The Internet infrastructure has been having a bad month. Not as bad as, say, the world's aviation infrastructure, but bad enough. First, Chinese Internet censorship leaked out to a few massively unlucky users of the I root server. Then China Telecom failed to filter someone who leaked thousands of hijacked routes to other people's networks through them, probably by accident. And then, inexplicably, Forbes went where no one had gone before... more
We've just published the 2023 edition of the DOTZON study "Digital City Brands." After introducing the study in early 2017, DOTZON has mapped how successful cities are using their Digital City Brands for the seventh year in a row. The Digital City Brand is the digital dimension of the City Brand and mirrors the "Digitalness" of a city. The advent of the Internet was why Digital City Brands came into being in the first place. more
One existing resource that is often overlooked in designing wireless networks is AM radio towers. For the most part, companies deploying fixed wireless and microwave antenna have avoided these towers. This is due to the nature of AM radio, which transmits at such a low frequency that the entire tower is effectively used as the transmitting antenna. The entire tower is energized with the AM signal, and the typical AM tower sits on a base insulator that blocks the tower from being grounded. more
Last week the government of the United States made an announcement that sent shockwaves through the Internet governance world. The National Telecommunications & Information Administration (NTIA), a division of the Department of Commerce, publicly stated that it will not be renewing its contract with the Internet Assigned Numbers Authority (IANA) past its September 2015 expiry date. The importance of this announcement cannot be underestimated. more
My recent post on private auctions for new gTLDs under contention generated many responses from applicants. Here I follow-up with answers to the questions raised... Many, but certainly not all, applicants have a strong motivation to participate in a private auction. This incentive is especially strong for domains for which the community, geographic, and other factors are not compelling. more
Many previous pieces of research have focused on the desirability of a comprehensive scoring system, to be used for ranking results identified as part of a brand-protection solution, according to their potential level of threat. Such scoring systems offer the capability for identifying prioritised targets for further analysis, content tracking or enforcement actions. more
For many years I have been saying that in order to generate business cases that will support the developments of national broadband networks it is necessary to take into account the social and economic benefits of such investments. The reality is that these benefits do not show up on the balance sheets of the traditional telecoms infrastructure companies and this is a key reason they are reluctant to make such investments. more
The stakes of the U.S. communications policy debates are larger than many assume. Subjecting broadband to new and extensive regulation in the U.S., says FCC Commissioner Robert McDowell in today's Wall Street Journal, could invite a regulatory ripple effect across the globe. more
Uniform Domain-Name Dispute-Resolution Policy (UDRP) Rule 1 defines Reverse Domain Name Hijacking (RDNH) as "using the Policy in bad faith to attempt to deprive a registered domain name holder of a domain name"... There has been a mixed history in granting and denying this remedy for overreaching rights. Some Panels consider RDNH regardless whether it has been requested (even if respondent defaults in responding to the complaint); others will only consider the issue if requested. more
The Uniform Domain Name Dispute Resolution Policy (UDRP) has never required that a complainant own any trademark registrations to succeed in a domain name dispute, given that common law trademark rights (if properly established) are sufficient. But, as a pair of recent UDRP decisions reminds us, even some registrations are inadequate. The issue relates to the first element of every UDRP complaint, which requires the party seeking relief to prove that the "domain name is identical or confusingly similar to a trademark... more
In the USA the FCC has started the discussion on the next level of telecoms in the wireless market, aimed at making spectrum in bands above 24GHz available for flexible-use of wireless services, including next-generation, or 5G networks and technologies. New technologies such as massive-MIMO are going to make it possible to deliver 'fibre-like' speeds over short distance wireless networks operating in the 24+GHz bands. This will make the technology especially useful for high-speed broadband services in densely populated areas. more
The EU has once again turned its attention to domain name registration data (WHOIS) -- this time reinforcing requirements to collect, maintain, verify, and disclose WHOIS for IP enforcement purposes through its "Commission Recommendation" on measures to combat counterfeiting and enhance the enforcement of IP Rights. Published last month, this regulatory action demonstrates the EU's commitment to restore WHOIS despite... more
Built for the most part during the Cold War, surveillance systems on a global scale were considered a vital necessity with the onset of nuclear weapons, if only to keep Mutually Assured Destruction at bay. Today, these systems are also used for domestic surveillance and universal data harvesting, including on one's own citizens. Should we still consider these systems with the same reverence as if we were, say, in the midst of some Cuban Missile Crisis? more
On April 12, ICANN closed the TLD Application System (TAS) to ensure security of applicant data. For more than a month, the system outage has cost applicants and others millions of dollars. Here's how to make up for lost time and money. Donuts supported ICANN's decision to close TAS when it realized there was a data security risk. At a critical moment, ICANN made the right choice... However, now that staff has communicated to affected applicants (including Donuts) and is preparing to re-open the TAS system, efficiency has grown to become a crucial element of the process. more
According to the Cybersecurity and Infrastructure Security Agency (CISA), most cyberattacks, including ransomware and business email compromise, begin with phishing. Although losses due to ransomware now exceed billions annually, most ransomware protection and response measures don't protect against the most common phishing attacks. Established research shows that phishing attacks most commonly occur from a maliciously registered, confusingly similar domain name, a compromised or hijacked legitimate domain name, or via email header spoofing. more
Sponsored byRadix
Sponsored byIPv4.Global
Sponsored byWhoisXML API
Sponsored byDNIB.com
Sponsored byCSC
Sponsored byVerisign
Sponsored byVerisign