In 1998 the idea of "Newco," ICANN's informal predecessor name, was dreamlike. It was so new, so unprecedented, that it was constantly being referred to as an "experiment." It was not every day that one came across an organization conceived by one nation (e.g., the U.S.), that was available for globally shared ownership. One that was defined, in large part, by international participation. more
The Anti-Spam Research Group (ASRG) published a draft for an Overview of Email DNSBL Best Practices. We can take a step back and review paragraph 2.2.5 (Conflict of Interest)... Some DNSBLs used for blocking/negative reputation have had a practice of requiring fees or donations to charities from the listee for delisting. It is generally considered entirely appropriate for a DNSBL to charge for access to it by its users -- the definition of a commercial DNSBL. more
Yochai Benkler has done a close reading of the broadband portions of both House and Senate stimulus bills. Nice work. To summarize Yochai's summary: House: $6 Billion, split between Commerce and Agriculture Depts., requires adherence to FCC's Four Internet Principles (the Martin FCC Version); Senate: $9 Billion, via Commerce Department's NTIA, requires less specific "interconnection and nondiscrimination." How much broadband can a Billion buy? more
There was a common catch cry in the early 1990s that "the Internet must be free!" Some thought this was a policy stance relating to the rejection of imposed control over content. Others took this proposition more literally as "free, like free beer!" It might sound naive today, but there was a widespread view at the time that the Internet was able to cast aside conventional economics and operate the Internet infrastructure without charging end-users at all! more
Once you head away from the areas serviced by modern terrestrial cable infrastructure, the available digital communications options are somewhat limited. Some remote areas are served using High-Frequency radio systems, using radio signals that bounce off the ionosphere to provide a long-distance but limited bandwidth service. Or there are satellite-based services based on spacecraft positioned in geostationary orbital slots. more
Uniform Domain-Name Dispute-Resolution Policy (UDRP) Rule 1 defines Reverse Domain Name Hijacking (RDNH) as "using the Policy in bad faith to attempt to deprive a registered domain name holder of a domain name"... There has been a mixed history in granting and denying this remedy for overreaching rights. Some Panels consider RDNH regardless whether it has been requested (even if respondent defaults in responding to the complaint); others will only consider the issue if requested. more
Over the last years the telecommunications market has been regulated on the basis of operating telephony services. Internet access has been added to this in recent years but it is still essentially linked to telephone line regulations. While major societal changes have been happening, since the 1980s at least, very few policy changes were made around the telecoms industry to enable it to play a key role in these changes. Key telecoms reforms in the mid- and late 1990s still refused to take a more multi-media -- or perhaps what we now call a trans-sector -- approach towards the industry. more
Parks Associates recently announced its Home Services Dashboard release, a for-pay service that tracks consumer adoption of telecom services like Internet, pay-TV, and cellphones. As part of the announcement, the company released a blog that shows that at the end of the first quarter of 2021 that 41% of US homes are buying standalone broadband - meaning broadband that's not bundled with cable TV or a home telephone. more
Resource certification verifies that an Internet number resource (IP address space or autnonomous system number) has legitimately been allocated by a Regional Internet Registry. It will also benefit every network operator and Internet user in the world by helping to ensure long-term routing stability. more
"Nobody knows anything," screenwriter William Goldman (think "Butch Cassidy and the Sundance Kid" and "The Princess Bride") said famously of Hollywood. The same may be said of enterprise security. Word now comes that the Sony hack for which the FBI has fingered North Korea may, in fact, be the work of some laid-off and disgruntled Sony staff. But that's not clear, either. more
Tech is commoditizing. I've talked about this before; I think networking is commoditizing at the device level, and the days of appliance-based networking are behind us. But are networks themselves a commodity? Not any more than any other system. We are running out of useful features, so vendors are losing feature differentiation. This one is going to take a little longer... more
There are new threats that you may have already been exposed to. Here are some of the new threats and advice on how to protect yourself. During this pandemic, Zoom has emerged as a very popular teleconferencing choice for companies and educational institutions, but a new weakness for Zoom was also discovered. Some online conferences and classes that had not password protected their sessions fell victim to eavesdroppers using the screen sharing feature to "Zoom Bomb" those sessions with graphic images. more
As the saying goes, it's not over until it's over. So, it wasn't surprising that Trump's minions just got one last 5G minefield out the door. On 15 January, his followers at Dept. of Commerce's NTIA published the "National Strategy to Secure 5G Implementation Plan". The 40-page document consists of a fairly standard Washington policy playbook of 18 activities with six annexes that "details how the United States along with like-minded countries will lead global development, deployment, and... more
I became interested in the global management of the Domain Name System (DNS) in 1991, soon after helping to create commercial Internet Service Providers (ISPs) in Sweden. We moved the Internet Exchange Point (IX) from Academia to the private sector and similarly the management of the SE country code top-level domain. The exercise was fascinating and it really tweaked my interest in the DNS and Internet Protocol (IP) addresses. more
Word has leaked out that Apple is working on a satellite project. The company is at the beginning of the research project, so there is no way to know exactly what they have in mind. For example, is the company considering launching satellites, or would they lease capacity from one of the other planned satellite networks? The fact that Apple is working on the concept is a good segue to discuss the many ways that satellite connectivity could be useful to Apple or other companies. more
Sponsored byRadix
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byCSC
Sponsored byIPv4.Global