Spring storms with winter qualities clobbered North America this week, threatening Canada with slow-moving storms, and pounding the United States with near-record snowfall in the midwest, low temperatures in the south and tornadoes further east. You could say change was in the air. And although the unseasonable weather didn't reach as far south as Florida, the climate of change still dominated the atmosphere at the fifteenth regional meeting of the Caribbean Network Operators Group (CaribNOG). more
This week, Thomas Barrett - the President of US based registrar EnCirca - published a timely article about how the registrar cash flow model could collapse with the imminent release of hundreds of new Top-Level Domains (TLD). I would like to thank Thomas for raising this important issue and for encouraging all new TLD applicants to discuss this topic with their back-end registry provider. more
The term "counterfeit" is defined under U.S. trademark law as "a spurious mark which is identical with, or substantially indistinguishable from, a registered mark." 15 U.S.C. § 1127 (Lanham Act, Sec. 45). Used as a noun, domain names ultimately found to have been registered in bad faith make their registrants cybersquatters by definition. But more commonly we encounter counterfeiting as an adjective as it applies to spurious goods (counterfeit goods) -- "made in exact imitation of something valuable or important with the intention to deceive or defraud." more
With 5G earmarked as a game-changer for cities, wireless technologies are already widely deployed by leading smart cities, including those here in Australia. However, cities do not want to be locked into proprietary technology solutions, rather seeing themselves as a platform on which many organisations can build infrastructure, applications, and services to benefit all citizens and all local businesses. more
Most engineers focus on purely technical mechanisms for defending against various kinds of cyber attacks, including "the old magic bullet," the firewall. The game of cannons and walls is over, however, and the cannons have won; those who depend on walls are in for a shocking future. What is the proper response, then? What defenses are there The reality is that just like in physical warfare, the defenses will take some time to develop and articulate. more
I have bad news for anybody still clinging to their flip phones. All of the big cellular carriers have announced plans to end 3G cellular service, and each has a different timeline in mind... The amount of usage on 3G networks is still significant. GSMA reported that at the end of 2018 that as many as 17% of US cellular customers still made 3G connections, which accounted for as much as 19% of all cellular connections. more
The recent horrific actions undertaken by Vladimir V. Putin and complicit Russian actors against the sovereign nation of Ukraine and its people are widely regarded as war crimes on a profound scale not seen in Europe since World War II. The costs in lives and property are enormous. It has recently resulted in a condemning UN Resolution. At some point, there will be reckoning for Putin and those who aided and abetted his actions through our domestic and international legal systems. more
WannaCry, or WannaCrypt, is one of the many names of the piece of ransomware that impacted the Internet last week, and will likely continue to make the rounds this week. There are a number of takeaways and lessons to learn from the far-reaching attack that we witnessed. Let me tie those to voluntary cooperation and collaboration which together represent the foundation for the Internet's development. more
One of Washington's most powerful corporate lobbies is at it again. Raising a dust cloud of lies in a last-ditch effort to stop new technology that could better the lives of millions. For more than five years, now, the television broadcast lobby has tried to deny the American public access to white spaces -- unused airwaves that sit vacant between TV channels. Technology now exists that would tap the near limitless potential of these airwaves and deliver high-speed Internet services to tens of millions of people now left on the wrong side of the digital divide. more
Over the past two years, governments and foreign intelligence agencies around the world have tried to understand the inexplicable, chaotic, irrational, indeed maniacal 5G policies of the Trump Administration. Revelations by former Trump administration officials and most recently Trump's niece confirm that there is no rational basis for Trumpian positions and policies and that the best response is to recognize that Washington is no longer capable of playing a meaningful role... more
Did you know about these new domain name extensions which focus on wellness, wealth and ego? Well, I listed them and there is an interesting one... which really is unique... Many want to be famous and some industries should have a look at this list of extensions since they are keywords dedicated to very powerful industries: Gold and Diamonds, for example, have their own new gTLD for domain names ending in ".gold" and ".diamonds". more
"It's in the cloud" has become a phrase we don't think twice about, but less than a decade ago, you might have received some awkward looks using this kind of talk in the boardroom. Cloud-based software applications are heralding the fourth industrial revolution that will eventually lead to the industrial internet of things (IIOT). The reasons for this are because... more
Another domain name dispute decision -- this one for '24hour.fitness' -- has highlighted the increasing (potential) relevance of the top-level domain (TLD) under the Uniform Domain Name Dispute Resolution Policy (UDRP). As I have written before, the proliferation of new TLDs is having an impact on whether and how UDRP panels consider the TLD in their decisions. more
Data breaches are the oil spills of the digital economy. Over 429 million people were affected by reported data breaches in 2015 -- and that number is certain to grow even higher in 2016. These large-scale data breaches along with uncertainties about the use of our data, cybercrime, surveillance and other online threats are eroding trust on the Internet. more
Are you passionate about ensuring the Internet remains open, globally-connected, secure and trustworthy - for everyone? Do you have experience in Internet standards, development or public policy? If so, please consider applying for one of the open seats on the Internet Society Board of Trustees. The Board of Trustees provides strategic direction, inspiration, and oversight to advance the Society's mission. more
Sponsored byDNIB.com
Sponsored byRadix
Sponsored byVerisign
Sponsored byCSC
Sponsored byVerisign
Sponsored byWhoisXML API
Sponsored byIPv4.Global