Part 1 described the impasse between the ICANN board and the Governmental Advisory Committee (GAC) over the introduction of new gTLDs. This part analyzes the conflicts and offers suggestions for beginning to resolve them. ... Some of these conflicts turn out to have clear answers. Approving the DAG before public comments could be considered violated ICANN's bylaws, but the board has unmistakable authority to reject the GAC's advice. more
The Association of National Advertisers is at it again, this time spelling the death of new gTLDs barely after they emerge from the gate. In 1982, at the dawn of the video age, Motion Picture Association of America President Jack Valenti infamously told Congress, with more than one unfortunate reference to various types of violent crime, that the advent of the VCR would spell immediate and irrevocable doom to the motion picture industry, and that the device should certainly be thrown to the scrap heap even before its arrival. more
The surest way to screw up future innovative applications would be for ISPs to make constraining assumptions about the future based on existing applications' performance. Discussing P2P behavior as if it were some monolithic, unchanging entity is simply wrong. What is P2P? BitTorrent? Skype? CNN live video feed fan-outs? And what of changes to these existing apps? What of future apps? more
These days in Washington, even the most absurd proposals become the new normal. The announcement yesterday of a new U.S. State Department Cyberspace Bureau is yet another example of setting the nation up as an isolated, belligerent actor on the world stage. In some ways, the reorganization almost seems like a companion to last week's proposal to take over the nation's 5G infrastructure. Most disturbingly, it transforms U.S. diplomacy assets from multilateral cooperation to becoming the world's bilateral cyber-bully nation. more
California was recently reminded that rain can be very dangerous. In February, the nation's tallest dam, the Oroville dam in northern California, became so overloaded with rain that over a 100,000 people had to evacuate their homes. Many of them ended up at the fairgrounds, a common place for rural communities to gather in times of disaster. Many rural fairgrounds remain unconnected to broadband Internet services, which can make a dangerous situation worse. Especially during critical times, the public must be able to access resources and communicate with their loved ones through the Internet. more
Kevin Murphy reporting in DomainIncite: "Last month, the Republican National Committee and the Republican State Leadership Committee submitted comments to ICANN arguing that Demand would be an unsuitable custodian for the gTLD [.republican]. Demand is best known for its "unofficial, mediocre and sometimes incorrect" content farms, such as eHow, the letter (pdf) said..." more
Former Yahoo CEO Marissa Mayer apologized today at the Senate Commerce, Science and Transportation hearing regarding massive data breaches at the internet company, blaming Russian agents. more
Talking technical is easy. Distilling technical detail, complex threats and operation nuances down to something that can be consumed by people whose responsibility for dealing with cybercrime lays three levels below them in their organizational hierarchy is somewhat more difficult. Since so many readers here have strong technical backgrounds and often face the task of educating upwards within their own organizations, I figured I'd share 4 slides from my recent presentation that may be helpful in communicating how the world has changed. more
This study analyzes the differences in domain name and IP address strategies among a number of current mainstream artificial intelligence (AI) service providers. We find that these technical choices not only reflect deployment decisions but also deep-seated corporate knowledge and capabilities in Internet infrastructure service provision, as well as brand positioning and market strategies. more
In a potentially damaging cybersecurity revelation, researchers from the cybersecurity company Eclypsium have identified a hidden mechanism in the firmware of motherboards manufactured by Taiwanese company Gigabyte. more
We've just published the 2023 edition of the DOTZON study "Digital City Brands." After introducing the study in early 2017, DOTZON has mapped how successful cities are using their Digital City Brands for the seventh year in a row. The Digital City Brand is the digital dimension of the City Brand and mirrors the "Digitalness" of a city. The advent of the Internet was why Digital City Brands came into being in the first place. more
The White House has released a charter offering more transparency into the Vulnerabilities Equities Process. more
The other day, I planned to take my 15-year-old son to the movie theatre to see "Hateful Eight" in 70mm film format. The theatre would not allow him in. Under article 240a of the Dutch penal code, it is a felony to show a movie to a minor when that movie is rated 16 or above. Even though I think I am responsible for what my son gets to see, I understand that the rating agency put a 16-year stamp on this politically-incorrect-gun-slinging-gore-and-curse-intense-comedy feature. more
Federal databases, such as those being compiled by the Consumer Financial Protection Bureau and the Federal Trade Commission, contain data about many people and businesses. Although some of this data may be protected personal information (PPI), there is also extensive information in federal databases that is publicly disseminated via the internet. If the information is wrong, it has the potential to be a vector of tortious mischief. more
Leading US ISP, Comcast, has announced today its aggressive plans to deploy DNSSEC through out its netowrk. Chris Griffiths, Manager of DNS Engineering, writes: "We plan to implement DNSSEC for the websites we manage, such as comcast.com, comcast.net and xfinity.com, by the first quarter of 2011, if not sooner. By the end of 2011, we plan to implement DNSSEC validation for all of our customers." more