Never let it be said that group therapy isn't effective. Prior to hosting a new Top-Level Domain (TLD) workshop for a group of Australian applicants last week, the only therapy I would have advised for new TLD applicants was electroshock therapy - given the confidence-sapping delays and the catastrophic impact of constant changes to the program such as Digital Archery, Name Collisions and GAC Advice. more
In the second of three posts about how brand owners can protect their trademarks from misuse, I will focus on two concepts: the role of "use" and registration in protecting your brand, and domain names -- specifically acquisition and protection. Internet domain names have emerged as a major battleground for brand promotion and protection. While it is easier than ever to register and promote your name on the internet, it is also easier for others to trade on another brand's equity. more
In an earlier post, I asked whether electronically steered antennas (ESAs) would replace parabolic antennas in satellite ground stations. I did some research and concluded that it is likely that they will. Next, I discussed the same question with ChatGPT and, while it made several false statements, it made a relevant point that I had overlooked. The relevant addition was positive, but the errors were troublesome, so I decided to try ChatGPT's competitor Google Bard. more
DNSSEC promised to secure DNS with cryptographic proof, yet messy rollouts, outages, and hype backlash ruined its reputation. This piece argues that storytelling and emotions shape adoption as much as specs, and that automation enables a reset. more
Despite its absolute success in providing competition to the telecoms market, infrastructure-based competition in the mobile market is now also reaching its final stages. We have been predicting this for some time; we did so in order to highlight the need to change to different business models in the industry -- models with more emphasis on infrastructure-sharing and competition based on new innovative services rather than on utility offerings... more
Resource certification verifies that an Internet number resource (IP address space or autnonomous system number) has legitimately been allocated by a Regional Internet Registry. It will also benefit every network operator and Internet user in the world by helping to ensure long-term routing stability. more
Yochai Benkler has done a close reading of the broadband portions of both House and Senate stimulus bills. Nice work. To summarize Yochai's summary: House: $6 Billion, split between Commerce and Agriculture Depts., requires adherence to FCC's Four Internet Principles (the Martin FCC Version); Senate: $9 Billion, via Commerce Department's NTIA, requires less specific "interconnection and nondiscrimination." How much broadband can a Billion buy? more
Matt Serlin is the former Chair of the ICANN Registrar's Constituency and is currently a member of the Expedited Policy Development Process (EPDP) team on the Temporary Specification for gTLD Registration Data. For the past several months, Matt has met at least 2 times each week with members of EPDP team. As a reminder, the EPDP team is comprised of 31 individuals representing various groups within the ICANN community... more
In 1998 the idea of "Newco," ICANN's informal predecessor name, was dreamlike. It was so new, so unprecedented, that it was constantly being referred to as an "experiment." It was not every day that one came across an organization conceived by one nation (e.g., the U.S.), that was available for globally shared ownership. One that was defined, in large part, by international participation. more
Although rarely used, the usTLD Rapid Suspension Dispute Policy (usRS) allows a trademark owner to seek the suspension of a domain name in the .us country-code top-level domain (ccTLD). The usRS has many things in common with the Uniform Rapid Suspension System (URS), which applies to domain names in the new generic top-level domains (gTLD). more
In an earlier article on CircleID, Registry Data Quality Assessment, we discussed the importance of high quality and accurate IP registry data. At that time, we focused mainly on the accuracy of legacy address space: IP addresses that were given out prior to the existence of the RIPE NCC and that are not part of the current registry system. In this article, we want to present the efforts to keep the address space that is the responsibility of the RIPE NCC up to date and well maintained. more
The Anti-Spam Research Group (ASRG) published a draft for an Overview of Email DNSBL Best Practices. We can take a step back and review paragraph 2.2.5 (Conflict of Interest)... Some DNSBLs used for blocking/negative reputation have had a practice of requiring fees or donations to charities from the listee for delisting. It is generally considered entirely appropriate for a DNSBL to charge for access to it by its users -- the definition of a commercial DNSBL. more
Over the last years the telecommunications market has been regulated on the basis of operating telephony services. Internet access has been added to this in recent years but it is still essentially linked to telephone line regulations. While major societal changes have been happening, since the 1980s at least, very few policy changes were made around the telecoms industry to enable it to play a key role in these changes. Key telecoms reforms in the mid- and late 1990s still refused to take a more multi-media -- or perhaps what we now call a trans-sector -- approach towards the industry. more
There was a common catch cry in the early 1990s that "the Internet must be free!" Some thought this was a policy stance relating to the rejection of imposed control over content. Others took this proposition more literally as "free, like free beer!" It might sound naive today, but there was a widespread view at the time that the Internet was able to cast aside conventional economics and operate the Internet infrastructure without charging end-users at all! more
There are new threats that you may have already been exposed to. Here are some of the new threats and advice on how to protect yourself. During this pandemic, Zoom has emerged as a very popular teleconferencing choice for companies and educational institutions, but a new weakness for Zoom was also discovered. Some online conferences and classes that had not password protected their sessions fell victim to eavesdroppers using the screen sharing feature to "Zoom Bomb" those sessions with graphic images. more
Sponsored byDNIB.com
Sponsored byWhoisXML API
Sponsored byCSC
Sponsored byIPv4.Global
Sponsored byRadix
Sponsored byVerisign
Sponsored byVerisign