In looking back at what has occurred in the new TLD world in 2015, it is hard to believe that it's all taken place in just a short 12 month period. As an industry, we set off into this year realising that we had a hard game ahead -- as with all innovation, we knew that each step forward would require significant effort, knowhow and collaboration. We'd made big steps in 2014 to get started, but would 2015 move us forward or fizzle out? more
Will new gTLDs just be more of the same, or will they bring real diversity and innovation to the Internet's namespace? For Hong Kong based Stable Tone, applicant for two Chinese character IDN TLDs (?? or "Dot WORLD" and ?? or "Dot HEALTHY"), it's the smaller applicants that give the new gTLD program its soul. more
Open ascending price or English auctions are the oldest and most common auction form. Derived from the Latin words augere and auctus, "Auction" means to 'augment' via 'increasing'. While there are many theoretical types of auctions (ascending, descending, sealed-bid, second-highest bid, etc.) in this post we will focus on the two main types of auctions provided by Right of the Dot and Cramton. more
Studies have found only limited, insufficient agency adherence with FISMA's (Federal Information Security Management Act) continuous monitoring mandates. One survey found almost half of federal IT professionals were unaware of continuous monitoring requirements. A recent GAO report found that two-thirds of agencies "did not adequately monitor networks" to protect them "from intentional or unintentional harm." more
M-commerce (mobile e-commerce) incorporates a range of mobile-driven applications, including payments for parking and theatre tickets (m-payments) to mobile banking (m-banking). M-commerce is a broad field incorporating a large variety of services and business models. In 2011, according to Gartner Group, over 15 billion apps are expected to be downloaded worldwide via app stores. They also estimated app store revenues alone reached over $5 billion in 2010 (incorporating revenue generated from both apps purchases and advertising). more
Potential trademark Rights Protection Mechanisms (RPM) at the 2nd level can be divided into three main areas -- each defined by their time relative to Top-Level Domain (TLD) launch... Of these, we believe the third, "After Launch," is the most fruitful path to explore. We believe it offers the most potential to protect the rights of trademark holders, the best balance between TM rights and the legitimate rights of others who may want to register names , and the most benefit to the trademark community at the lowest cost to them... more
The essay outlines the necessary success factors for a niche search engine and raises doubt regarding the role of .Branding in niche engines' success. Some search engines want to target a niche market, not Google. Unlike Google, they're targeted and they are profitable that way. Consider Kayak (travel), Zillow (real estate), Yelp (reviews), and .xxx (adult websites). more
Censorship practices by governments and other private actors are becoming more increasingly more sophisticated, and their effects are increasingly being felt globally. A case in point, the YouTube incident in Pakistan was a recent example affecting both users and the DNS at a national and global level. Likely other incidents will occur in the near future. As such, I believe censorship should be considered as a threat to the stability and security of the DNS. In the context of Internet governance discussions, I believe the issue should be raised both at ICANN and the Internet Governance forum. Do others agree? more
For a brief moment earlier this week, I thought my days spent dreaming of hover-boards, flying cars and Biff's elusive Sports Almanac were finally over. From reports circulating online, we had finally reached "Back to the Future Day". Those movie buffs out there will know exactly what I'm referring to... But it got me thinking. What would the Domain Name world look like if that crazy cat Doc Brown swung past in his DeLorean, with a fully-charged flux capacitor and a return ticket to October 21st 2015? more
There have been a number of reports recently about customer lists leaking out through Email Service Providers (ESPs). In one case, the ESP attributed the leak to an outside hack. In other cases, the ESPs and companies involved have kept the information very quiet and not told anyone that data was leaked. People do notice, though, when they use single use addresses or tagged addresses and know to whom each address was submitted. Data security is not something that can be glossed over and ignored. more
Something has been bothering me for several months, and that usually manifests in a blog at some point. During the COVID-19 crisis, the FCC and big ISPs have repeatedly said that the only reason our networks weathered the increased traffic during the pandemic was due to the FCC's repeal of net neutrality and deregulation of the broadband industry. Nothing could be further from the truth. more
Existing laws can address AI challenges without new regulations. Legal frameworks have adapted to past technologies, and AI should be no exception. The real issue lies in outdated legal immunities, like Section 230, shielding tech companies from AI-driven harms. Accountability should focus on those who create and benefit from AI, not AI itself. more
I just came across a post telling of the Security and Human Behavior workshop. As some of you may be aware, I've been researching this subject for about two years now, and I am very excited that a conference has now happened! It means I did not waste the last two years of my life after all! more
Europe's governments are increasingly acting on the popular belief that the Internet should be a basic right, and that citizens not disposed to using IP-based services should nevertheless have access to its infrastructure. As such, governments either have already introduced legislation to this effect or are in the process of doing so. First off the block was Switzerland: from January 2008 Swisscom's 10-year renewed USO (universal service obligation) has included the provision of broadband at a regulated price. more
How do we make DNSSEC even more secure through the use of elliptic curve cryptography? What are the advantages of algorithms based on elliptic curves? And what steps need to happen to make this a reality? What challenges lie in the way? Over the past few months we've been discussing these questions within the community of people implementing DNSSEC, with an aim of increasing both the security and performance of DNSSEC. more