck by a trojan attack that lead to the possible compromise of about 8 million victims. There is some debate as to the extent of the breach and not a small amount of rumor going around. I'm not entirely disposed to trust corporate press releases for the facts, nor am I going to blindly accept claims of security researchers whose first call is to the PR team when discovering a problem. That said, here is what seems to be the agreed upon facts... more
Sponsored byVerisign
Sponsored byCSC
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byDNIB.com
Sponsored byWhoisXML API
Sponsored byRadix