Antony Van Couvering from names@work writes that ICANN's constituencies are a "bad idea". While I am not sure to agree with him on the general principle, he makes some interesting remarks. Among others, he points out that the Generic Names Supporting Organization (GNSO) includes groups that seem to be redundant (the Business and Intellectual Property constituencies) and others like domainers which are not represented in the ICANN arena, yet are an integral part of the domain name business... more
According to reports, China Telecom has announced a complete schedule of IPv6 deployment including commercial trials currently underway. A full commercial launch is scheduled for 2012 while retreating from IPv4 network and services will begin in 2015. China Telecom has also announced various goals as part of the IPv6 transition which includes building a self-supporting IPv6 business and upgrading enterprise and residential gateways to support IPv6 access for government, enterprise and residential customers. more
The fifth-annual survey of domain name servers (DNS) on the public Internet -- called a "Pandora's box of both frightening and hopeful results" -- was released today by The Measurement Factory in partnership with Infoblox. more
The super storm has caused major power and Internet outages in a region that is home to more than 60 million people. Unsurprisingly, the impacts on Internet connectivity have been severe, reports Renesys. more
After the Brexit vote, I wrote that there could be an impact on EU registrants based in the UK. Over the past year, the UK government has been engaged in negotiations with the EU to navigate the application of Article 50 and the UK's exit from the European Union. While there has been a lot of focus on issues like the customs union and the border between Ireland and Northern Ireland, the eventual departure of the UK from the EU will have a tangible impact on the European digital economy. more
The cybersecurity workforce needs to grow by 145% to close the skills gap and better defend organizations worldwide according to a report released by (ISC)², a nonprofit membership association of certified cybersecurity professionals. more
Every now and then I get emails from readers of my blog. I mostly reply to them in private, but I recently got one question where I thought my reply might be of general interest. I took the liberty of editing the question somewhat, but in essence it was: "If you have any insight you can share with my class on cyber warfare and security, I would be delighted on hearing it." In general, I think that it's an obvious conclusion that both offensive and defensive actions with regard to national telecommunications infrastructure is becoming an integral part of a nations security assessments.... more
I've just arrived in Singapore, where ICANN's board will almost surely vote to launch an unprecedented expansion plan for generic top-level domains (gTLDs). As the new gTLDs start lighting-up over the next two years, we'll look back on this week as the "end of the beginning" since it ended several years of planning for the actual expansion. After the vote the real work begins: evaluating applications, implementing new mechanisms, and contract compliance on a scale far greater than ICANN has ever seen. more
I recently stepped into a new role as Chief Purpose Officer of Ethos Capital, a specialized investment firm focused on helping companies drive growth and transformation through technology. In doing so, we are committed to operating ethically, responsibly, and in the best interests of all stakeholders, including employees, customers, vendors and the broader community. more
FlyHosting had been open for business since November 2022 and was used for malicious activities such as hosting malware, botnet controllers, and carrying out DDoS attacks. more
In a recent article, I read about increasingly intrusive tracking of online users, which has lead to a proposal at the FTC, "FTC Chairman Jon Leibowitz said the system would be similar to the Do-Not-Call registry that enables consumers to shield their phone numbers from telemarketers." Maybe I'm dense, but even if this weren't a fundamentally bad idea for policy reasons, I don't see how it could work. more
At the Government Roundtable meeting in Amsterdam on 12 September RIPE NCC presented on her results on auditing Local Internet Registries (LIRs) and on the policy process concerning certification of her members. If this showed something to the world it is that cooperation with governments and law enforcement agencies (LEAs) pays off and self-governance can work. How did this come about? more
For the last twenty years, the industry has talked about broadband in cities as a duopoly, meaning there was competition between cable companies and telcos -- competition between cable modem broadband and DSL broadband. Twenty years ago, there was a true duopoly when the speeds on DSL and cable modem were close in capability. The market at that time demonstrated real duopoly behavior. more
A split Panel in an early decision under the Uniform Domain Name Dispute Resolution Policy (UDRP) held that parties deserve more than "[i]t depends [on] what panelist you draw." Time Inc. v. Chip Cooper, D2000-1342 (WIPO February 13, 2001). That's one side of the paradigm; the other side makes demands on the parties to prove their contentions, either of cybersquatting (one element of which is proving that respondent lacks rights or legitimate interests) or rebutting the claim (one element of which is respondent demonstrating it has rights or legitimate interests). more
"I've anticipated this day for ages -- the day when the first commercially available mass market hardware device based on our own secure operating system landed on my desk," writes Eugene Kaspersky, Chairman and CEO of Kaspersky Lab, in a blog post introducing company's layer 3 switch powered by Kaspersky OS. more