/ Most Viewed

ICANN Paints Itself Into a Corner

ICANN recently commissioned a report from a domain auction company to see whether it would be a good idea to auction Top-Level Domains (TLDs) that have multiple applicants. Remarkably, the domain auctioneers came to the conclusion that auctions are a great idea, which they surely are for some people. But are they a good idea for ICANN? And if ICANN admits they can't evaluate competing applications on their merits, how can they keep the process from turning into another speculative land grab? more

GNSO Council Review

The ICANN bylaws require a periodic review of ICANN structures and operations; the first of such reviews, that of the Generic Names Supporting Organization Council, is scheduled to be finalized in the next few weeks prior to the start of ICANN's annual meeting. To begin discussion on this topic, I draw your attention to a very thoughtful question posed by Joe Sims during the prior ICANN reform process... more

What Should PGP Look Like?

Those who care about security and usability - that is, those who care about security in the real world - have long known that PGP isn't usable by most people. It's not just a lack of user-friendliness, it's downright user hostile. Nor is modern professional crypto any better. What should be done? How should crypto in general, and PGP in particular, appear to the user? I don't claim to know, but let me pose a few questions. more

One Good Outcome from the Wall Street Journal: Google Flap

On Monday the Wall Street Journal published an article alleging that Google was trying to arrange a "fast lane for its own content" with telecom carriers and contending that Google and Professor Lessig were in the midst of changing their position on network neutrality policy. The WSJ reporters received a lot of flak for the piece -justifiably so. There was no real "news" in this news article. more

NIS2, ICANN and “Thick” WHOIS: A Mandate to Move Forward

The recent adoption at the end of December of the new EU Directive for a high level of cybersecurity across the Union -- commonly referred to as "NIS2" - paved the way for important updates to the domain name system (DNS). Most significantly, Article 28 of NIS2 and its related recitals resolved any ambiguities about the public interest served by a robust and objectively accurate WHOIS system that permits legitimate access by third parties to data... more

Understanding ‘Reverse Domain Name Hijacking’ Under the UDRP

"Reverse Domain Name Hijacking" (RDNH) is a finding that a panel can make against a trademark owner in a case under the Uniform Domain Name Dispute Resolution Policy (UDRP)... While neither the UDRP nor the Rules provide any further details or guidance, the WIPO Overview of WIPO Panel Views on Selected UDRP Questions, Second Edition, provides some insight into the circumstances in which panels have found RDNH. more

Report on Smart Grid Cyber Security

A recent report from Pike Research, "Smart Grid Cyber Security" has found if smart grids can realize their full potential, consumers, utilities, nations, and even the earth itself will benefit. As with nearly any new technology, the industry focus has been on getting smart grids up and running, often with little consideration for cyber security issues. more

How to Manage and Secure Big Data

Several developments are coming together in cloud computing that are creating shockwaves throughout society and in the economy. Over the last five years we have seen the debate about cloud computing hotting up. There was the hype around the new development at the same time as warnings regarding security and privacy, and for a while the market seemed subdued about the new development. However the economic reality of cloud computing meant that enterprises and government bureaucracies had little choice but to move ahead with cloud computing... more

Twitter Taken Down by DDoS Attack, Company Confirms

The Twitter micro-blogging service was knocked offline this morning for several hours as a result of a denial of service attack (DDoS). Twitter has confirmed and reported the attack in a post on its official blog earlier today: "We are defending against this [DDos] attack now and will continue to update our status blog as we continue to defend and later investigate." The company later reported that the service as been resumed but they are still continuing to defend against and recover from this attack. No further updates have been provided yet. more

.WEB is ICANN’s First Test of Accountability

Last month, in a much heralded international event, the agreement that ICANN held with the United States Department of Commerce was permitted to lapse and so ICANN became an independent manager of the Internet's addressing system. While some argued that the organization was not "ready" for the transition, the majority of ICANN's multi-stakeholder community, including Afilias, agreed that sufficient accountability measures were in place to ensure that ICANN remains a responsible (and responsive) international organization. more

Researchers Develop Tools to Help Map the IPv6 Address Landscape

While there are now billions of IPv6 addresses that could be active at any given time, there are no precise estimates as to how many or where they are. more

Preparing for the Launch of the Trademark Clearinghouse

With the Trademark Clearinghouse (TMCH) expected to begin accepting submissions within the next month or so, many companies are now attempting to identify marks for inclusion. As a reminder, the TMCH is a centralized repository of validated rights which will be used in support of ICANN's New gTLD Program. Submissions to the TMCH enable brand owners to register their trademarks as domain names during so-called Sunrise Periods. more

Cloud Computing Traffic Expected to Grow 12-Fold by 2015

Global cloud computing traffic is expected to grow 12-fold from 130 exabytes to reach a total of 1.6 zettabytes annually by 2015 -- a 66% compound annual growth rate -- according to Cisco's Global Cloud Index. 1.6 zettabytes is approximately equivalent to 22 trillion hours of streaming music; 5 trillion hours of business Web conferencing with a webcam; 1.6 trillion hours of online high-definition (HD) video streaming. more

How Will the New .AU Domain Licensing Rules Impact You?

The .AU Domain Administration (auDA) will soon implement new .AU domain administration licensing rules either late this year or early next year. These rules apply to new registrations and around 3 million existing domain names in the com.au, net.au, org.au, and more .AU namespaces... Previously, an Australian trademark application or registration may constitute the required Australian presence for an .AU domain name, but the domain name need not match the trademark. more

Susan Crawford to the White House on Ada Lovelace Day

Just in time for Ada Lovelace Day comes the news that Susan Crawford (Wikipedia, CircleID) is headed to the White House as special assistant to the president for science, technology, and innovation policy... more