29 July 2015 is a big day for .brands. It's the date when all ICANN Registry Agreements (RA) must be signed. Once the RA is signed, the fees to ICANN and your Registry Services Provider kick in. As certain as you can be that ICANN will begin sending invoices, you can also expect to receive increased scrutiny internally. Questions are inevitable. People will want answers; what is the plan for this thing? How does it fit into our long term corporate goals? Do marketing have a plan to use the TLD in the upcoming launch of our new product? more
The Internet infrastructure has been having a bad month. Not as bad as, say, the world's aviation infrastructure, but bad enough. First, Chinese Internet censorship leaked out to a few massively unlucky users of the I root server. Then China Telecom failed to filter someone who leaked thousands of hijacked routes to other people's networks through them, probably by accident. And then, inexplicably, Forbes went where no one had gone before... more
Built for the most part during the Cold War, surveillance systems on a global scale were considered a vital necessity with the onset of nuclear weapons, if only to keep Mutually Assured Destruction at bay. Today, these systems are also used for domestic surveillance and universal data harvesting, including on one's own citizens. Should we still consider these systems with the same reverence as if we were, say, in the midst of some Cuban Missile Crisis? more
My recent post on private auctions for new gTLDs under contention generated many responses from applicants. Here I follow-up with answers to the questions raised... Many, but certainly not all, applicants have a strong motivation to participate in a private auction. This incentive is especially strong for domains for which the community, geographic, and other factors are not compelling. more
On April 12, ICANN closed the TLD Application System (TAS) to ensure security of applicant data. For more than a month, the system outage has cost applicants and others millions of dollars. Here's how to make up for lost time and money. Donuts supported ICANN's decision to close TAS when it realized there was a data security risk. At a critical moment, ICANN made the right choice... However, now that staff has communicated to affected applicants (including Donuts) and is preparing to re-open the TAS system, efficiency has grown to become a crucial element of the process. more
It's highly unusual for a well-known trademark owner to be accused of cybersquatting, but that's what happened when a Mexican milk producer filed a complaint against Apple Inc. under the Uniform Domain Name Dispute Resolution Policy (UDRP) in an attempt to get the domain name lala.com. Not only did Apple win the case, but the panel issued a finding of "reverse domain name hijacking" (RDNH) against the company that filed the complaint. more
According to the Cybersecurity and Infrastructure Security Agency (CISA), most cyberattacks, including ransomware and business email compromise, begin with phishing. Although losses due to ransomware now exceed billions annually, most ransomware protection and response measures don't protect against the most common phishing attacks. Established research shows that phishing attacks most commonly occur from a maliciously registered, confusingly similar domain name, a compromised or hijacked legitimate domain name, or via email header spoofing. more
In this part I want to focus on the gathering of cyber crime data. Are there best practices in the world on how cyber crime data is reported to law enforcement and aggregated to show the impact of said crime? Previously the discussion focused on the fact that cyber crime = crime and on a basic cyber (crime) training for every police officer. From the reactions this received, it is clear that some people see this as a possible solution. more
The stakes of the U.S. communications policy debates are larger than many assume. Subjecting broadband to new and extensive regulation in the U.S., says FCC Commissioner Robert McDowell in today's Wall Street Journal, could invite a regulatory ripple effect across the globe. more
In the USA the FCC has started the discussion on the next level of telecoms in the wireless market, aimed at making spectrum in bands above 24GHz available for flexible-use of wireless services, including next-generation, or 5G networks and technologies. New technologies such as massive-MIMO are going to make it possible to deliver 'fibre-like' speeds over short distance wireless networks operating in the 24+GHz bands. This will make the technology especially useful for high-speed broadband services in densely populated areas. more
We believe that certain updates in the latest draft that limit the scope of ICANN's Mission, as specified in paragraph 188, could explicitly prevent ICANN from actively enforcing its contracts with Registries and Registrars or use contracts as a tool to implement consensus policies in the future. We suggest in our comments that revised bylaw text be added explicitly stating that the enforcement and creation of ICANN's contracts with Registries and Registrars... more
Pew Research Center conducted several polls asking people about the importance of the Internet during the pandemic. The Pew survey report is seven pages filled with interesting statistics and a recommended read. This blog covers a few of the highlights... 58% of adults said that the Internet was essential during the pandemic - that’s up from 52% in April of 2020. Another 33% of adults say the Internet was important but not essential. Only 9% of adults said the Internet wasn’t important to them. more
Out in the wilderness of cyberspace is a boundary, marking the limits of Sec. 230 immunity. On the one side roams interactive services hosting third party content immune from liability for that third party content. On the other sides is the frontier, where interactive content hosts and creators meet, merge, and become one. Here host and author blend, collaborating to give rise to new creations. more
A web-based poll on the Mobile Broadband Genie site had participants 1160 who were asked: "Is your mobile broadband fast enough?" 133 yes; 740 no; 287 don't know. Perceptions of the term "mobile broadband" appear to far exceed what is being delivered. While operators have been competing to offer cross-subsidized laptop and netbook deals with higher usage caps and ever cheaper mobile Internet deals, they seem to have overlooked the quality of the service. more
All civil society organisations and other self-identified public interest representatives in the regime of Internet governance and related areas of information and communications policy are invited to complete a survey titled Public interest representation in the information society. This survey contributes towards the development of a map of Internet governance... more
Sponsored byCSC
Sponsored byDNIB.com
Sponsored byIPv4.Global
Sponsored byRadix
Sponsored byVerisign
Sponsored byWhoisXML API
Sponsored byVerisign