The Anti-Spam Research Group (ASRG) published a draft for an Overview of Email DNSBL Best Practices. We can take a step back and review paragraph 2.2.5 (Conflict of Interest)... Some DNSBLs used for blocking/negative reputation have had a practice of requiring fees or donations to charities from the listee for delisting. It is generally considered entirely appropriate for a DNSBL to charge for access to it by its users -- the definition of a commercial DNSBL. more
Yochai Benkler has done a close reading of the broadband portions of both House and Senate stimulus bills. Nice work. To summarize Yochai's summary: House: $6 Billion, split between Commerce and Agriculture Depts., requires adherence to FCC's Four Internet Principles (the Martin FCC Version); Senate: $9 Billion, via Commerce Department's NTIA, requires less specific "interconnection and nondiscrimination." How much broadband can a Billion buy? more
Uniform Domain-Name Dispute-Resolution Policy (UDRP) Rule 1 defines Reverse Domain Name Hijacking (RDNH) as "using the Policy in bad faith to attempt to deprive a registered domain name holder of a domain name"... There has been a mixed history in granting and denying this remedy for overreaching rights. Some Panels consider RDNH regardless whether it has been requested (even if respondent defaults in responding to the complaint); others will only consider the issue if requested. more
There was a common catch cry in the early 1990s that "the Internet must be free!" Some thought this was a policy stance relating to the rejection of imposed control over content. Others took this proposition more literally as "free, like free beer!" It might sound naive today, but there was a widespread view at the time that the Internet was able to cast aside conventional economics and operate the Internet infrastructure without charging end-users at all! more
Resource certification verifies that an Internet number resource (IP address space or autnonomous system number) has legitimately been allocated by a Regional Internet Registry. It will also benefit every network operator and Internet user in the world by helping to ensure long-term routing stability. more
"Nobody knows anything," screenwriter William Goldman (think "Butch Cassidy and the Sundance Kid" and "The Princess Bride") said famously of Hollywood. The same may be said of enterprise security. Word now comes that the Sony hack for which the FBI has fingered North Korea may, in fact, be the work of some laid-off and disgruntled Sony staff. But that's not clear, either. more
Over the last years the telecommunications market has been regulated on the basis of operating telephony services. Internet access has been added to this in recent years but it is still essentially linked to telephone line regulations. While major societal changes have been happening, since the 1980s at least, very few policy changes were made around the telecoms industry to enable it to play a key role in these changes. Key telecoms reforms in the mid- and late 1990s still refused to take a more multi-media -- or perhaps what we now call a trans-sector -- approach towards the industry. more
Once you head away from the areas serviced by modern terrestrial cable infrastructure, the available digital communications options are somewhat limited. Some remote areas are served using High-Frequency radio systems, using radio signals that bounce off the ionosphere to provide a long-distance but limited bandwidth service. Or there are satellite-based services based on spacecraft positioned in geostationary orbital slots. more
As the saying goes, it's not over until it's over. So, it wasn't surprising that Trump's minions just got one last 5G minefield out the door. On 15 January, his followers at Dept. of Commerce's NTIA published the "National Strategy to Secure 5G Implementation Plan". The 40-page document consists of a fairly standard Washington policy playbook of 18 activities with six annexes that "details how the United States along with like-minded countries will lead global development, deployment, and... more
In an earlier article on CircleID, Registry Data Quality Assessment, we discussed the importance of high quality and accurate IP registry data. At that time, we focused mainly on the accuracy of legacy address space: IP addresses that were given out prior to the existence of the RIPE NCC and that are not part of the current registry system. In this article, we want to present the efforts to keep the address space that is the responsibility of the RIPE NCC up to date and well maintained. more
Telecom operators are challenging OTT platforms by deploying Rich Communication Services. This reversal of roles prompts fresh regulatory scrutiny, revives the case for network neutrality, and demands a risk-based approach to preserving digital competition. more
Parks Associates recently announced its Home Services Dashboard release, a for-pay service that tracks consumer adoption of telecom services like Internet, pay-TV, and cellphones. As part of the announcement, the company released a blog that shows that at the end of the first quarter of 2021 that 41% of US homes are buying standalone broadband - meaning broadband that's not bundled with cable TV or a home telephone. more
There are new threats that you may have already been exposed to. Here are some of the new threats and advice on how to protect yourself. During this pandemic, Zoom has emerged as a very popular teleconferencing choice for companies and educational institutions, but a new weakness for Zoom was also discovered. Some online conferences and classes that had not password protected their sessions fell victim to eavesdroppers using the screen sharing feature to "Zoom Bomb" those sessions with graphic images. more
Tech is commoditizing. I've talked about this before; I think networking is commoditizing at the device level, and the days of appliance-based networking are behind us. But are networks themselves a commodity? Not any more than any other system. We are running out of useful features, so vendors are losing feature differentiation. This one is going to take a little longer... more
I became interested in the global management of the Domain Name System (DNS) in 1991, soon after helping to create commercial Internet Service Providers (ISPs) in Sweden. We moved the Internet Exchange Point (IX) from Academia to the private sector and similarly the management of the SE country code top-level domain. The exercise was fascinating and it really tweaked my interest in the DNS and Internet Protocol (IP) addresses. more
Sponsored byCSC
Sponsored byVerisign
Sponsored byVerisign
Sponsored byRadix
Sponsored byDNIB.com
Sponsored byIPv4.Global
Sponsored byWhoisXML API