/ Most Viewed

Does Eolas Patent Infringement Case Against Microsoft, Apple and Others Have Web Implications?

Eolas, a technology company that was awarded $565 million in a patent infringement settlement against Microsoft in 2007 is embarking on another campaign against others under the same grounds of patent violation. The latest lawsuit alleges that Apple and 22 companies are in violation of U.S. Patent Nos. 5,838,906 and 7,599,985, which involve embedded Web applications within a browser. The list of infringers also include Google/Youtube, Yahoo, Adobe, Amazon, Blockbuster, Citigroup, eBay, Frito-Lay, Go Daddy, J.C. Penney, JPMorgan Chase, Office Depot, Perot Systems, Staples, Sun Microsystems, Texas Instruments even adult-oriented Playboy. more

New Geographical Top-Level Domains and Auctions

I was surprised by ICANN's "Economic Case for Auctions in New gTLDs" paper especially with view to the latest presentation on the new generic Top-Level Domain (gTLD) implementation process in Paris. That Paris presentation highlighted the protection of community interests such as religious organisations, geographically based communities or indigenous groups and suggested a preference of bona fide community-based applicants against pure generic applications for the same string. Contrary to this the only text passage in the current paper where ICANN considered the community-based applicants is "a 25% bidding credit could be offered to community-based bidders whose community is located primarily in least-developed countries". This reminds me of the discussion on discounts for HIV medicine... more

Telcos Cannot Wind Back the Clock

The proposals by the European and Arab telcos that are being considered at the World Conference on International Telecommunications (WCIT) conference in Dubai later this year are most certainly facing defeat. This is not because the USA believes that the international telecommunications regulations (ITR) cannot be discussed by the ITU. America has a rather strange set of national regulations in which they have combined internet infrastructure and content -- and as such they claim that this no longer has anything to do with telecommunications. more

The Hybrid Cloud Impact on IPv6 Adaptation

Over the last couple of months, the enterprise computing space seems to have started a shift from private cloud paradigm into the hybrid cloud model. That makes sense, because the hybrid cloud allows companies to forgo the capital and the operating expenses associated with private clouds, in exchange for a pay-as-you-go model where you can just sit back and consume the business applications. more

Google’s Gigabit Gambit

Want a gig (1000 megabits per second) of Internet access bandwidth? Google says you could have it by the end of next year "from Manhattan to rural North Dakota (sic, I think they meant Vermont)" if their proposal to the FCC is accepted forthwith according to CNET's newsblog. Not only a gig but a mobile gig, accessible by cellphone or roaming computer -- no fiber required. Sound too good to be true? -- it isn't, IMHO! Engineering is not the problem... more

Luddites of the 21St Century Unite?

In the past few weeks doom and gloom stories about the future were printed, discussed and opined in the press. The down and out of the message of futurists is that the middle class is going to be swept away in the coming years because of software and robotic solutions (from here on: automated processes), making humans redundant... Do Luddites of the 21st century need to rise? I want to look at the topic from a few angles. more

Understanding the Modern DDoS Threat

The breadth of cyber threats that an organization must engage with and combat seemingly change on a daily basis. Each new technology, vulnerability or exploit vector results in a new threat that must be protected against. Meanwhile some forms of attack never appear to age -- they remain a threat to business continuity despite years of advances in defensive strategy. One particularly insidious and never-ending threat is that of the Distributed Denial of Service (DDoS) attack. more

The 2-Character Answer to this GAC Advice Should be “No”

ICANN's Governmental Advisory Committee (GAC) has reacted to the ICANN Board's November 2016 decision to authorize the release of two-character domains at new gTLDs with advice to the Board that does not have true consensus backing from GAC members and that relates to procedure, not policy. The Board's proper response should be to just say no, stick to its decision and advise the GAC that it will not consider such advice. more

ICANN Sets the Schedule to Kill Domain Tasting

Domain tasting, as everyone probably knows by now, is the disreputable practice of registering lots of domains, seeing how much traffic they get, and then using the five day Add Grace Period (AGP) to refund the 99.9% of them that aren't worth paying for. A related abuse is front running, registrars speculatively grabbing domains that people inquire about to prevent them from using a different registrar. more

German Authorities Seize Servers of Cybercriminal DDoS-for-Hire Service FlyHosting

FlyHosting had been open for business since November 2022 and was used for malicious activities such as hosting malware, botnet controllers, and carrying out DDoS attacks. more

IPv4 Market and IPv6 Deployment

IPv4.Global's Lee Howard will be a panelist at the Internet Governance Forum's session, "IGF 2020 WS #327 Believe it or not, the Internet Protocol is on Sale!" Preparing for this session has provided an opportunity to research how the IPv4 address market has affected the deployment of IPv6. There are a few spikes where a large number of addresses was transferred in a single transaction, most recently from APIDT.org. more

Call for Participation – ICANN 69 DNSSEC and Security Workshop, October 2020

If you are interested in presenting at the ICANN 69 DNSSEC and Security Workshop during the week of 17-22 October 2020, please send a brief (1-2 sentence) description of your proposed presentation to [email protected] by 27 August 2020. We are open to a wide range of topics related to DNS, DNSSEC, DANE, routing security, and more. There are some ideas in the Call for Participation below, but other ideas are definitely welcome, too! more

Maximizing Qname Minimization: A New Chapter in DNS Protocol Evolution

Data privacy and security experts tell us that applying the "need to know" principle enhances privacy and security, because it reduces the amount of information potentially disclosed to a service provider -- or to other parties -- to the minimum the service provider requires to perform a service. This principle is at the heart of qname minimization, a technique described in RFC 7816 that has now achieved significant adoption in the DNS. more

Amazon Will Thrive After COVID-19

Amazon has already received a retail windfall, but their infrastructure will be more critical in the long run. My final exam this term will include a take-home question: How will COVID-19 affect the fortunes one of the major Internet companies - Apple, Google, Facebook, or Microsoft? I didn't include Amazon because they are an obvious winner. On December 30, 2019 Amazon stock was selling for $1,847.84 per share and on May 1, 2020 it was $2,286.04, a 23.7 percent increase. more

TV Everywhere: Dangers in Being Second to Over-The-Top Competitors

Time Warner Cable and Comcast's intent in creating TV Everywhere conjured up a cable TV presence on the Internet where customers could browse and view huge varieties of content by just being a customer. That seemed a fairly simple and innovative concept... It was unique 3 years ago and promised to be exclusive to their clientele. But in reality the concept is much different than the original vision cable operators promoted. more