/ Most Viewed

Announcing the 2024 ICANN Contracted Parties Summit Statement!

As Chairs of ICANN's Registries and Registrar Stakeholder Groups, we are proud to announce that we have initiated a new practice for the Contracted Parties Summits: the publication of our Contracted Parties Summit Statement. As you may (or may not) know, Contracted Parties get together periodically to interact and work together on issues that we care about, and which impact our businesses as registries and registrars. more

It’s Up to Each of Us: Why I WannaCry for Collaboration

WannaCry, or WannaCrypt, is one of the many names of the piece of ransomware that impacted the Internet last week, and will likely continue to make the rounds this week. There are a number of takeaways and lessons to learn from the far-reaching attack that we witnessed. Let me tie those to voluntary cooperation and collaboration which together represent the foundation for the Internet's development. more

Washington’s 5G Mania Endpoint – Global CyberBalkanisation

Over the past two years, governments and foreign intelligence agencies around the world have tried to understand the inexplicable, chaotic, irrational, indeed maniacal 5G policies of the Trump Administration. Revelations by former Trump administration officials and most recently Trump's niece confirm that there is no rational basis for Trumpian positions and policies and that the best response is to recognize that Washington is no longer capable of playing a meaningful role... more

Internet Society Seeks Nominations for 2019 Board of Trustees

Are you passionate about ensuring the Internet remains open, globally-connected, secure and trustworthy - for everyone? Do you have experience in Internet standards, development or public policy? If so, please consider applying for one of the open seats on the Internet Society Board of Trustees. The Board of Trustees provides strategic direction, inspiration, and oversight to advance the Society's mission. more

FCC Expected to Propose Regulation of Internet as Utility

Sources are reporting that Tom Wheeler, the Federal Communications Commission chairman, is widely expected this week to propose regulating Internet service similar to a public utility -- a move certain to unleash another round of intense debate and lobbying about how to ensure so-called net neutrality, or an open Internet. more

The Early History of Usenet, Part IV: Implementation and User Experience

To understand some of our implementation choices, it's important to remember two things. First, the computers of that era were slow. The Unix machine at UNC's CS department was slower than most timesharing machines even for 1979 – we had a small, slow disk, a slow CPU, and – most critically – not nearly enough RAM. Duke CS had a faster computer – they had an 11/70; we had an 11/45 -- but since I was doing the first implementation, I had to use what UNC had. (Log in remotely? more

Into the Gray Zone: Considering Active Defense

Most engineers focus on purely technical mechanisms for defending against various kinds of cyber attacks, including "the old magic bullet," the firewall. The game of cannons and walls is over, however, and the cannons have won; those who depend on walls are in for a shocking future. What is the proper response, then? What defenses are there The reality is that just like in physical warfare, the defenses will take some time to develop and articulate. more

Counterfeit Marks and Counterfeit Goods: Pretense in Cyberspace

The term "counterfeit" is defined under U.S. trademark law as "a spurious mark which is identical with, or substantially indistinguishable from, a registered mark." 15 U.S.C. § 1127 (Lanham Act, Sec. 45). Used as a noun, domain names ultimately found to have been registered in bad faith make their registrants cybersquatters by definition. But more commonly we encounter counterfeiting as an adjective as it applies to spurious goods (counterfeit goods) -- "made in exact imitation of something valuable or important with the intention to deceive or defraud." more

Application Delivery Controller: So Long, Crystal Ball

Do you know how big your web site will be in a year? You probably can guess, or even estimate how much traffic will hit your site in a year. You can also use millennia proven methods such as Crystal Balls, Animal Entrails or even Coffee Stains. But seriously, it is no easy task evaluating site growth in this volatile, ever changing economy. A key element in the scaling of any web site is the Application Delivery Controller (ADC). more

France the Latest Showcase for National Fibre Public Funding

The French are good at 'doing' infrastructure. The country takes pride in a civil service which has been progressively centralised since the efforts of Cardinal Richelieu in the mid-17th century. The well-funded health system is among the best in Europe. The generously subsidised rail service, the SNCF, also rates highly. These and other components of the modern French State cost money, and the government has rarely proven shy in supporting big ideas, particularly if they are so readily equated with public welfare and benefit. more

Going for Broke: Financial Services Industry Falling Behind on DNSSEC Adoption

Many CircleID readers have been watching the acceleration of DNSSEC adoption by top level domains with great interest, and after many years the promise of a secure and trustworthy naming infrastructure across the generic and country-code domains finally seems within reach. While TLD DNSSEC deployments are major milestones for internet security, securing the top level domains is not the end goal - just a necessary step in the process. more

How to Get a Domain Name Transferred Under the URS

The Uniform Rapid Suspension System (URS) is designed to get a domain name suspended, but in some cases this dispute policy can be used to help get a domain name transferred. It's an uncommon result but one that trademark owners may want to keep in mind. The suspension remedy is often viewed as the greatest limitation of the URS. Trademark owners that want to have a domain name transferred typically file a complaint under the Uniform Domain Name Dispute Resolution Policy (UDRP) instead of the URS - but, the UDRP is more expensive and time-consuming. more

The Color of the Net Has Changed

About 65% of 1.5B Internet "connections" are in the Global South, led by the BRICS. The actual number of users is probably twice that. Three quarters are not native English speakers. China has three times as many as the United States. India has more Facebook users than the United States. Vietnam has the fastest growth. See some figures below for why I'm confident Indonesia has more than 100M wireless only. more

Most Cyberattacks Are From Hostile States, Reports U.K.‘s National Cyber Security Centre

A report from the U.K.'s National Cyber Security Centre blames hostile foreign states for the majority of the 1,167 attacks dealt with in the past two years. more

Data Breaches and You: ISOC Global Internet Report 2016 Explains Critical Steps You Need to Take Now

Data breaches are the oil spills of the digital economy. Over 429 million people were affected by reported data breaches in 2015 -- and that number is certain to grow even higher in 2016. These large-scale data breaches along with uncertainties about the use of our data, cybercrime, surveillance and other online threats are eroding trust on the Internet. more