/ Most Viewed

The Internet Archive Hops Out of the Copyright Frying Pan Into a New and Different Fire

In 2020 a group of book publishers sued the Internet Archive over their Controlled Digital Lending program, which made PDF scans of books and lent them out from the Archive's website. For books still in copyright, the Archive usually limited the number of copies of a book lent to the number of physical copies of the book they had in storage. Several publishers sued with an argument that can be summarized as "that's not how it works." more

Reflections on the .ORG Domain Registry Sale

For all the many reasons raised by thousands of petitioners by prominent members of the U.S. Congress, and the California Attorney General's office, this "sale" plainly should not be occurring. However, in a very real way, it is déjà vu. For me, as one of the handful of people who were members of the original InterNIC public advisory committee which oversaw the spinout of the registry activity from its DARPA government instantiation to a private enterprise business... more

Operational Challenges When Implementing DNSSEC

As a reader of this article, you are probably familiar with the DNS cache poisoning techniques discovered a few years ago. And you have most likely heard that DNSSEC is the long term cure. But you might not know exactly what challenges are involved with DNSSEC and what experience the early adopters have gathered and documented. Perhaps you waited with our own rollout until you could gather more documentation over the operational experience when rolling out DNSSEC. This article summarizes authors' experiences and learnings from implementing the technology in production environments as well as discusses associated operational issues. more

Peer-to-Peer Gambling Wins in the Washington Court of Appeals

Adding to the flurry of gambling news of late, the Washington Court of Appeals issued a decision today that found peer-to-peer betting company (betcha.com) did not violate Washington state gambling laws. The court runs through some other issues underlying the statute, but the net result is that Betcha is off the hook... for now. Read more... more

Native Web Applications (NWA) vs. Rich Internet Applications (RIA)

A rewrite of the Rich Internet Application (RIA) article is my latest contribution to Wikipedia following last year's full rewrite of the Cloud Computing article (which is now finally fairly stable and one of the main authoritative sources on the topic; according to the article statistics I've just done my 500th edit, or one every eight hours on average so it's about as up-to-date as you'll find). Needless to say I agree wholeheartedly with Mozilla's Mark Finkle in saying RIA is Dead! Long Live Web Applications... more

Wireless Technology and Vehicle Safety

Five years ago, any discussion of 5G included a vision that we'd end up with smart cars that were all connected with a ubiquitous 5G network that was going to be built everywhere. We're still waiting to see a real 5G network anywhere instead of the 4G LTE networks that are still being touted by every cellular company as 5G. The idea of a ubiquitous network capable of supporting smart cars died, but there is still an effort underway to use wireless technology to make car travel safer. more

Automated Theft of Intellectual Property

A few days ago I wrote about a piece of my intellectual property, an article I wrote and posted on DaileyMuse.com, being stolen, plagiarized, and posted on another web site under a different authors name. I hadn't been looking for my work elsewhere, I was simply browsing the access logs and visiting other websites that stood out. As a result of finding my work posted elsewhere without my permission, I contacted the owner of the website by email and provided 24 hours to remove the content before I pursued legal action. more

DNSSEC Baby Steps Reported at ICANN 41

The Internet is slowly beginning to adopt the new DNSSEC domain names standard, but significant challenges remain. That was the main takeaway from a four-hour workshop on the technology held during the recent ICANN 41 public meeting in Singapore, which heard from many domain registries, registrars and other infrastructure providers. more

DNS Resolution, Browsers & Hope For The Future

DNS is not something that most people think about when using the Internet. Neither should they have to: the DNS is just part of the infrastructure in the same way that IP addresses are. The only time a user ought to notice the DNS is when it breaks (and it should never break). If that's true, then we ought to expect any Internet client - including web browsers - to use the very same infrastructure as everything else and for the DNS resolution mechanisms to be the ones offered by the operating system. What makes browsers different? more

Premium Generics, the Domain Industry’s Luxury Goods

Categories. The mere mention of the word risks eliciting groans from any domain industry specialist. In the run up to the new gTLD program, this concept was oft discussed. It seemed obvious to most that TLDs were not a homogenous ensemble but instead, could exist in many different shapes and sizes. Except to ICANN staff. They systematically refused to entertain the notion of categories. Even when ICANN Board members suggested some kind of recognition for different TLD types should be hardwired into the program! more

4 Key Dates on the gTLD Timeline

The new "dot-anything" domain extensions or "gTLDs" have been a major point of debate in the domain community for years now -- ever since they were just a glimmer in ICANN's eye -- and it's all come down to a few very important dates over the next six to nine months. more

WCIT-12 Disappoints, More Work to Be Done

In the end it was a disappointment that the treaty on International Telecommunications regulations (ITRs) that had been under negotiation for two weeks at WCIT-12 was not acceptable to 55 countries, and that, as a consequence, these countries did not sign the final version of the international treaty (89 did sign). After two weeks of sometimes fractious negotiation - 1,275 proposals were discussed in all - the contentious issues were significantly watered down. However the dissenting countries felt that the key issue - anything in relation to the internet - should not be included at all and, quite correctly, did not compromise on that. more

Cyberattack on UK Parliament Halts Email Access

UK parliament has been the target of a "sustained and determined" cyberattack by hackers attempting to gain access to Member of Parliaments' and their staffers' email accounts. more

Bringing a New Top-Level Domain to Life

One of the key elements in any domain space is usage. It doesn't matter how potentially "cool" or "interesting" a Top-Level Domain (TLD) is if nobody is actually using it to provide content. It may be overused and totally abused, but "content is king"! The guys in dotMobi posted yesterday about some of the more interesting domains that they had come across recently. What did that lead to? Well I actually got out my phone and browsed the sites to see what all the fuss was about and I was truly impressed. more

DNS Abuse Definition: Attributes of Mitigation

A substantial amount of DNS community discussion on the topic of DNS Abuse is focused on defining what is or is not DNS Abuse. The definition adopted by ICANN contracted parties, as well as the DNS Abuse Institute, is straightforward: DNS Abuse is malware, botnets, pharming, phishing, and spam where it's a vehicle for the preceding harms. There is, of course, some fuzziness on the margins, where technical harms are also using content. more