Three Caribbean candidates -- Peter Harrison, Kerrie-Ann Richards and Alicia Trotman -- have been named among the final candidates to contest elections for leadership roles at the American Registry for Internet Numbers (ARIN) in October. ARIN is one of five Internet registries worldwide that coordinate the distribution and administration of number resources. The registry serves the United States, Canada and several territories in the Caribbean. more
Hyderabad set a new record in terms of attendance with a total of 3,141 participants registered and 1,400 attendees identified as 'locals' from the region. It was also, theoretically at least, one of the longest ICANN meetings with seven days baked into the schedule. Unfortunately, the development of the schedule itself was the source of much community criticism throughout the meeting, resulting in a chunk of time devoted to the topic during the second Public Forum. more
The race for digital authoritarianism between China and the US is now exceedingly stark. It is a race with enormous implications for the management of humankind, (yes I said it) and the respected doctrines of our human rights and freedoms. Everything we care about today as freedom-loving citizens will be transformed by AI, from access to healthcare to economic status and, more importantly, your ability to serve. more
Yochai Benkler has done a close reading of the broadband portions of both House and Senate stimulus bills. Nice work. To summarize Yochai's summary: House: $6 Billion, split between Commerce and Agriculture Depts., requires adherence to FCC's Four Internet Principles (the Martin FCC Version); Senate: $9 Billion, via Commerce Department's NTIA, requires less specific "interconnection and nondiscrimination." How much broadband can a Billion buy? more
Everyone knows the $100B/year U.S. security apparatus taps almost the entire Internet. Friendly governments help from Australia to Canada to France. Companies like AT&T, Ericsson, Verizon, and Nokia obviously cooperate. The NSA assumes that China is attempting to do the same and that Huawei, as a Chinese company, will provide assistance. The evidence suggests otherwise. Huawei is the primary opponent of U.S. security. more
DNS Operations, Analysis, and Research Center (DNS-OARC) held its 30th meeting in Bangkok on the 12th and 13th May. Here's what attracted my interest from two full days of DNS presentations and conversations, together with a summary of the other material that was presented at this workshop. Some Bad News for DANE (and DNSSEC): For many years the Domain Name X509 certification system, or WebPKI, has been the weak point of Internet security... more
I recently talked about the top trends of 2012. Well, now it's time for me to look into my crystal ball and predict the future. I believe that this year we'll see great developments when it comes to TR-069. I know you'll say that this was a trend last year, but I'm confident that 2013 is the year that this protocol will really shine. more
Resource certification verifies that an Internet number resource (IP address space or autnonomous system number) has legitimately been allocated by a Regional Internet Registry. It will also benefit every network operator and Internet user in the world by helping to ensure long-term routing stability. more
Despite its absolute success in providing competition to the telecoms market, infrastructure-based competition in the mobile market is now also reaching its final stages. We have been predicting this for some time; we did so in order to highlight the need to change to different business models in the industry -- models with more emphasis on infrastructure-sharing and competition based on new innovative services rather than on utility offerings... more
In the second of three posts about how brand owners can protect their trademarks from misuse, I will focus on two concepts: the role of "use" and registration in protecting your brand, and domain names -- specifically acquisition and protection. Internet domain names have emerged as a major battleground for brand promotion and protection. While it is easier than ever to register and promote your name on the internet, it is also easier for others to trade on another brand's equity. more
Do consumers still get confused when they see a URL without a .com (or other traditional extension)? Probably -- but I don't think anyone really knows the answer to that from a global perspective. What I do know, however, is that it's important for those of us in the new TLD industry to help our brand customers ensure that we're providing audiences with the best possible chance to identify new domains as legitimate web addresses. more
Matt Serlin is the former Chair of the ICANN Registrar's Constituency and is currently a member of the Expedited Policy Development Process (EPDP) team on the Temporary Specification for gTLD Registration Data. For the past several months, Matt has met at least 2 times each week with members of EPDP team. As a reminder, the EPDP team is comprised of 31 individuals representing various groups within the ICANN community... more
There are new threats that you may have already been exposed to. Here are some of the new threats and advice on how to protect yourself. During this pandemic, Zoom has emerged as a very popular teleconferencing choice for companies and educational institutions, but a new weakness for Zoom was also discovered. Some online conferences and classes that had not password protected their sessions fell victim to eavesdroppers using the screen sharing feature to "Zoom Bomb" those sessions with graphic images. more
The Anti-Spam Research Group (ASRG) published a draft for an Overview of Email DNSBL Best Practices. We can take a step back and review paragraph 2.2.5 (Conflict of Interest)... Some DNSBLs used for blocking/negative reputation have had a practice of requiring fees or donations to charities from the listee for delisting. It is generally considered entirely appropriate for a DNSBL to charge for access to it by its users -- the definition of a commercial DNSBL. more
As the saying goes, it's not over until it's over. So, it wasn't surprising that Trump's minions just got one last 5G minefield out the door. On 15 January, his followers at Dept. of Commerce's NTIA published the "National Strategy to Secure 5G Implementation Plan". The 40-page document consists of a fairly standard Washington policy playbook of 18 activities with six annexes that "details how the United States along with like-minded countries will lead global development, deployment, and... more
Sponsored byRadix
Sponsored byVerisign
Sponsored byCSC
Sponsored byVerisign
Sponsored byWhoisXML API
Sponsored byIPv4.Global
Sponsored byDNIB.com