In 2020 a group of book publishers sued the Internet Archive over their Controlled Digital Lending program, which made PDF scans of books and lent them out from the Archive's website. For books still in copyright, the Archive usually limited the number of copies of a book lent to the number of physical copies of the book they had in storage. Several publishers sued with an argument that can be summarized as "that's not how it works." more
For all the many reasons raised by thousands of petitioners by prominent members of the U.S. Congress, and the California Attorney General's office, this "sale" plainly should not be occurring. However, in a very real way, it is déjà vu. For me, as one of the handful of people who were members of the original InterNIC public advisory committee which oversaw the spinout of the registry activity from its DARPA government instantiation to a private enterprise business... more
As a reader of this article, you are probably familiar with the DNS cache poisoning techniques discovered a few years ago. And you have most likely heard that DNSSEC is the long term cure. But you might not know exactly what challenges are involved with DNSSEC and what experience the early adopters have gathered and documented. Perhaps you waited with our own rollout until you could gather more documentation over the operational experience when rolling out DNSSEC. This article summarizes authors' experiences and learnings from implementing the technology in production environments as well as discusses associated operational issues. more
Adding to the flurry of gambling news of late, the Washington Court of Appeals issued a decision today that found peer-to-peer betting company (betcha.com) did not violate Washington state gambling laws. The court runs through some other issues underlying the statute, but the net result is that Betcha is off the hook... for now. Read more... more
A rewrite of the Rich Internet Application (RIA) article is my latest contribution to Wikipedia following last year's full rewrite of the Cloud Computing article (which is now finally fairly stable and one of the main authoritative sources on the topic; according to the article statistics I've just done my 500th edit, or one every eight hours on average so it's about as up-to-date as you'll find). Needless to say I agree wholeheartedly with Mozilla's Mark Finkle in saying RIA is Dead! Long Live Web Applications... more
Five years ago, any discussion of 5G included a vision that we'd end up with smart cars that were all connected with a ubiquitous 5G network that was going to be built everywhere. We're still waiting to see a real 5G network anywhere instead of the 4G LTE networks that are still being touted by every cellular company as 5G. The idea of a ubiquitous network capable of supporting smart cars died, but there is still an effort underway to use wireless technology to make car travel safer. more
A few days ago I wrote about a piece of my intellectual property, an article I wrote and posted on DaileyMuse.com, being stolen, plagiarized, and posted on another web site under a different authors name. I hadn't been looking for my work elsewhere, I was simply browsing the access logs and visiting other websites that stood out. As a result of finding my work posted elsewhere without my permission, I contacted the owner of the website by email and provided 24 hours to remove the content before I pursued legal action. more
The Internet is slowly beginning to adopt the new DNSSEC domain names standard, but significant challenges remain. That was the main takeaway from a four-hour workshop on the technology held during the recent ICANN 41 public meeting in Singapore, which heard from many domain registries, registrars and other infrastructure providers. more
DNS is not something that most people think about when using the Internet. Neither should they have to: the DNS is just part of the infrastructure in the same way that IP addresses are. The only time a user ought to notice the DNS is when it breaks (and it should never break). If that's true, then we ought to expect any Internet client - including web browsers - to use the very same infrastructure as everything else and for the DNS resolution mechanisms to be the ones offered by the operating system. What makes browsers different? more
Categories. The mere mention of the word risks eliciting groans from any domain industry specialist. In the run up to the new gTLD program, this concept was oft discussed. It seemed obvious to most that TLDs were not a homogenous ensemble but instead, could exist in many different shapes and sizes. Except to ICANN staff. They systematically refused to entertain the notion of categories. Even when ICANN Board members suggested some kind of recognition for different TLD types should be hardwired into the program! more
The new "dot-anything" domain extensions or "gTLDs" have been a major point of debate in the domain community for years now -- ever since they were just a glimmer in ICANN's eye -- and it's all come down to a few very important dates over the next six to nine months. more
In the end it was a disappointment that the treaty on International Telecommunications regulations (ITRs) that had been under negotiation for two weeks at WCIT-12 was not acceptable to 55 countries, and that, as a consequence, these countries did not sign the final version of the international treaty (89 did sign). After two weeks of sometimes fractious negotiation - 1,275 proposals were discussed in all - the contentious issues were significantly watered down. However the dissenting countries felt that the key issue - anything in relation to the internet - should not be included at all and, quite correctly, did not compromise on that. more
UK parliament has been the target of a "sustained and determined" cyberattack by hackers attempting to gain access to Member of Parliaments' and their staffers' email accounts. more
One of the key elements in any domain space is usage. It doesn't matter how potentially "cool" or "interesting" a Top-Level Domain (TLD) is if nobody is actually using it to provide content. It may be overused and totally abused, but "content is king"! The guys in dotMobi posted yesterday about some of the more interesting domains that they had come across recently. What did that lead to? Well I actually got out my phone and browsed the sites to see what all the fuss was about and I was truly impressed. more
A substantial amount of DNS community discussion on the topic of DNS Abuse is focused on defining what is or is not DNS Abuse. The definition adopted by ICANN contracted parties, as well as the DNS Abuse Institute, is straightforward: DNS Abuse is malware, botnets, pharming, phishing, and spam where it's a vehicle for the preceding harms. There is, of course, some fuzziness on the margins, where technical harms are also using content. more