Earlier this year, the Obama Administration announced its plans to turn over the very heart of the Internet to the control of ICANN. On Monday, Republican leaders of the House and Senate Judiciary Committees sent a letter asking the Government Accountability Office to study whether a Congressional vote on the transfer is required under the Constitution's Property Clause because administration of the root zone file is a government asset, created under government contract. Some will no doubt dismiss the letter as Republican obstructionism. more
The Internet represents a threshold moment for the communications realm in many ways. It altered the immediate end client of the network service from humans to computers. It changed the communications model from synchronized end-to-end service to asynchronous and from virtual circuits to packet switching. At the same time, there were a set of sweeping changes in the public communications framework... more
Really ICANN? The Trademark Clearinghouse provides unprecedented protection. According to your recent announcement it does. Do tell, ICANN -- in what way does the Trademark Clearinghouse protect anything? more
ICANN's CEO and President, Rod Beckstrom, has announced that he will be stepping down in July of next year. The announcement came via Twitter of all places, with a press release, presumably with more details, due sometime soon... With the launch of the new Top-Level Domain (TLD) program scheduled to officially launch early in 2012 maybe Beckstrom feels that his job "is done", or maybe there's another motive behind his departure. more
Many of us are familiar with network effects within telecommunications. Fundamentally, the notion is that as the number of participants in a network increases, the value of that network increases superlinearly. Though many different theories exist about how best to value these networks, the general idea is that the more people on a network, the more benefits accrue to everyone on the network... more
The cable guys have their way of saying it: "What do you want to do, nationalize our businesses?" Another way of seeing this issue is: We have a very few very large providers of highspeed internet access in U.S. They have sufficient market power to decide how and when to prioritize internet communications. And all of these providers are competing with the internet in some way -- they are all (or are becoming) old media and old telecom companies that want to maintain control over their distribution channels. more
As you might imagine, I've been following the ITU's Plenipotentiary Conference very closely. It was built up to be the great showdown of our time -- the pro-'free and open' Internet in one corner (comprised for the most part of developed and democratic nations), in the other corner a contingent of totalitarian regimes bent on a fractured, censored Internet -- a near battle royale for control of one of the greatest communications tool the world has ever seen. more
In February 2012, Neustar surveyed IT professionals across North America to better understand their DDoS experiences. Most were network services managers, senior systems engineers, systems administrators and directors of IT operations. In all, 1,000 people from 26 different industries shared responses about attacks, defenses, ongoing concerns, risks and financial losses. more
On Friday I was on a surprisingly interesting session at Rightscon 2018 in Toronto about GDPR and WHOIS. The panel consisted of Eleeza Agoopian from ICANN staff; Avri Doria who was recently appointed to the ICANN board; Elliot Noss who runs large registrar Tucows; Stephanie Perrin who has done a lot of privacy work for the Canadian government and as an ICANN volunteer, and me; Milt Mueller, who is now at Georgia Tech, moderated. more
The IGF this morning published a number of reports, including the aforementioned one, at the URL provided, titled 'IGF 2015 Best Practice Forum Regulation and mitigation of unsolicited communications.' The reports can be found in the included URLs on the IGF Website. more
The traditional network operators see OTT services as a threat, and the companies offering them are perceived to be getting a free lunch over their networks - they are calling for international regulation. In particular, the European telcos (united in ETNO) have been claiming that this undermines their investment in infrastructure and they want to use the WCIT conference in Dubai later this year to lobby for regulatory changes that would see certain levies being levied - something that is strenuously opposed by, among others, the USA and the APAC countries. more
As each day passes, I spend more time immersing myself with prospective clients who are weighing up our offering over those of alternative providers. The more I become entrenched in this competitive process, the more it becomes increasingly clear that many of the competing RSPs pitching their wares to hopeful applicants are misleading them by hiding critically important information in fine print disclaimers or feeding them rubbish in order to whittle down the competition. Competition is a great thing; it just needs to be on the same playing field. Make sure you are comparing apples with apples. more
In previous installments we've been looking at aspects of the design of the DNS. Today we look at the relationship of similar names in the DNS. A poorly appreciated aspect of the DNS is that there is no inherent relationship between similar looking names. more
Telesat will use Google's network operating system. Telesat is making progress. Within the last month, they announced a launch contract with Blue Origin, a successful antenna test with Ball Aerospace and completion of system requirements reviews, but perhaps more interesting is an agreement to use the software defined network (SDN) platform Google has developed for their Project Loon. more
One of the big trends this year is spear phishing. These are phish attacks that are frequently (though not always) against high profile users. The purpose of these attacks is to steal sensitive data or get elevation of privilege inside the service by exploiting a software vulnerability within the user's computer that transmits usernames and passwords back to the phisher. more
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byVerisign
Sponsored byWhoisXML API
Sponsored byRadix
Sponsored byDNIB.com
Sponsored byCSC