/ Most Viewed

Video Interviews of IANA Stewardship Transition Coordination Group (ICG) Members

Want to know more about what is going on with the IANA Stewardship Transition Coordination Group (ICG)? ICANN recently published a set of video interviews with members of the ICG. Here, for instance is the interview with Alissa Cooper who represents the IETF on the ICG... While this is certainly not the complete list of ICG members, it is a good sampling of the variety of people involved with the ICG and does provide a range of different viewpoints into what is going on within the ICG process. more

Why Small and Medium-Size Operators Should Care About Sustainability

A new resource dedicated to small and medium-sized digital infrastructure providers highlights the benefits of incorporating sustainability into their operations, offers a consolidated list of best practices and recommendations, and shares additional resources to help make practical changes to save time, energy, and money. more

Tackling Cyber Security: Should We Trust the Libertarians? Part 2

A couple of months ago, I wrote a post posing the question of whether or not more government regulation is required in order to secure the Internet. On the one hand, anonymity is viewed in the west as a forum for freedom of speech. The anonymity of the Internet allows dissidents to speak up against unpopular governments. However, the anonymity afforded by the Internet is not so much by design as it is byproduct of its original designers not seeing how widespread it would eventually become. more

AI Has No Time for “Human” Rights

Popular media have recently reported a White House initiative asserting companies' "moral obligation" to limit the risks of AI products. True enough, but the issues are far broader. At the core of the debate around AI -- will it save us or destroy us? -- are questions of values. Can we tell AI how to behave safely for humans, even if in the future it has a "mind of its own"? It is often said that AI algorithms should be "aligned with human values." more

Encryption, Our Last Line of Defense

Encryption is fundamental to our daily life. Practically everything we do online makes use of encryption is some form. Access to our financial transactions, health records, government services, and exchanged private messages are all protected by strong encryption. Encryption is the process of changing the information in such a way as to make it unreadable by anyone except for those possessing special knowledge (usually referred to as a "key"), which allows them to change the information back to its original, readable form. more

Internet Governance Survey: What You Told Us

What do people perceive to be the top issues facing the Internet today? How can stakeholders work more effectively together to strengthen the governance mechanisms meant to address these issues? And when it comes to the Internet Society, what should our role be and where should we focus our attention? To help inform our work in Internet governance, we posed these and other questions to our community in February. We had an overwhelming response with over 800 people taking a few minutes of their time to answer our survey. more

A Lesson from the Environmental Protection Agency (EPA) in Domain Name Disputes

While the U.S. Environmental Protection Agency (EPA) has been making news as the result of controversial changes brought about under the new Trump administration -- including the planned removal of "several agency websites containing detailed climate data and scientific information" -- the EPA also has generated some (lesser-known) domain name news: The agency won a decision under the Uniform Domain Name Dispute Resolution Policy (UDRP) for the domain name noattacks.org. more

A Record Year for Domain Name Disputes?

With just a little more than three months left in 2016, the number of domain name disputes filed at the World Intellectual Property Organization (WIPO) appears to be headed for a record year. According to public data published on the WIPO website, the current number of domain name disputes filed this year (as of this writing, September 27, 2016) is 2,228 - which would indicate that the total might reach 3,011 cases by December 31. more

Macro Observations Facing Email Infrastructure

Last month I attended the 36th annual M3AAWG conference in San Francisco, where esteemed members of the online messaging and anti-abuse community come together to make the Internet a safer and more secure environment. The sending community is highly influential especially among Email Service Providers (ESPs) and truly dominated the two-macro conversations that I participated in. These conversations have the industry in somewhat of a transition. more

Advantages of gTLD Portfolio Ownership

The essay outlines the advantages to owners of managing a portfolio of gTLDs. The advantages can lead to concentrations of ownership in a few hands, which is unavoidable but not necessarily harmful to consumers. Moreover, some of the advantages can lead to profitable complementary business models. Beyond the obvious advantage of economies of scale that lead to reductions in operating costs, there are a number of other sources of advantage. more

The ICANN Board by the ICANN Board

A self-appraisal of the ICANN Board has just been posted on the organization's website. In it, Board members rate 89 different measures of their own performance according to a seven-measure rating from "strongly agree" to "strongly disagree". Unfortunately, despite plenty of figures in the documents, there is zero analysis of what this all means, so I have gone through them and prepared one. more

Telecom Heroics in Somalia

Internet service in and around Mogadishu, Somalia suffered a crippling blow recently as the East African Submarine System (EASSy) cable, which provides service to the area, was cut by the anchor of a passing ship. The government of Somalia estimated that the impact of the submarine cable cut was US$10 million per day and detained the MSC Alice, the cargo vessel that reportedly caused the damage. more

Poland Launches Eastern Europe’s First Commercial LTE Network

Paul Budde writes: "Two relatively new mobile market entrants, Mobyland and Centernet, have launched Poland and Eastern Europe's first commercial LTE network. Vendor Huawei provided the equipment for the network, which operates in the 1800MHz frequency band. Both Mobyland and Centernet previously offered GSM services in the frequency band before refarming the spectrum to offer LTE. The operators aim to expand coverage to 20% of the population by 2011 by deploying 700 base stations." more

Amazon’s Satellite Ambitions Finally Lift Off: Project Kuiper Enters the Low-Earth Orbit Race

After several delays due to bad weather, Amazon's Project Kuiper finally launched its first batch of low-orbit broadband satellites on April 28. The company says it is in communication with all 27 new satellites. Amazon used a United Launch Alliance (ULA) Atlas V rocket launched from Cape Canaveral. Amazon is under pressure to get the launches going and has a commitment to the FCC to launch 1,618 satellites by July 2026. more

TMCH Review Recommends Status Quo

On July 25th ICANN announced the publication of the Draft Report of the Independent Review of the Trademark Clearinghouse (TMCH). This study was coordinated for ICANN by the Analysis Group, in conjunction with researchers from the Center for Internet and Society at Stanford as well the University of Pennsylvania's Wharton School... while public comments on the draft report will be accepted through September 3rd, this Report was triggered by GAC concerns expressed before the Applicant Guidebook for the new gTLD program was even completed, and is not the work product of a GNSO-created working group and therefore will not directly result in the establishment of any new ICANN policy. more