/ Most Viewed

An Update on the Closed Generics Debate

ICANN is currently seeking public comment on the subject of "closed generic" Top Level Domain (TLD) applications. A "Closed Generic" is a TLD that is a generic term, but domains within that TLD will not be sold to the public. There are those who object to generic terms such as .book being operated as closed registries, which means that domain names within the .book Top Level Domain as proposed by Amazon would not be sold to the public, but instead, Amazon.com would own and operate all domain names within the .Book Top Level Domain. more

Today’s Carrier Networks as Trollways?

As I keep pointing out -- there is indeed a viable alternative of a real marketplace not a fake one. Today's system is a fake because it depends on capturing the value of the application - communications - in the transport and that is no longer possible because with the Internet the value is created OUTSIDE the network. One example of the collateral damage caused by today's approach is the utter lack of simple wireless connectivity. Another is that we have redundant capital intensive bit paths whose only purpose is to contain bits within billing paths. more

Trademark Protection Dust-Up Obscures the Potential Value in New gTLDs

As a member of ICANN's Business Constituency I have heard first-hand the perfectly appropriate criticisms from trademark holders of ICANN's roll-out of new generic Top-Level Domains (gTLDs). But while it may be OK for branded companies to wish they didn't have to deal with the matter, the dust that has been kicked up has obscured real value in the program. more

Why Domain Name Security Matters Most?

In my recent CircleID post, DNS, Domain Names, and Certificates: The Missing Links in Most Cybersecurity Risk Postures, I highlighted the importance of applying multiple layers of defense to secure these business-critical assets. Last Friday, Brian Krebs, the world-renowned cybersecurity journalist, reiterated the criticality of domain name security because the domain name "e-hawk.net" was stolen from the rightful owner using social engineering tactics targeting its domain name registrar. more

Policy Advisory Board Model Now a Test of Multistakeholder Model

In early November 2013, prior to ICANN's Buenos Aires meeting, I published an article at this forum, Policy Advisory Boards – A Cornerstone PICS (Public Interest Commitment Specification), that extoled the advantages of adopting a Policy Advisory Board (PAB) model as a practical, effective, and least burdensome means of effectively implementing the request of ICANN's Governmental Advisory Committee (GAC) for consumer and competitive safeguards at sensitive new gTLD "strings" - especially those that are related to regulated industries and professions. It is deeply gratifying that the article has received nearly 9,000 views since first being posted and inspired considerable discussion. more

BlackBerry Service to be Suspended in UAE from October 11

Imran Ahmed Shah writes: Telecommunication Regulatory Authority (TRA) announced on Sunday to ban Blackberry Services, this ban will take effect on October 11. This ban will affect hundreds of thousands of BlackBerry users who access Internet, e-mail and messaging services on their mobile handsets. more

Designing Secure Networks with Cisco Technology, Part 2

In this multipart series I will be presenting some of the leading industry-standard best practices for enterprise network security using Cisco technologies... In Part 1 of this series, I provided an overview of the critical role that properly designed data security architectures play within an Internet-connected organization. Before we begin to discuss the security designs, processes and recommendations related to Cisco technology, let's first discuss some of the ways a network becomes unsecure... more

Key Steps for Operational Readiness and Successful Launch of a New gTLD

31 August 2013 marked a historic day for Internet users worldwide. It marked a very key day in the introduction of new gTLDs. On that day ICANN, who oversees the gTLD programme, six years in the making, announced the completion of gTLD Initial Evaluation (IE) results based applicant's ability to demonstrate their financial, technical and operational capability to operate and manage a TLD Registry. more

Some Thoughts on ICANN’s Next CEO

Now that the search has officially commenced, I thought it might be useful to make some public statements as to what I would like to see from the next ICANN CEO. My comments are driven by what I see as the deficiencies over the last number of years and, most importantly, by a deep desire to see the ICANN experiment in global governance succeed. The Internet is the greatest agent for positive change the world has ever seen and a healthy ICANN strengthens its ability to foster positive change. more

The Third Wave of Internet Exceptionalism

From the beginning, the Internet has been viewed as something special and "unique." For example, in 1996, a judge called the Internet "a unique and wholly new medium of worldwide human communication." The Internet's perceived novelty has prompted regulators to engage in "Internet exceptionalism," crafting Internet-specific laws that diverge from regulatory precedents in other media. Internet exceptionalism has come in three distinct waves... more

Cord Cutting in the US Continues in 4Q 2020

The largest traditional cable providers collectively lost over 1.3 million customers in the fourth quarter of 2020 -- an overall loss of 1.7% of customers. To put the quarter's loss into perspective, the big cable providers lost 14,158 cable customers per day throughout the quarter. The numbers below come from Leichtman Research Group, which compiles these numbers from reports made to investors, except for Cox, which is estimated. more

Making Multi-Language Mail Work (Part 1)

Mail software consists of a large number of cooperating pieces, described in RFC 5598. A user composes a message with a Mail User Agent (MUA), which passes it to a Mail Submission Agent (MSA), which in turn usually passes it to a sequence of Mail Transfer Agents (MTAs), which eventually hand it to a Mail Delivery Agent (MDA) to place it in the user's mail store. If the recipient user doesn't read mail on the same computer with the mail store (as is usually the case these days) POP or IMAP transfers the mail to the recipient's MUA. more

Belarus-Linked Hackers Target Diplomats, Likely With State Support

Foreign diplomats based in Belarus have been under the digital crosshairs of hackers with suspected ties to the Belarusian government for nearly a decade, security researchers revealed on Thursday. more

How Global Trends Arising from COVID-19 May Influence Online Brand Protection Strategies

We're in an interregnum where society has paused, and there's no telling how things may turn. In such times of crisis, we are the explorer; exploring the uncharted waters of change, where dangers and opportunities lie. How the pandemic caused this greater societal change may not be something that an individual can alter, we may, however, take the helm and navigate. more

Thoughts on Libra

Facebook has announced its Libra cryptocurrency. This is good news for cryptocurrencies and market-incentivized networks. I worry that Libra's financial inclusion might come with an attendent loss of privacy or autonomy. After months of speculation, Facebook on Tuesday announced Libra, a cryptocurrency with the mission of enabling a simple global currency and financial infrastructure that empowers billions of people. more