Hyderabad set a new record in terms of attendance with a total of 3,141 participants registered and 1,400 attendees identified as 'locals' from the region. It was also, theoretically at least, one of the longest ICANN meetings with seven days baked into the schedule. Unfortunately, the development of the schedule itself was the source of much community criticism throughout the meeting, resulting in a chunk of time devoted to the topic during the second Public Forum. more
In the second of three posts about how brand owners can protect their trademarks from misuse, I will focus on two concepts: the role of "use" and registration in protecting your brand, and domain names -- specifically acquisition and protection. Internet domain names have emerged as a major battleground for brand promotion and protection. While it is easier than ever to register and promote your name on the internet, it is also easier for others to trade on another brand's equity. more
With the publication of the Australian Governmental report on Digital Platforms1and in the light of the ongoing work on the EU's Digital Services Act, the spotlight of policymaking is on platforms such as Google, Facebook and Amazon. It is natural that members of the ICANN community want to discuss the role of platforms within the ICANN framework, but sadly and predictably, the usual bylaws jockeys and keepers of the true ICANN faith were quick to stifle the conversation. more
With all of the current turbulence in the American society, it is no wonder that its telecommunications market is also under severe pressure. In his election campaign, Trump promised his American supporters to make changes to what he called the Washington swamp, but it has become clear that the opposite is happening. While in previous Administrations lobbyists were at least somewhat separated from the politicians, now many of these lobbyists are actually part of the Trump Administration. more
A favorite Sherlock Holmes story has the detective unraveling the mystery of a murdered horse trainer and the theft of a prized thoroughbred by concentrating on the fact that a dog didn't bark in the night when the horse was stolen. This silence implied for Holmes that it was no stranger who entered the stall. From this he deduced that it was the trainer himself who had removed the horse to fix a race for his profit and that the horse had killed the trainer when he tried to cripple it. ICANN 41 has been afflicted by a similarly curious silence. more
The Anti-Spam Research Group (ASRG) published a draft for an Overview of Email DNSBL Best Practices. We can take a step back and review paragraph 2.2.5 (Conflict of Interest)... Some DNSBLs used for blocking/negative reputation have had a practice of requiring fees or donations to charities from the listee for delisting. It is generally considered entirely appropriate for a DNSBL to charge for access to it by its users -- the definition of a commercial DNSBL. more
There are new threats that you may have already been exposed to. Here are some of the new threats and advice on how to protect yourself. During this pandemic, Zoom has emerged as a very popular teleconferencing choice for companies and educational institutions, but a new weakness for Zoom was also discovered. Some online conferences and classes that had not password protected their sessions fell victim to eavesdroppers using the screen sharing feature to "Zoom Bomb" those sessions with graphic images. more
As Internet connection continues on a steady path of becoming a ubiquitous commodity in mature markets, we saw an eruption of big data tracking and analysis software in 2014. But what are operators going to do with all this new information? And how can they turn data into revenue? To start with, providers need more than just a data measurement tool. They need a solution that can analyze real-time data and then automate processes to optimize their networks and improve their subscribers' experiences. more
DNS Operations, Analysis, and Research Center (DNS-OARC) held its 30th meeting in Bangkok on the 12th and 13th May. Here's what attracted my interest from two full days of DNS presentations and conversations, together with a summary of the other material that was presented at this workshop. Some Bad News for DANE (and DNSSEC): For many years the Domain Name X509 certification system, or WebPKI, has been the weak point of Internet security... more
Matt Serlin is the former Chair of the ICANN Registrar's Constituency and is currently a member of the Expedited Policy Development Process (EPDP) team on the Temporary Specification for gTLD Registration Data. For the past several months, Matt has met at least 2 times each week with members of EPDP team. As a reminder, the EPDP team is comprised of 31 individuals representing various groups within the ICANN community... more
Over the last years the telecommunications market has been regulated on the basis of operating telephony services. Internet access has been added to this in recent years but it is still essentially linked to telephone line regulations. While major societal changes have been happening, since the 1980s at least, very few policy changes were made around the telecoms industry to enable it to play a key role in these changes. Key telecoms reforms in the mid- and late 1990s still refused to take a more multi-media -- or perhaps what we now call a trans-sector -- approach towards the industry. more
Website publishers that want to protect themselves against claims of copyright infringement must participate in a new online registration system created by the U.S. Copyright Office for the Digital Millennium Copyright Act ("DMCA") -- even if they have participated previously. The new program, launched on December 1, 2016, offers a mandatory online registration system for the DMCA that replaces the original (and clunky) "interim" designation system, which was created in 1998. more
As the saying goes, it's not over until it's over. So, it wasn't surprising that Trump's minions just got one last 5G minefield out the door. On 15 January, his followers at Dept. of Commerce's NTIA published the "National Strategy to Secure 5G Implementation Plan". The 40-page document consists of a fairly standard Washington policy playbook of 18 activities with six annexes that "details how the United States along with like-minded countries will lead global development, deployment, and... more
It has been quite a rollercoaster the past couple of weeks with the new gTLD application period ending on April 12th coupled with the suspension of the TLD Application System (TAS) due to a technical glitch. With over 1,200 applicants for new gTLDs confirmed by ICANN in the system, and the possibility of thousands of new gTLD applications to be published on "reveal day" brand owners have been holding their breath on the status of their applications. more
There was a common catch cry in the early 1990s that "the Internet must be free!" Some thought this was a policy stance relating to the rejection of imposed control over content. Others took this proposition more literally as "free, like free beer!" It might sound naive today, but there was a widespread view at the time that the Internet was able to cast aside conventional economics and operate the Internet infrastructure without charging end-users at all! more
Sponsored byVerisign
Sponsored byCSC
Sponsored byWhoisXML API
Sponsored byDNIB.com
Sponsored byIPv4.Global
Sponsored byRadix
Sponsored byVerisign