A venerable old ITU tradition got underway today. Its Telecommunication Standardization body, known as the ITU-T, gathered, as it has done every four years for much of the past 100 years in a conclave of nations, to contemplate what they should be doing at their Geneva intergovernmental standards meetings for the next four years. The gathering is called the WTSA... Old intergovernmental institutional habits still continue, so the participants are gathered in a remote location in Tunisia called Hammamet. more
The Malaysian government has backtracked on its recent decision to require Internet Service Providers (ISPs) to redirect Domain Name System (DNS) traffic away from third-party servers like Google Public DNS and Cloudflare. more
The trademark rights required for standing under paragraph 4(a)(i) of the Uniform Dispute Resolution Policy (UDRP) refer to both registered and unregistered rights. Complainants with registered trademarks satisfy the requirement by submitting their certificates of registration. However, and not surprisingly, complainants with unregistered trademarks have to demonstrate that the alleged marks qualify as such, which requires that complainants prove both secondary meaning of the marks and their distinctiveness prior to the registration of the domain name. more
In a new documentary, filmmaker Ben Mendelsohn, takes a look at New York City's 60 Hudson Street as one of the world's most concentrated hubs of Internet connectivity. "Set in the dense, mixed-use neighborhood of Tribeca, the building's nondescript brick exterior conceals several network interconnection facilities where huge amounts of data are exchanged," writes Mendelsohn. The short documentary titled, "Bundled, Buried & Behind Closed Doors," takes a look at the history behind the building and a peak at the hidden infrastructure within. more
New top-level domain applicants are getting plenty of advice nowadays about how to launch their new Registry. In addition to thinking about their branding and distribution, they should also be thinking about their business practices with Registrars. What many of them do not realize is that their cash flow practices, with respect to Registrars, may be a factor of whether ICANN Registrars even support their Registry. more
One of the ongoing recommendations to improve deliverability is to send email that is timely and relevant to the recipient. The idea being that if you send mail a recipient wants, they're more likely to interact with it in a way that signals to the mailbox provider that the message is wanted. The baseline for that, at least whenever I've talked about timely and relevant, is that the recipient asked for mail from you in the first place. more
Apple CEO, Steve Jobs today announced the highly anticipated iPad and told the crowed that the company is now a $50 Billion a year company -- the majority of it being from sales of mobile devices including iPod, iPhone, and laptops. Now with the introduction of iPad, Jobs calls apple a mobile device company: "Apple is a mobile devices company. This is what we do." Jobs says Apple is the number one mobile devices company in the world. more
I work at APNIC, the Regional Internet Registry that serves the Asia Pacific Region. APNIC provides common infrastructure services for the region that support the unique assignment of IP address blocks to Internet network operators within our region through the operation of an address registry. In short, IP addresses are what we do. So, when there are discussions in technology circles about evolving the Internet's address model in varying ways,... more
The website designated by Dell Inc. to help customers recover from malicious software and other computer maladies may have been hijacked for a few weeks this summer by people who specialize in deploying said malware, reports Brian Krebs in KrebsOnSecurity. more
The voluntary Public Interest Commitments (PIC) have a long and sad history at ICANN. They were a process never created or evaluated by the Multistakeholder process, thrown together for one purpose and allowed to morph into a mechanism for an almost unlimited number of un-reviewed other purposes. Disputes are delegated to a resolution process which itself was never evaluated for... more
The UK government on Wednesday announced plans to introduce new laws for internet connected devices to better enforce the inclusion of basic cybersecurity features into IoT devices. more
The mainly politically-driven debate - FttH versus wireless broadband - is spreading uninformed messages and half-truths in the market. And confusing messages from mobile operators are also blurring the picture. All well-informed people confirm that this is a nonsensical debate -- both infrastructures will coexist with, and supplement, each other. more
Tech pundit John Gruber threw in the towel on his domain ?df.ws. He writes: "What I didn't foresee was the tremendous amount of software out there that does not properly parse non-ASCII characters in URLs, particularly IDN domain names." more
In previous posts in this series, I've discussed a number of applications of cryptography to the DNS, many of them related to the Domain Name System Security Extensions (DNSSEC). In this final blog post, I'll turn attention to another application that may appear at first to be the most natural, though as it turns out, may not always be the most necessary: DNS encryption. (I've also written about DNS encryption as well as minimization in a separate post on DNS information protection.) more
Microsoft has placed an experimental data center the size of a shipping container on the seafloor near Scotland's Orkney Islands to test the feasibility of saving energy by naturally cooling it in the sea. more