/ Most Viewed

NTIA Extends Comment Period for Its Paper “Fostering the Advancement of the Internet of Things”

Over the past year, the National Telecommunications and Information Administration in the Department of Commerce has convened a series of meetings and sought feedback on the policy implications of the Internet of Things... more

Huawei’s Q1 2021 Phone Sales Down by Over 30%

"2021 will be another challenging year for us, but it's also the year that our future development strategy will begin to take shape," said Eric Xu, Huawei's Rotating Chairman. Huawei generated CNY152.2 billion in revenue, a 16.5% decrease year-on-year. The Network Business continued to grow. It wasn't officially announced1, but consumer products other than phones probably increased sales. The fitness tracker, earbuds, and watches are winning strong reviews. more

Why Saving the NomCom Means Saving ICANN Itself

ICANN's 2012 Nominating Committee (NomCom) selections are out. After a yearlong process, the NomCom has selected new members for the ICANN Board (3 seats), the GNSO and ccNSO Councils (1 seat each) and ALAC (2 positions). For those unfamiliar with it, the NomCom is in theory independent of other ICANN bodies such as the Board and exists to help fill leadership positions on them. more

Why is ICANN Traveling Without Moving and Thwarting Innovation in the Domain Space?

While I was giving my .music presentation at ICANN Studenkreis in Barcelona, Spain last week, it dawned upon me. There was not one single ICANN staff member sitting in the room taking notes on any of the presentations given by TLD applicants. I was convinced that it would be beneficial to ICANN staff to observe our presentations and perhaps receive useful feedback from TLD applicants that could be used to better draft the Expressions of Interest recommendation. more

DNSSEC vs DDoS Protection: Is It Really a Choice?

Within the last year or two, I've heard people express an opinion to the effect that if the domain name industry put as much focus on preventing distributed denial of service attacks as we have on implementing DNSSEC, the Internet would be a safer place. While there may be a grain of truth there, I suggest that this kind of thinking presents us with something of a false dichotomy. more

The Burr Proposal: Beginning of the End of Unilateral Control of the DNS Root?

The results of the recent NTIA consultation made it clear that there is no real public or industry support for unilateral control of the DNS root by the U.S. government. The latest and most interesting sign of collapsing support for US unilateral control of the DNS root, which the Internet Governance Project learned of today, is a proposal being circulated by G. Beckwith Burr... more

The Future of the Internet Ecosystem in a Post-Open Internet Order World (Event Videos)

An event titled, The Future of the Internet Ecosystem in a Post-Open Internet Order World, took place Last week organized by the Technology Policy Institute and the University of Pennsylvania Law School's Center for Technology, Innovation and Competition. more

Why Distinguish Between Defensive and Offensive Domain Names?

Offensive domain-name registrations require strategic corporate decisions. Second, they require different strategic and tactical remedies when third parties register desired names. Thus, different organizational approaches are necessary to manage domain name risks and rewards. The essay identifies the strategic differences and remedies for the two types of domain names, and outlines the implications for internal work-flow organizational structures. more

Protecting the Health of Internet Users: Q&A with .pharmacy

Sue Schuster from Neustar Registry Services sits down with Carmen A. Catizone, MS, RPh, DPh Executive Director of the National Association of Boards of Pharmacy (NABP) for online pharmacies and prescription-only medications to chat about the benefits this exciting new partnership and what it means for members and consumers. more

IPv6 in China

Much has been written about the progress of the adoption of IPv6 over the years. I know I've been guilty of adding my writings into the pool, and this article is a further contribution to that pool of observations and measurements. In this case, I want to look in some detail at the deployment of IPv6 in China. Why is China so important in this story of IPv6 deployment? more

To 5.5G and Beyond

I recently saw an article in FierceWireless that reports that Huawei thinks we are going to need an intermediate step between 5G and 6G, something like 5.5G. To me, this raises the more immediate question about why we are not talking about the steps between 4G and 5G? The wireless industry used to tell the truth about cellular technology. You don't need to take my word for it... more

Unintended Consequences of Submarine Cable Deployment on Internet Routing

The network layer of the Internet routes packets regardless of the underlying communication media (Wifi, cellular telephony, satellites, or optical fiber). The underlying physical infrastructure of the Internet includes a mesh of submarine cables, generally shared by network operators who purchase capacity from the cable owners. As of late 2020, over 400 submarine cables interconnect continents worldwide and constitute the oceanic backbone of the Internet. more

Canada’s Anti-Spam Law Coming Into Force July 01, 2014

Canada's Anti-Spam Law, CASL, is now a done deal. Last Thursday, Treasury Board of Canada President (and champion of CASL) Tony Clement approved Industry Canada regulations in their final form. Today, Minister of Industry the Honourable James Moore announced CASL will come into force in July 1, 2014. more

Spam Fighters: Revenge is a Dish Best Left in the Freezer and Forgotten

There's no denying that the fight against spam attracts a lot of crazies, both pro- and anti-spam. One of the common attributes of the anti-spam kooks is that they often think in terms of somehow taking revenge against the spammers -- regardless of who else gets hurt along the way. In 2005, that revenge came in the form of BlueFrog, a service which purported to launch what can only be called denial of service attacks against spammers' web sites... This week, a company called SpamZa was hurriedly making a similar mistake... more

Was the ClimateGate Hacker Justified? Join the Debate!

A few days ago a story broke where someone hacked into a global warming research institute and stole all emails from the past 10 years, proving a conspiracy. In the vast amount of emails stolen, some emails were also found with clear-cut lies, showing how some scientists conspired to deceive in scientific research about data that did not fit their agenda of proving global warming. I am opening the subject for debate... more