/ Most Viewed

The Next Internet Revolution Will Not Be in English

Imagine if, every time you wanted to visit a website, you were expected to type in letters from a foreign language, or worse, an entirely foreign script, such as Arabic, Cyrillic, or Chinese. For more than a billion people, this is how they experience the Internet today. The Internet was designed to be global, but it was not designed to be multilingual. For decades, this limitation was most evident in website and email addresses, which permitted only a small set of Latin characters. more

Gartner Says SDN Has Left the Building – Say Hello to Network Automation

In their annual hype cycle on on network technologies, Gartner lists the emerging technologies and an estimate of the timeframe in which they will reach the plateau of productivity. The latest hype cycle on enterprise networking labels Software-Defined Networks (SDN) as an obsolete technology. So on the surface, it would appear that SDN is now semi-officially dead. While most natural scientists accept the Darwinian theories, the technology industry has traditionally been trying to defy evolution. more

FTC Issues Statement on Whois Databases

A recent statement released by the U.S. Federal Trade Commission emphasized that the Whois databases should be kept "open, transparent, and accessible," allowing agencies like the FTC to protect consumers and consumers to protect themselves: "In short, if ICANN restricts the use of Whois data to technical purposes only, it will greatly impair the FTC's ability to identify Internet malefactors quickly -- and ultimately stop perpetrators of fraud, spam, and spyware from infecting consumers' computers," the statement states." more

First World Domain Day Conference Concludes in India

World Domain Day (WDD) was held in India for the first time last month where hundreds gathered to discuss domain names and related markets. Key topics included the announcement of soon to be available domains in a number of Indian languages. more

Last Decade in Spam

CAUCE, the Coalition Against Unsolicited Commercial Email, has looked back at the notable events of the last decade in our industry. Each year/link in the post explodes to a discrete blog entry with a month-by-month break-out of notable events. more

Pew Reports on the State of P2P, Music Online 10 Years After Napster

A recent report released by Pew Internet & American Life Project reviews the state of music online 10 years after Napster was launched. In the study, Pew Internet also reports that 15% of online adults admitted to downloading or sharing files using peer-to-peer or BitTorrent. "Globally, estimates from file-sharing research firm Big Champagne place the P2P universe at more than 200 million computers with at least one peer-to-peer application installed, and operators of the popular Pirate Bay torrent tracker have identified more than 25 million 'peers' who have used their site alone to exchange files." more

After ICANN’s TLD Application System Glitch, Communication Is the Key

There were long faces all over the new gTLD ecosystem yesterday -- applicants, consultants and technical operators alike -- when ICANN took their Application System (TAS) offline and announced that it would not be brought back up for 5 days. As a result, the long-anticipated close of the first new gTLD application window was pushed back from April 12 to April 20, 23:59 UTC. You could almost hear the groans of dismay spreading over social cyberspace! more

Whois Scared?

Every time I witness another argument about changing the rules of the Whois system I marvel at how such an important core internet protocol could be so widely misunderstood. I don't mean that the protocol's technical details are not well understood -- it's a very simple device, easy to implement correctly and easy to use even for new users. I mean that the Whois system itself and its purpose in the Internet ecosystem is widely misunderstood. Everybody uses Whois and lots of people argue about Whois but precious few folks know why Whois exists in the first place. more

A Few Thoughts on the Future of Email Authentication

With the Online Trust Alliance Town Hall Meeting and Email Authentication Roundtable next week as well as the RSA Conference, I decided to pause and think about where we are and where we might be headed with regard to email authentication. Over the years, many of us have collectively worked to provide a framework for authenticating email... more

The FCC White Space Regulations: Pretty Good at First Look

My prediction is that LTE and WiMAX are toast. The new great thing will be WRANs (wireless regional area networks). WRAN's will extend and eventually subsume WiFi. The detailed regulations which implement the FCC decision to free the spectrum formerly known as TV white spaces have now been released. They look pretty good from the point of view of someone who believes the unlicensed use of this spectrum has the potential to make a huge difference in the way the world communicates. more

Speculating in Domain Names: Pricing War(e)s

Speculation in one form of another has an ancient and honorable history. It not only creates entrepreneurial activity but fuels markets for selling wares and offering services, but also generates competition for consumers and wars over loyalty. The commercialization of the Internet in the 1990s, which extended market activity into virtual (cyber) space, has many of the virtues of the actual but also its vices: cheating and fraud, and other skullduggery. more

Opt-In Permission for Mailing Lists: Is It Enough?

For some time now I have contended that Confirmed Opt-in, 'COI' is dead, or at the very least on life support. It certainly is not a major factor in the continued relation between sender and receiver; that relies far more heavily on the ongoing and historical reputation of the mailer and the mail stream. Proof of permission doesn't scale; end-users complain all the time, but it is rare if not impossible for a receiving site to request proof when an end-user complains, then the receiver complains to the sender, and the sender says that permission was actually in place. Much more commonly, the sender unsubscribes the address and moves on, permission or not, since the subscriber doesn't want the mail any more. But then, I recently had two eye-opening experiences... more

Catching Spam Email with Project Honey Pot

Since its launch in October, 2004 Project Honey Pot has made some interesting progress in their war against spam email. The project is a distributed system used to identify spammers and spambots operating across the Internet. To put it simply, Project Honey Pot lays millions of traps around the Internet (66,393,293 as of this writing) baited with specific email addresses that are configured to forward received emails to the Project Honey Pot system. Since these are not email addresses used by real individuals virtually every email received is positively identified as spam. more

The Year IPv6 Made it to Major League

May 6th 2007: ARIN board of trustees passes a resolution advising the Internet community that migration to a new version of the internet protocol, IPv6, will be necessary to allow continued growth of the internet. June 29th 2007, Puerto Rico: ICANN Board resolution states that: The Board further resolves to work with the Regional Internet Registries and other stakeholders to promote education and outreach, with the goal of supporting the future growth of the Internet by encouraging the timely deployment of IPv6. Oct 26th 2007 at the RIPE 55 meeting in Amsterdam... Nov 15th 2007: IGF meeting, Rio de Janeiro... This is but a small sample of the fast growing visibility IPv6 acquired this year, 2007. more

In China, Email Addresses Are Irrelevant

Great article by the BBC about email vs. mobile apps in China -- and why email is losing out to the most popular apps. It's important for Westerners such as myself to remember that most of the world did not first interact with the Internet via desktop computer. In most emerging markets, people leapfrogged computers altogether on their way to using mobile apps. more