Comcast has been in the news recently for deliberately "slowing down" some subscribers and applications in its broadband cable service. There was an article in the Washington Post today updating the case, and there was a recent article in Network World that actually favors the groups filing the complaints and calls for the FCC to crack down on Comcast. more
This accreditation positions UD as the largest ICANN-accredited registrar in the Web3 space, allowing it to expand its offerings to include a broader range of generic top-level domains (gTLDs) and country code domains (ccTLDs). more
In a trademark context, who owns or controls, or would prevent others, from using words and phrases commonly available to speakers in a language community, is in persistent tension. While common words alone or combined may become protected from infringing uses under trademark law, their protection is contingent on factors such as linguistic choices and strength or weakness of marks in the marketplace. more
DNS blacklists for IPv4 addresses are now nearly 15 years old, and DNSBL operators have gathered a great deal of expertise running them. Over the next decade or two mail will probably move to IPv6. How will running IPv6 DNSBLs differ from IPv4? There aren't any significant IPv6 DNSBLs yet since there isn't significant unwanted IPv6 mail traffic yet (or significant wanted traffic, for that matter), but we can make some extrapolations from the IPv4 experience. more
The UK government has unveiled its latest Digital Economy Bill as part of an "ambition for the UK to be the most digital nation in the world". more
The holidays open up a block of time to catch up on "I meant to read that" bookmarks, RSS feeds, and all the favorited and forgotten tweets. I made it through 50 before a NormanShark blog post kicked off a research project. The analysts found a malware sample which was using .bit domains in their communications infrastructure, but .bit ... what is that? .bit is a TLD operating outside of ICANN. Some would say they are TLD squatting, but I leave that opinion up to the reader. more
2016 marked the start of the third and final phase of the China Next Generation Internet (CNGI) IPv6 program. more
One thing was clear from a recent presentation by the new leaders of the SF-Bay Internet Society (ISOC) Chapter Working Groups: inclusion and collaboration will be the key to these groups' success. As Dr. Brandie Nonnecke, the Internet Governance Working Group (WG) Chair said, "We haven't yet cracked the code on what 'multistakeholder' means." But that won't stop her and Dr. Jaclyn Kerr, the Data Protection, Privacy, and Security WG Chair, from trying. more
The oft used term "the Internet of Things" (IoT) has expanded to encapsulate practically any device (or "thing") with some modicum of compute power that in turn can connect to another device that may or may not be connected to the Internet. ... The information security community -- in fact, the InfoSec industry at large -- has struggled and mostly failed to secure the "IoT". This does not bode well for the next evolutionary advancement of networked compute technology. more
Network Information Centre Sweden AB (NIC-SE), which is the organization that administers .se domain names, will be introducing a new regime for registration of .se domain names.
Under the new regime, applicants from all over the world will be able to apply for registration of a .se domain name without needing to prove that the desired domain name reflects a company or organization name. There will no longer be preliminary examination of applications for registration of .se domain names nor any restriction on the number of .se domain names per applicant. It will also be possible to register geographical names as .se domain names. However, non-Swedish applicants (those without a permanent business place or address in Sweden) must provide a local contact (i.e. person or entity who is permanently resident in Sweden). more
2012 will always be remembered as the Year of Wikileaks. Similarly, 2013 shall also be remembered as the year that Edward Snowden, a computer security specialist and former CIA employee and National Security Agency contractor, leaked classified information regarding the NSA global surveillance programs. Whilst Wikileaks was about US diplomatic cables, the Edward Snowden disclosure of classified NSA information to private media organizations such as the UK Guardian newspaper has had graver implications for global Internet privacy. more
The apparent cyber heist of of $81 million from the Bangladesh central bank's U.S. account may cause some people to question the security of online banking. While the online theft prompted SWIFT - a cooperative owned by 3,000 financial institutions around the world -- to make sure banks are following recommended security practices, the incident also could have ramifications for banking customers worldwide. more
Automattic, the parent company of the popular blogging platform WordPress, today announced plans to make the new .blog TLD available for registration this year. Earlier this year, the company secured the rights to oversee and operate the registration of the highly contested new generic TLD. more
While I was in LA last week John sent me details of the Communications Regulation (Amendment) Bill 2007. While there are some potentially positive aspects in the Bill some of the Bill's contents are, for lack of better word, simply crazy... more
This never-ending story is used by opportunistic telcos and their lobbyists to confuse the issue in order to gain regulatory or political advantage. The debate is now raging again in the USA. In an attempt to talk down their monopolistic position in the market the three telcos - and this time in particular, Comcast - are claiming that real competition does in fact exist in the American broadband market, citing competition from the mobile 4G LTE services as an example. more