/ Most Viewed

AT Kearney Takes Side With Incumbent Telcos to Defend the Old World

In my job as part of a consultancy company, I know there are two types of reports our clients are interested in - those that are written for the customer to be used internally and those that are to be used externally. Quite often, instead of well thought out and researched pieces, these last-mentioned reports are created simply to underscore the opinion of the party paying for them. So when I received research by AT Kearney on A Viable Future Model for the Internet, I immediately checked who had paid for that report. more

Florida Cities Are Paying Hundreds of Thousands of Dollars in Ransom to Get Their Data Back

Lake City became the second Florida city to pay a substantial ransomware demand to hackers in less than a week. more

9 Thoughts on Stepping Up Spam and Malware Enforcement

In a tweet, EU commissioner for the Information Society Neelie Kroes congratulates OPTA on the spam fine for the golf ball printing company Backsound. Since 2004 the Dutch OPTA is the number one spam and malware fighter of the EU with a total of €1.9 million in fines. It made me ask two question to myself: How come that we seldom hear of other spam fines in the EU? And can the EU change this in any way? more

Internet Governance and the Universal Declaration of Human Rights, Part 5: Article 15-17

Internet Governance, like all governance, needs to be founded in guiding principles from which all policy making is derived. There are no more fundamental principles to guide our policy making than the Universal Declaration of Human Rights, (UDHR). This article as Part 5 of the series of articles (published in installments), and we are revisiting Article 15 to look at empowered Digital Citizenship and Internet Governance, to move on to the rights to a family and property more

How to Take a Proactive Approach to DNS Health

Because DNS is such an omnipresent part of modern networking, it's easy to assume that functional DNS infrastructure can be left running with minimal adjustments and only needs to be investigated in the event of a malfunction. Yet there are small telltale signs that precede DNS issues -- and knowing what they are can help to prevent disruption before it happens. more

What If New gTLD Applicants Held Private Auctions Where Losing Applicants, Not ICANN Gets The Money

Over the last week at ICANN the arguably best idea coming out of the ICANN meeting is the concept that applicants for new gTLD strings with more than one application, hold a private auction amongst themselves with the winning amount going to the other losing applicants instead of to ICANN. As a backdrop, under the Guidebook multiple applicants for a new gTLD extension are encouraged to work together and come to an agreement to resolve the conflict. more

Careful What You Wish For: Why ICANN “Independence” is a Bad Idea

ICANN controls the "root" of the naming hierarchy, designating the operators and managers of the top-level domains, like ".com" and ".net" and ".uk." Since its founding in 1998, ICANN has operated under a "Joint Partnership Agreement" (JPA) with the U.S. Department of Commerce. The current extension of this agreement is set to expire on September 30 of this year. Some advocates say it's now time for the U.S. government to cut its ties and let ICANN stand on its own. That's not a good idea. more

Exporting SOPA-Like Rules to Other Countries

"While SOPA may be dead (for now) in the U.S., lobby groups are likely to intensify their efforts to export SOPA-like rules to other countries," says Michael Geist in a blog post today. Geist writes: "With Bill C-11 back on the legislative agenda at the end of the month, Canada will be a prime target for SOPA style rules. In fact, a close review of the unpublished submissions to the Bill C-32 legislative committee reveals that several groups have laid the groundwork to add SOPA-like rules into Bill C-11 ..." more

UDRPs Filed - Brand Owners Take Note

After being in the domain industry for over 15 years, there aren't too many things that catch me by surprise, but recently a few UDRP filings have me scratching my head. Both ivi.com and ktg.com have had UDRPs filed against them, and I have to say for anyone holding a valuable domain name, it's a cautionary tale and one that should have folks paying attention to the outcome of each. more

Can Your Brand Afford to Not Have a dotBrand?

More than six hundred brands have applied for their own dotBrand (a new top level domain associated with a trademarked brand). These represent every segment of our economy: banks, tech companies, media, food, luxury goods, etc. Quite a few dotbrands have already gone live. The current application period is closed, but the next round will likely begin in 24 months or so. more

Recalibrating the DoH Debate

At the Internet Engineering Task Force (IETF) it is time we accept the wide range of drivers behind (and implications of) standards and for stakeholders to start listening to each other. A protocol recently released by the IETF, DNS over HTTPS (DoH), is at the centre of an increasingly polarised debate. This is because DoH uses encryption in the name of security and privacy and re-locates DNS resolution to the application layer of the Internet. more

Phishing Moving to the Web Channel

Today we received one of the first phish attempts to be made as a web spam (comment spam/blog spam) attempt. I wasn't convinced, and thought that perhaps it was a way to gather and verify RELEVANT online identities. Someone put me straight. It's phishing. I've often in the past had run-ins with the good folks in the anti virus realm back between 1996 and 2005 who thought Trojan horses and then spyware were not part of their business. Years later the AV business people ruled it is part of their business and ran to catch up. Same with botnets. more

Understand More, Fear Less: Will G20 Be Able to Contribute to an Internet Future with a Human Face?

Last week, the G20's ministers responsible for the digital economy met in Düsseldorf to prepare this year's G20 summit, scheduled for Hamburg, July 2017. Building on important strides initiated two years ago during the G20 summit in Antalya and based on the G20 Digital Economy Development and Cooperation Initiative (DEDCI), which was adopted last year under the Chinese G20 presidency, the Düsseldorf meeting adopted a "G20 Digital Economy Ministerial Declaration" which also includes a "Roadmap for Digitalisation". One day before the ministerial meeting, non-state actors were invited to discuss "Policies for a Digital Future" within a so-called Multistakeholder Conference. more

Wi-Fi 8: Beyond Speed, Towards Seamless Connectivity

As the IEEE 802.11 task force turns its attention to developing Wi-Fi 8, the next iteration of wireless networking standards, the focus has shifted from sheer speed to enhancing user experience. more

Proving and Protecting Rights to Domain Names

At their best, UDRP panelists are educators. They inform us about the ways in which parties win or lose on their claims and defenses. What to do and not do. In addressing this issue, I'm referring to less than 10% of cybersquatting disputes. For 90% or more of filed complaints, respondents have no defensible answer and generally don't even bother to respond. But within the 10%, there are serious disputes of contested rights (contested even where respondent has defaulted). more