/ Most Viewed

Who Pays for Email?

An acquaintance wondered why the people who run the systems that receive mail get to make all the rules about what gets delivered. After all, he noted: "The sender pays for bandwidth and agrees to abide by the bandwidth provider's rules." It is useful to think of the Internet as a collection of tubes, all leading from the periphery to the middle, where the middle is approximately "the peering point." The sender has paid for the tubes leading from himself to the middle... more

Verizon Throws 18 States Under the Progress Train

I am a happy Verizon FIOS fiber-to-the-home customer in Connecticut, I admire the long view Verizon took to build its FIOS infrastructure, and I appreciate the substantial punishment that Verizon took from Wall Street until it became obvious that FIOS would be a huge success. But Verizon is not building FIOS in all of its territories! Verizon is unloading land lines in eighteen states because they don't want to keep building FIOS there... more

Domain Pulse 2008: Day 2 Focuses on DNS Security

Day two of Domain Pulse 2008 last Friday (see review of day one) focused on online security issues giving the techies amongst us details of security issues, and the more policy-orientated amongst us something to chew on in a few other presentations. Kieren McCarthy, these days of ICANN, also gave some insights into the drawn out sex.com drama with more twists and turns than the average soap opera has in a year! And Randy Bush outlined the problems with IPv6. Among other presentations... more

Proving and Protecting Rights to Domain Names

At their best, UDRP panelists are educators. They inform us about the ways in which parties win or lose on their claims and defenses. What to do and not do. In addressing this issue, I'm referring to less than 10% of cybersquatting disputes. For 90% or more of filed complaints, respondents have no defensible answer and generally don't even bother to respond. But within the 10%, there are serious disputes of contested rights (contested even where respondent has defaulted). more

Finishing What We Started: A Level Playing Field for New gTLDs

While the Internet governance debate devours headlines, it's almost easy to forget that ICANN is in the midst of the most audacious and important policy process it has ever undertaken. And while many new generic top-level domains are now live, the process of ensuring the best opportunity to fulfill their potential is not yet complete. We recently reached the milestone of 280,000 registrations in the Donuts gTLDs that are currently generally available. more

Court OKs Private Seizure of Domain Names That Allegedly Sold Counterfeit Goods

Luxury brand Chanel has engaged in a fierce campaign against counterfeit websites in federal court in Nevada. It has seized approximately six hundred domain names in the last few months, reports Venkat Balasubramani. "I'm sympathetic to the "whack-a-mole" problem rights owners face, but this relief is just extraordinarily broad and is on shaky procedural grounds." more

Why Private Support of Cyber Security Initiatives May Not Work

A fledgling international cyber security alliance is continuing to gather backing from private business, according to a recent article published on ComputerWeekly.com. The International Cyber Security Protection Alliance (ICSPA) aims to support law enforcement agencies in countries that lack the resources to fight cybercrime. Commercial security organizations such as McAfee and Trend Micro are supporting the alliance. more

Russian Cybercrime is Organized / Russian Cybercrime is Not Organized

The more I read, the more I see conflicting views on the state of the criminal cybercrime world. On the one hand, the Russian criminal cybercrime underworld is a scary, organized place... On the other hand, there is the position that that position is an exaggeration of what it is actually like and that it's a bunch of ragtag folks who have some advanced computer skills but they are not formally organized. ... I see this very similarly to how I see cyber warfare... more

ICANN Opens GNSO Whois Study on Privacy/Proxy Abuse for Comment

ICANN has opened the Generic Names Supporting Organization (GNSO) Whois study on privacy/proxy abuse for public comment. Performed by the National Physical Laboratory (NPL), this study is one of many commissioned by the GNSO to examine the current, disparate, and often maligned registration directory service, and aims to measure the hypothesis that "a significant percentage of the domain names used to conduct illegal or harmful Internet activities are registered via privacy and proxy services to obscure the perpetrator's identity." more

Wi-Fi 8: Beyond Speed, Towards Seamless Connectivity

As the IEEE 802.11 task force turns its attention to developing Wi-Fi 8, the next iteration of wireless networking standards, the focus has shifted from sheer speed to enhancing user experience. more

Psst - Interested in Some Lightly-Used IP Addresses?

The Internet Service Provider (ISP) community is carefully watching the impending depletion of the unassigned IPv4 address pool. Most estimates place the depletion of the central pool of unassigned IPv4 addresses by mid-2011. After that, each Regional Internet Registry (RIR) will continue to satisfy requests for additional IPv4 space for a limited time (depending on the rate of incoming requests and the amount of address space on hand in the RIR at the time of central pool depletion). more

League of Nations, United Nations, Next: United Cyber Nations

Though the "Techies" have been heavily involved in many initiatives like Internet Governance, Internationalized (Multi-lingual) Domain Names, Identity Management, Information Security, Access Rights Management etc., they still have to correctly apply the technologies at hand to be able to replicate many accepted norms that have matured in the physical world such as federated identities, non-repudiation, notarizing, witnessing, co-signing etc. more

Google Drops Out of Pentagon’s $10B Cloud Competition, Says Deal May Clash With Its AI Values

Alphabet Inc.'s Google has announced that it will not compete for the Pentagon's cloud-computing contract with an estimated value of $10 billion; says the project may conflict with its corporate values on artificial intelligence. more

6 Domain Name Industry Developments to Lookout for in 2014

2013 was one of the most exciting and forward-looking year for our Industry, and here we are, right at the beginning of 2014. Shall we look into the crystal ball and see what the horizon up ahead likely holds for us? We hope and foresee that a lot of everyone's hard work will eventually begin to pay off this year. We also believe that the industry will witness a huge change; opportunities and possibilities that were never before thought of. more

The Right to Internet Access

President Sarkozy of France recently managed to get his 'Création et Internet' law passed by the National Assembly, and if all goes well in the Senate then French internet users will soon find their activities being supervised by HADOPI, the grandly named 'Haute Autorité pour la Diffusion des Œuvres et la Protection des Droits sur Internet.' The rights it is concerned with are not those of ordinary net users but of copyright owners, and especially the large entertainment companies that have lobbied so hard and so successfully for the power to force internet service providers to terminate the accounts of those accused of downloading unlicensed copies of music, films and software... more