As the federal government grapples with Internet-connected devices and applications that make up the Internet of Things (IoT), the National Institute of Standards and Technology (NIST) is forging ahead to provide "technical leadership" for "the operation, trustworthiness, and lifecycle of IoT". Such efforts complement - and contrast - recent policy efforts at the National Telecommunications and Information Administration (NTIA) and elsewhere to promote IoT innovation while addressing security, privacy, and interoperability. more
According to IDC, smartphones outsold personal computers, laptops included in Q4 2010! Nokia just announced the demise of the Venerable Symbian in favour of Windows 7 phone and Microsoft's bing search engine! Tectonic shifts are under way to adapt to the rise of wireless broadband, an all IP world, and the growing weight of Apple and Google Android. It is also time to head once again for Barcelona with the Mobile World Congress starting on the 14th. Highlights this year? more
Which domain extensions do people prefer? How do these preferences vary by country? This article reports the results of a poll of domain extension preference by country of residence conducted from May through October, 2003 by Domain Name Journal and the DomainState forum. Approximately 133 people from 34 different countries participated. This poll has limitations that we will discuss, but it does measure the extension preferences of domain registrants and developers in a manner that has not been done elsewhere and it produces some interesting results. more
The main reason for developing a new internet protocol was based on lack of address; however this was not the only reason. Unfortunately, many people think of IPv6 only as enormous address space, but there are a lot of other advantages, for example... authorizations and authentication function are implemented directly in the protocol and are mandatory... automatic configuration of network interfaces based on their physical address... protocol itself recognizes data streams which must be transmitted in real time, and the data must be processed with highest priority... more
As I pointed out in last week's essay, having trademark rights that come into existence later than registrations of corresponding domain names only gets complainants to first base; they have standing but no actionable claim. I also noted a nuance (not a difference in substance) in standing requirements between the Uniform Dispute Resolution Policy (UDRP) and the Anti-Cybersquatting Consumer Protection Act (ACPA). However, standing depends upon the specific facts of the case... more
And so it goes, we are coming to the end of 2019, and that can mean only one thing. It's time for another Domain Name Year in Review. And unlike years past, this year was a real doozy. So without further ado, here are the domain name industry's top 10 biggest stories for 2019... To date, 48 leading registries and registrars have signed onto the "Framework to Address Abuse." The initiative was launched in November 2019, just prior to the ICANN meeting in Montreal. more
The ICANN new gTLD program began today, 12th January 2012, with the application round now open and this important activity will make 2012 a very memorable year. It is expected that a minimum of 500 fresh applications for new generic Top Level Domains will be received by ICANN through the online TLD Applications System (TAS) by April 12 when the round closes, for processing and evaluation afterwards. This promises to be a hectic and engaging period for new gTLD applicants, and also for ICANN. more
As we increasingly move towards an IoT world, vendors of safety-critical devices will be patching their systems just as regularly as phone and computer vendors do now. Researchers warn that many regulators who previously thought only in terms of safety will have to start thinking of security as well. more
During a talk at the RSA Conference, security expert Bruce Schneier called for the creation of a new government agency that focuses on internet of things regulation, arguing that "the risks are too great, and the stakes are too high" to do nothing. more
A few weeks back I asked Where is China's IDN? ICANN not only answered my question about China, but also about a host of additional countries (and territory) that had applied for fast-track IDNs. Here are the most recent IDN (string evaluation) approvals... more
The ICANN community is ever closer to realization of its goal to bring long-overdue consumer choice and competition to Internet naming. Regrettably, but perhaps predictably, reliance on the Final Applicant Guidebook (AGB) is being challenged at the last minute by recent proposals from the Business and Intellectual Property Constituencies (BC/IPC), which demand "improvements" to the already extensive trademark protections that will be part of the new gTLD landscape. more
The Electronic Frontier Foundation (EFF) has submitted a friend-of-the-court brief in a case that could have a profound effect on the privacy of Internet communications. The brief argues that the decision in US v. Councilman, soon to be reheard by the full First Circuit, should be overturned. more
Wuhan in 1911 led the revolt that overthrew the Qing Dynasty and now hopes to dethrone the world's fiber leaders. China this year or next will surpass Japan as world fiber leader, with estimates as high as 30M homes connected. Wuhan's FiberHome is now #2 in the world according to Infonetics, ahead of Alcatel, Motorola, and Tellabs. more
This past week offered a striking illustration of the pace and scale at which our shared orbital environment is evolving. In less than 24 hours, six rockets were launched from different parts of the globe, each contributing to the rapid expansion of low Earth orbit (LEO) infrastructure. China deployed a new set of Guowang satellites, while SpaceX launched two batches of Starlink satellites - one from Vandenberg in California and another from Cape Canaveral in Florida. United Launch Alliance (ULA) successfully placed Amazon's Kuiper satellites into orbit... more
A water utility in Europe was compromised by cryptocurrency malware mining attack; the attack is the first public discovery of an unauthorized cryptocurrency miner impacting industrial controls systems. more