The security of the global Default Free Zone (DFZ) has been a topic of much debate and concern for the last twenty years (or more). Two recent papers have brought this issue to the surface once again - it is worth looking at what these two papers add to the mix of what is known, and what solutions might be available. The first of these traces the impact of Chinese "state actor" effects on BGP routing in recent years. more
Last week, I had the privilege of presenting at the Digital Marketing & gTLD Strategy Congress in London on how to create a TLD strategy and activate your path to market for launch. Some of the best and brightest minds in the industry attended and it was encouraging to hear from major brands such as Phillips, Microsoft, Google and KPMG, as well as a variety of other applicants. While in my previous blog I discussed why a .brand TLD strategy is important, let's now delve deeper into engagement strategies and why this is the key to a successful .brand. more
I've been posting photos and snippets during eComm 2009 this week, but composing my overall impressions has been another matter. Sitting through 3 days mostly filled with continuous 15 minute presentations is a surefire recipe to fry your brain, and most people I talked to were topped out well before things wrapped up Thursday night. It's information overload of the highest -- and best -- order... Here's my top-line takeaway, and reading the rest of this post is really just detail. But it's detail you'll probably love if you really want to know what you missed... more
Like several other engineers, I'm disturbed by the white spaces debate because it focuses on what I regard as the wrong question. The White Space Coalition argues that showing that a system can be constructed that prevents interference between White Space Devices and television broadcast signals compels the Commission to offer up the White Spaces for unlicensed use. This is far from obvious. more
I recently attended the Internet Corporation for Assigned Names and Numbers' (ICANN) 53rd meeting in Buenos Aires to further discuss the Internet Assigned Numbers Authority (IANA) transition process. During the meeting, public and private Internet stakeholders made important strides on a transition timeline, accountability planning and future management of the Internet that supports global creativity and innovation. more
Culminating a year-long policy development process, ICANN today launched its new Blocking Usage Review Panel (BURP). The BURP provides long-needed oversight over services that block Internet traffic. "While everyone understands that national laws such as the U.S. CAN SPAM define what traffic is or is not elegible to block, legal processes can be slow and cumbersome," said a spokeswoman. "Since the Internet is global and traffic often traverses multiple countries, the array of different laws cause uncertainty." more
The U.S. Anticybersquatting Consumer Protection Act ("ACPA") is a federal law -- part of the Lanham Act that deals with trademarks and unfair competition. It says that a person can be liable if he or she registers a domain name that contains another's distinctive trademark with a bad faith intent to profit from that mark. One issue that has arisen over the years is whether registration that can give rise to liability means only the first time the domain name is registered, or whether it applies to the re-registration... more
The Cuba Internet Task Force (CITF) held their inaugural meeting last week. Deputy Assistant Secretary for Western Hemisphere Affairs John S. Creamer will chair the CITF, and there are government representatives from the Department of State, Office of Cuba Broadcasting, Federal Communications Commission, National Telecommunications and Information Administration and Agency for International Development. Freedom House will represent NGOs and the Information Technology Industry Council will represent the IT industry. more
The blog on the need for a new internet received quite a bit of (international) attention, and with the assistance of colleague John Day, we would like to elaborate a bit further on this. I mentioned RINA as a good example that can be used to have a look at how such a new internet should look like. Interestingly the basics are not all that new. Already in the 1970s, but certainly two decades later, there were plenty of telecoms and computer engineers who started to understand that the future telecommunications work would have more to do with computing than with telecoms. more
Five years after ICANN approved the new gTLD policy in Paris, two years after it approved the implementation plan in Singapore, and a year after the application window closed and some concrete steps were taken toward delegation of new gTLDs, a series of scary-sounding "what if" scenarios have mysteriously taken over discussions at ICANN. From colliding names and failing life support systems to mass confusion and technological outages, the profusion of horror stories has rivaled the hype for the Y2K conversion, with about as much basis in fact. more
There has been considerable discussion about the future of broadband in terms of infrastructure i.e. fiber, wireless, community owned etc. However, there has been little discussion, to borrow a phrase from Internet 2, on Net+ broadband services. It is in the Net+ services where I think R&E networks can play a critical in helping communities and small commercial ISPs deploy advanced services and applications that will provide new business models to underwrite the costs of next generation broadband. more
The time for new Top-Level Domains is now! Read the open letter to the ICANN Board and sign the petition calling for the approval of the program... There is less than one week to go until the much anticipated ICANN Singapore meeting where the global Internet community expects the ICANN Board to approve the New gTLD Program and finalise plans for launch. more
Building on my last article about Network Assessments, let's take a closer look at vulnerability assessments. (Because entire books have been written on conducting vulnerability assessments, this article is only a high level overview.) What is a vulnerability assessment? more
I think it's fair to say that ICANN is in a state of near meltdown at the moment. With less than a week to go before the new gTLD program's first application window is opened, on Thursday January 12, 2012, the amount of work being done is mind-bending. The ICANN Board held a special meeting on January 5 to determine the program's state of readiness ahead of the launch. more
Over the past fifty years, participants in what began as the DARPA internet community have been turning out diverse technical specifications for TCP/IP network architectures and services. The first twenty years under government agency sponsorship were marked by rather free-wheeling sharing of ideas and collegial accommodation of divergent views typically found in most professional, academic activities. more