/ Most Viewed

CENTR Publishes a Paper on Domain Name Registries and Online Content

The Council of European National Top-Level Domain Registries (CENTR) has published a paper on Domain name registries and online content which explores the domain name registries' relation and role regarding content online. more

Internet Governance: What Does It Mean, Anyway?

Ask anyone involved in Internet policy what "Internet Governance" means and you're likely to get a different answer, despite the fact that a decade ago, after torturous negotiations, the international community agreed on a working definition for the term (if a vague one). The lack of clarity has resulted in a policy space that appears to cover more and more subjects, with less and less agreement the more it spreads. In discussions recently on the /1net email list, I've seen proposals for an 'Internet Governance Roadmap' that includes delivering e-health initiatives, solving mass surveillance, and adopting new measures for taxation of Internet commerce - to name just a few. more

British Airways Issues Apology for Cyberattack Affecting Hundreds of Thousands of Customers

British Airways issued an apology today after the credit card details of hundreds of thousands of its customers were stolen over a two-week period in the most serious attack on its website and app. more

Where’s the Blockchain Killer App? Maybe It’s Buried Underneath All the Hype!

In recent times, I've been struggling to determine where blockchain has demonstrated its immensely promised value, delivered true market or stakeholder value, or disrupted an existing ecosystem. And thus far, what I keep coming up with is that "blockchain is truly a solution searching for a problem." Most of all, many of its enthusiasts and proponents are generally conceptual thinkers and/or snake oil salespersons who have little to no experience delivering secure, integrated, complex systems. more

The Sexist Men In Tech Need to Grow Up, Now

These days, I've seen many breathless posts about how 'we' "need" to encourage girls to study math so eventually they become computer or other sorts of geeks. Personally, I don't think technology is the only valuable thing in the world; writing, music, and the rest of the arts, medicine, human relations, politics, and so on are pretty important things too, and let's face it content was, is, and will always be king. That said if men continue to act like jerks, it is no wonder women will go into anything but technology. more

The Role of the BFR in SpaceX’s Satellite Internet Service

SpaceX started with their Falcon 1 booster followed by several versions of the Falcon 9. The Falcon Heavy will fly later this year, and the rocket that will take the first person to Mars is called, for now, the Big F*ing Rocket or BFR. The 150-ton BFR payload will be ten times that of the Falcon 9. It will have an extra landing-guidance engine for reliable reusability and SpaceX also expects to be able to soft-land and reuse the second-stage payload rocket as well as its protective nose cone, substantially reducing cost per launch. more

New Type of DDoS Attack Targets Vulnerability in Universal Plug and Play Networking Protocol

A new type of DDoS attack takes advantage of an old vulnerability with the potential to put any company with an online presence at risk of attack warn researchers. more

What If I Were Wrong About Edge-Caching?

Nicholas Thompson at Wired Blog sums up yesterday's Wall Street Journal piece on Google. To summarize his summary: Google's edge caching isn't new or evil; Lessig didn't shift gears on NN; Microsoft and Yahoo have been off the NN bandwagon since 2006; The Obama team still supports NN; Amazon's Kindle support is consistent with its NN support. Yet... yet... more

Does Bell Really Have a P2P Bandwidth Problem?

Bell filed its response to the Canadian Association Of Internet Providers (CAIP) submission to the Canadian Radio-television and Telecommunications Commission (CRTC) on its throttling practices yesterday, unsurprisingly arguing that its actions are justified and that there is no need to deal with the issue on an emergency basis. Several points stand out from the submission including its non-response to the privacy concerns with deep-packet inspection... and its inference that P2P usage could be deemed using a connection as a "server" and therefore outside the boundaries of "fair and proportionate use" under typical ISP terms of use. more

Transformation - the Real Business Case for NFV and SDN

2016 has seen a steady flow of announcements on successful Network Functions Virtualization (NFV) Proof-of-Concept deployments, mostly focused on virtualizing Customer Premise Equipment (vCPE). This has been a relatively straight forward starting point because unlike many other NFV applications, the vCPE use case does not involve complex activities like having to scale in or out individual services. more

UDRP Standing: Proving Unregistered Trademark Rights

The Uniform Domain Name Dispute Resolution Policy is a non-exclusive arbitral proceeding (alternative to a statutory action under the Anticybersquatting Consumer Protection Act) implemented for trademark rights' owners to challenge domain names allegedly registered for unlawful purposes. Policy, paragraph 4(a) states that a registrant is "required to submit to a mandatory administrative proceeding in the event that a third-party... more

New Registry Agreement, All Good?

In the run-up to the launch of new gTLDs, ICANN has been negotiating both of its main supplier contracts. The registrar contract (Registrar Accreditation Agreement or RAA) negotiations are now all but complete. A new contract draft has been posted for public comment and it now seems likely that in little over a month, this will become the official new 2013 RAA. more

When DNSBLs Go Bad

I have often remarked that any fool can run a DNS-Based Blacklist (DNSBL) and many fools do so. Since approximately nobody uses the incompetently run black lists, they don't matter. Unfortunately, using a DNSBL requires equally little expertise, which becomes a problem when an operator wants to shut down a list. When someone sets up a mail server (which we'll call an MTA for Mail Transfer Agent), one of the tasks is to configure the anti-spam features, which invariably involves using DNSBLs. more

Et Tu, ICANN? ICANN Board’s Recent Decision on the .Islam and .Halal TLD Applications Is Wrong

On Feb. 7, 2014 Dr. Stephen Crocker, the Chair of the ICANN Board of Directors, wrote to Asia Green IT System (AGIT), a Turkish company which applied for .Islam and .Halal, conveying ICANN's latest position on these two applications. The letter is deeply flawed, and shows how ICANN's handling of the .Islam and .Halal applications is at once an egregious assault on the new gTLD program rules, and a betrayal of whatever trust Muslims around the world might have had in ICANN. more

IGF Nairobi - Success of the Multi-stakeholder Model

A funny thing happened in Nairobi last week... I showed up for an Internet Governance Forum (IGF) panel discussion on the use of the Internet during times of political and social unrest, and a truly multi-stakeholder dialogue broke out. It turned out to be my favorite session during an incredible IGF week that, thanks to our Kenyan hosts, exceeded every expectation. The session, formerly known as "The Internet in the Post-Revolution Phase – Challenges of Political Engagement and the Safety of Citizens" was cancelled for reasons unknown. Perhaps it was a conflict of schedules, or maybe the topic was deemed by the organizers or certain governments to be too sensitive for the official agenda. more