/ Most Viewed

Commodifying Words and Letters in the .Com Space

Words (and by extension their constituent letters) are as free to utter and use as is the air sustaining life. No one owns them. There is no toll fee to be paid to dictionary makers who curate them. There are, however, two carve-outs from this public domain, namely words and letters businesses use as designations of origin for their marketplace presence, protected by trademark law; and words and letters arranged expressively by authors, protected by copyright law. more

Happy Birthday BGP

The first RFC describing Border Gateway Protocol (BGP), RFC 1105, was published in June 1989, thirty years ago. By any metric that makes BGP a venerable protocol in the Internet context and considering that it holds the Internet together, it's still a central piece of the Internet's infrastructure. How has this critically important routing protocol fared over these thirty years, and what are its prospects? Is BGP approaching its dotage or will it be a feature of the Internet for decades to come? more

Call for ICANN to Educate and Not Mislead GAC

I read with interest the recent blog written by Theresa Swinehart a Sr. Advisor to the President on Strategy. She wrote: "The most critical element of this [ICANN Transition] process is trust and alignment. To ensure success on this accountability track, we must as a community work closely together to make sure that the final process is meaningful. There is plenty of work to be done in an ambitious period of time." more

Washington State Passes Country’s Toughest Net Neutrality Legislation

Washington may be the first state to approve a net neutrality law that applies to all wired and wireless Internet providers in the state. more

Nortel… The Good News: Web.Alive

Ok, ok - it's pretty hard to ignore the bombshell news that's on front pages everywhere today in Canada. It looks like Nortel is going to seek bankruptcy protection, perhaps as early as today. This may be a minor story in the U.S. business press, but it's a big story in tech/telecom, and a HUGE story here in Canada. You don't need me to tell you what Nortel means to Canada in terms of pride and joy, although that's more of a distant memory these days... more

‘Pokemon’ Domain Names are a No-Go

The legal issues surrounding the sudden success of "Pokemon Go" -- one of the world's fastest-growing apps or games -- are popping up as quickly as unhatched Eggs at a PokéStop. Within days of the game's release, the National Safety Council issued a call that "urges pedestrians to exercise caution while playing the Pokémon Go augmented reality game" and "implores drivers to refrain from playing the game behind the wheel." more

What’s Next for Dot-Org

When I began writing about the dot-org sale, it was out of concern for the loss of what I felt strongly was long understood to be a unique place in the Internet's landscape. Like a national park, dot-org deserved special protection. It turns out lots of people and organizations agreed. On April 30th, 2020, The ICANN Board upheld these values. They unanimously withheld consent for a change of control of the Public Interest Registry to a private equity firm. more

Cost-Effectiveness: The Prerequisite for Cybersecurity Regulation

Cybersecurity regulation is coming. Whether regulations intended to enhance critical infrastructure protection will be based on existing statutory authority, new legislation, an Executive Order or a combination of legal authorities, however, is still unknown. Other aspects of the coming federal oversight of critical infrastructure cybersecurity that remain undetermined include the extent to which governance system will include voluntary characteristics and the time frame for initiation of new cybersecurity regulation. more

Skype Takes a SIP of Cisco With UC500 Skype For SIP Certification

It's been a busy month for the folks in the Skype For SIP project. First, back on September 9, Skype announced ShoreTel interoperability. Then last week on September 17, Skype announced interop with the open source SIPFoundry sipXecs product. Today, though, is Skype's biggest announcement yet... more

The Why and How of DNS Data Analysis

A network traffic analyzer can tell you what's happening in your network, while a Domain Name System (DNS) analyzer can provide context on the "why" and "how." This was the theme of the recent Verisign Labs Distinguished Speaker Series discussion led by Paul Vixie and Robert Edmonds, titled Passive DNS Collection and Analysis -- The "dnstap" Approach. more

CAN-SPAM Plaintiff Slammed With $800K Attorney Fee Award - Asis Internet v. Optin Global

A federal court granted a request for attorney's fees (in the amount of $806,978.84) against prolific CAN-SPAM plaintiff Asis Internet. I thought things were looking good for Asis - whose lawsuits have generated substantial blog fodder - when it recently obtained a 2.5 million dollar default judgment in a spam case. more

Inconsistencies in ICANN New TLD Application Fees

In preparation for Monday's Joint Applicant Support (JAS) Working Group call, I spent some time reviewing various documents in connection with what are ICANN's actual costs in reviewing top-level domain name applications. One thing that caught my attention was the following metric in Rod Beckstrom's most recent CEO Monthly One Page Metric Report. more

SPIT is in Everyone’s Mouth, Though Not Yet in Everyone’s Ears

Spam over Internet Telephony (SPIT) is viewed by many as a daunting threat. SPIT is much more fatal than email spam, for the annoyance and disturbance factor is much higher. Various academic groups and the industry have made some efforts to find ways to mitigate SPIT. Most ideas in that field are leaning on classical IT security concepts such as intrusion detection systems, black-/white-/greylists, Turing tests/computational puzzles, reputation systems, gatekeeper solutions, etc... We identified the lack of a benchmark testbed for SPIT as a serious gap in the current research on the matter, and this motivated us at the to start working on a first tool for that. more

The Mobile Internet

It has been observed that the most profound technologies are those that disappear (Mark Weiser, 1991). They weave themselves into the fabric of everyday life until they are indistinguishable from it, and are notable only by their absence. The feat of reticulating clean potable water into every house, so that it is constantly accessible at the turn of a tap, is a great example of the outcome of large scale civil engineering projects, combining with metallurgy, hydrology, chemistry and physics. But we never notice it until it is no longer there. more

UDRP and Article 92(b) of EUROPEAN COUNCIL REGULATION (EC) No 40/94

It has been over a year since I posted "The Non-Parity of the UDRP", how little did I know then compared to now! Since that posting, the corporations and their lawyers have given me a crash course in the law and I have learned much. There are many tricks that corporations will play on a domain name registrant in order to silence criticism of the corporation and to violate the registrants right of freedom of expression without frontiers. The UDRP Administrative Proceedings is one such trick... more