Reports of the cancelation of the ICANN 52 meeting in the Moroccan town of Marrakesh appear to be exaggerated. They did, however, force the organization to issue a statement on Sunday confirming that while "no decision had been taken yet" ICANN was considering postponing the meeting in Marrakech scheduled for 8-12 February, 2015. This would a mistake, in our opinion... more
The nonprofit Alliance for Safe Online Pharmacies (ASOP Global) presented its annual Internet Pharmacy Safety E-Commerce Leadership Award to .DK Hostmaster at the 2018 ICANN63 today in Barcelona, Spain. The domain name administrator for Denmark, DK Hostmaster, was selected for the award based on their commitment to ensuring citizen safety by maintaining transparent WHOIS data, proactively enforcing identity accuracy policies to increase consumer trust and safety online. more
A few weeks, I attended a one-day conference at the Queensland University of Technology (QUT) at the occasion of the launch of their new $7.5 million Centre for Data Science. This laboratory is also the lead node of a new Australian Data Science Network, bringing together data science organizations from across the country. The new center aims to support data-led decisions across key areas like health, environment, business, government and society -- in short, data for the good. more
DataPrivacyBR and the Internet Integrity Task Force, IITF, in collaboration with CircleID and IGF recently held 2 online events focusing on digital citizenship, governance, and a digital bill of rights and responsibilities. A diverse group of high-level presenters and speakers spanning all stakeholder groups, addressed questions such as: What are the foundational principles that define and protect the rights and responsibilities of digital citizenship? Do existing internet governance models take digital rights sufficiently into account? Are there alternatives to business models that are based on digital exploitation and servitude? Why do we need a digital Bill of Rights and Responsibilities and how can it be created? more
Anti-spam and malware enforcement agency ACMA reports on this (shocking high?) figure. Keep this up and ca. 50% of the Australian population is infected within a year. I remember a presentation from Sweden only a few years ago, that there were only a little over a thousand infected pc's in Sweden. (Reactions were: that can't be correct. Too low) Do you know what the numbers are for your country and maybe more importantly what your government and/or Industry is/are doing about it? more
The public is taking an increasing interest in ensuring that IT assets of federal agencies are protected from cybersecurity attacks. FISMA is addressing this concern, in part, by initiating a standard setting process for continuous monitoring. The actions taken by NIST for the federal sector could have a very significant impact on the private sector because pending legislation would provide the federal government with the authority to mandate cybesecurity measures on the private sector. more
In recent months the Internet has been buzzing about the prospect of a United Nations "takeover" of the Internet, including responsibility for governance of the domain name system. The concern hit a fever pitch late last month when the U.S. Congress held hearings on the issue. A steady stream of technology companies and consumer groups expressed fears with potential U.N. and foreign government involvement and members of Congress pledged to take a strong stand against the takeover. more
This article on cloud appeared in the Economist.com on April 12th 2001 titled "The Beast of Complexities" Stuart Feldman of IBM, mentions these examples. Quote 'Picture yourself as the product manager of a new hand-held computer whose design team has just sent him the electronic blueprint for the device. You go to your personalized web portal and order the components, book manufacturing capacity and arrange for distribution. With the click of a mouse, you create an instant supply chain that, once the job is done, will dissolve again." unquote. ...In the same article he also lamented that so far, nobody has found a silver bullet to kill the Beast of Complexity. more
We recently analyzed the reputation of a country's Internet (IPv4) addresses by examining the number of blacklisted IPv4 addresses that geolocate to a given country. We compared this indicator with two qualitative measures of each country's governance. We hypothesized that countries with more transparent, democratic governmental institutions would harbor a smaller fraction of misbehaving (blacklisted) hosts. The available data confirms this hypothesis. A similar correlation exists between perceived corruption and fraction of blacklisted IP addresses. more
I was pointed to an article in the Armed Forces Journal where Col Charles W. Williamson III argues that the US Air Force needs to develop a BOTnet army as part of the US military capability for retaliatory strikes. The article brings up some interesting issues, the one that I believe carries the most weight is the argument that we (well, people living on the Internet) are seeing an arms race. It is true that more and more nations are looking into or developing various forms of offensive weapons systems for the use on the Internet... more
In a court case running since 2007 Australia's High Court judged Google not responsible for the content of paid ads it presented after an end user's search request. In the example Reuters gives a car sales company presented itself under the name of a car brand, thus misleading the end user. The Australian Competition and Consumer Commission (ACCC) deemed this misleading advertising by Google and stared a court case. The High Court judged differently. more
Two things seem to be universally true in the network engineering space right this moment. The first is that network engineers are convinced their jobs will not exist, or there will only be network engineers "in the cloud" within the next five years. The second is a mad scramble to figure out how to add value to the business through the network. These two movements are, of course, mutually exclusive visions of the future. more
For any entity looking to launch a new company or other initiative, a primary requirement is often the selection of an appropriate brand name and the acquisition of a relevant associated domain name. In light of the increasing shortage of short, unregistered memorable names on popular domain name extensions (TLDs), many organisations are choosing to adopt novel or invented brand names and/or consider the use of alternative TLDs. more
Ad serving platforms drive a lot of web site revenue. These software platforms grant a site manager control over local or remote ads appearing on his web site. Over the years these platforms grew in functionality and today they offer diverse functions... Performance issues on such a platform can take down the ads on dozens of different sites, causing massive loss of revenues to the site and the platform owners. more
The term "counterfeit" is defined under U.S. trademark law as "a spurious mark which is identical with, or substantially indistinguishable from, a registered mark." 15 U.S.C. § 1127 (Lanham Act, Sec. 45). Used as a noun, domain names ultimately found to have been registered in bad faith make their registrants cybersquatters by definition. But more commonly we encounter counterfeiting as an adjective as it applies to spurious goods (counterfeit goods) -- "made in exact imitation of something valuable or important with the intention to deceive or defraud." more
Sponsored byVerisign
Sponsored byCSC
Sponsored byRadix
Sponsored byWhoisXML API
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byIPv4.Global