Most engineers focus on purely technical mechanisms for defending against various kinds of cyber attacks, including "the old magic bullet," the firewall. The game of cannons and walls is over, however, and the cannons have won; those who depend on walls are in for a shocking future. What is the proper response, then? What defenses are there The reality is that just like in physical warfare, the defenses will take some time to develop and articulate. more
Last Friday, following three weeks of dazzling diplomacy, the International Telecommunication Union's (ITU) 2014 Plenipotentiary Conference came to a conclusion in Busan, South Korea. For those unfamiliar with the event, the "Plenipot" is the ITU's most significant gathering... At the Plenipot, ITU members elect new office-bearers, set general policies and determine the Union's strategic plans and activities for the next four years. It is this last part that is of most interest to stakeholders in the Internet community... more
Next Monday the WSIS+10 Second Informal Interactive Consultations will take place at the UN Headquarters in New York. Much of the discussions will focus on what is called the "zero draft", which is the draft outcome document of the overall ten-year Review of the World Summit on the Information Society (WSIS). As it stands, the text is an effort from the negotiators to collect multiple perspectives, reconcile differences and hopefully make progress towards consensus before the UN General Assembly High-Level Meeting in December. more
How many domain names can be included in a single complaint under the Uniform Domain Name Dispute Resolution Policy (UDRP)? Neither the UDRP policy nor its corresponding rules directly address this issue, although the rules state that a "complaint may relate to more than one domain name, provided that the domain names are registered by the same domain-name holder." more
I recently followed a webinar session organized by the University of Queensland on the factory of the future. Smart or not, the future will still need factories to make the stuff we humans use every day. One of the discussed questions included: "how will existing production models cope with the staggering and ongoing rate of digital disruption and advanced capabilities?" more
The smartphone has effectively transformed us into cyborgs, we have in our hands a highly efficient computing device equipped with a photo and video camera, microphone, GPS, accelerometer, gyroscope, magnetometer, light and proximity sensors, as well as other features that allow creation of increasingly useful, impressive and addictive applications. more
A typical proceeding under the Uniform Domain Name Dispute Resolution Policy (UDRP) consists of a complaint and, sometimes, a response. UDRP Rule 12 makes clear that "further statements or documents from either of the Parties" are appropriate only if "the Panel... request[s], in its sole discretion." In practice, however, such supplemental or additional filings are not uncommon, with the leading UDRP service providers - WIPO and the Forum - issuing guidance about when they may be appropriate. more
The UK's broadband market is one of the most competitive in Europe. The DSL network effectively covers the entire country, while the network of the dominant cable provider Virgin Media covers more than half of all households (about 12.6 million homes). Beginning in 2007, Virgin Media expanded the availability of its services not by increasing the footprint of its cable network but by utilising wholesale LLU services... more
Nationally Appropriate Mitigation Action (NAMA) is a new policy program that was developed at the Bali United Nations Climate Change Conference. As opposed to the much maligned programs like CDM and other initiatives NAMA refers to a set of policies and actions that developed and developing countries undertake as part of a commitment to reduce greenhouse gas emissions. Also unlike CDM, NAMA recipients are not restricted to developing countries. more
Privacy problems are an area of wide concern for individual users of the Internet -- but what about network operators? Geoff Huston wrote an article earlier this year concerning privacy in DNS and the various attempts to make DNS private on the part of the IETF -- the result can be summarized with this long, but entertaining, quote. more
Two factor authentication that uses an uncopyable physical device (such as a cellphone or a security token) as a second factor mitigates most of these threats very effectively. Weaker two factor authentication using digital certificates is a little easier to misuse (as the user can share the certificate with others, or have it copied without them noticing) but still a lot better than a password. Security problems solved, then? more
In the fall of 1998, I was present at the first meeting of the ICANN Board which was then made up of very senior, prominent parties from a broad spectrum of sources. Much to her credit, Esther Dyson accepted the position as the first Chair of the ICANN Board for the newly birthed organization. I was in attendance in support of the nomination of Michael Roberts as the first ICANN CEO. It was a time of uncertainty. more
Here in the United States, we recently celebrated Thanksgiving and with that, we now enter the last weeks of 2018. I've spent much of this past year involved in ICANN's Expedited Policy Development Process (EPDP) for gTLD Registration Data and I'm happy to say our group has reached a historic milestone. Just last week, the group published its initial report for public comment. more
Parties to a UDRP proceeding must include a certification similar in U.S. practice to Rule 11 of the Federal Rules of Civil Procedure (and undoubtedly a feature in procedural codes in other judicial jurisdictions) "that the information contained in this [Complaint or Response] is to the best of [Complainant's or Respondent's] knowledge complete and accurate, that this [Complaint or Response] is not being presented for any improper purpose, such as to harass... more
The global telecoms industry numbers remain impressive: By 2020 there will be 6 billion mobile subscribers -- of which, according to Nokia, 95% will have access to wireless broadband by 2015, and by 2020, there will also be 3 billion fixed broadband subscribers. However the relevance of these numbers will decline. By 2020 there will be 50 billion fixed and mobile connections. more
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byWhoisXML API
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byCSC
Sponsored byRadix