/ Most Viewed

Reconsideration Request Denied

Having been passed over by the "old guard" Board Governance Committee of ICANN Board of Directors, I took the occasion to speak from my heart to provide the "new guard" with the observations of a 16-year ICANN volunteer. For those of you in the community who are wondering what happened, what follows is word for word what I shared with the Board of ICANN at my closed door proceedings. more

Canada’s Electronic Spy Agency Makes Its Malware Analysis Tool Public

Canada's Communications Security Establishment (CSE) which rarely discloses detail of its activities has taken the "unprecedented step" of releasing one of its own cyber defense tools to the public, in a bid to help companies and organizations better defend their computers and networks against malicious threats. more

Growing Interest Abroad for Cloud-Based Email Infrastructure

Between September of 2015 and May 2016, (last 8 months) Port25 saw almost a 30 percent jump in new cloud-based email infrastructure interest outside the United States... While most of the influential senders are not abandoning on-premises mail transfer agent (MTA) solutions, many are looking to cloud infrastructure for managing higher-volumes by bifurcating individual email streams to the cloud. more

Unfamiliarity and Unpreparedness in Proceedings Under the UDRP

There is a difference, of course, between asserting a claim that cannot possibly succeed in an administrative proceeding under the Uniform Domain Name Dispute Resolution Policy (UDRP) and being unprepared to prove a claim that may have merit with the right evidence. Still, there is also an overlapping similarity in that complainants are either shockingly unfamiliar with UDRP procedures and jurisprudence... more

BYOD Woes and Worries

Like the scene of a movie in which a biblical character holds back the mighty sea and is about to release the tide against his foes, BYOD has become a force of nature poised to flood those charged with keeping corporate systems secure. Despite years of practice hardening systems and enforcing policies that restrict what can and can't be done within the corporate network, businesses are under increasing (if not insurmountable) pressure to allow a diversifying number of personal devices to connect to their networks and be used for business operations. more

Out of Office Alerts are So Out of Here

Do Out of Office alerts these days serve a purpose anymore? They seem to work well a decade ago when you were really out of the office and your computer sat under your desk and you couldn't check email till you got to it. Today, we as an industry and as individuals now have laptops, iPads, Smartphones, Wifi, WiMAX, etc. keeping us 100% of the time on the Internet at one time or another. And you know we all at one point throughout our days whether or not on vacation or after 5 PM check email as part of our everyday lives. more

Making a Strategic Decision: URS or UDRP?

A discussion is presently underway about the Uniform Rapid Suspension System (URS) (and in Phase 2 next year of the Uniform Domain Name Resolution Policy (UDRP)), whether it is performing as intended. The URS is less than five years old, and there are not an overwhelming number of decisions. Since 2013, rights holders have filed less than one thousand complaints (with three providers, the Forum being the most active), which translates into less than 170 decisions annually... more

Mueller Report: Russians Used Spear Phishing, SQL Injection to Penetrate US Election Administration

The nearly 400-page copy of the Mueller report released on Thursday includes some details on how Russia's foreign military intelligence agency (GRU), targetted individuals and entities involved in the administration of the U.S. elections. more

Website Usage Analysis in the New gTLDs

A recent study, by EURid and the Leuven Statistics Research Centre, set out to better understand the most common usage of websites that are linked to domains, and we thought it would be an interesting exercise to extend similar analysis to the new gTLD market. So, we analyzed all second-level domains registered in new gTLDs according to published zone files on June 29, 2014.  more

Security Experts, Privacy Advocates Hopeful Rollout of 5G Can Eliminate Surveillance Vulnerabilities

Security experts and privacy advocates see the rollout of the new 5G wireless network as a possible solution to eliminate surveillance vulnerabilities that allow spying on nearby phone calls. more

Framing New gTLDs’ Marketing Message

In an earlier essay, I outlined a focused, cooperative marketing strategy that would be a first step for marketing new gTLDs. After that first initiative, gTLD registries' marketing strategy must focus on the complementarities between .com, and new neutral (such as .global and .web) and branding and labeling gTLDs. The legacy domains and the newcomers can work together nicely. If we don't realize this, all Internet users will lose out. more

The Network of Probabilities

At eComm, I interviewed on stage Neil Davies, founder of Predictable Network Solutions. (Disclosure: they are a consulting client, we are working together to commercialise their technology.) The transcript of the interview is up on the eComm blog, titled The Internet is Not a Pipe and Bandwidth is Bad. Neil's achievement is a breakthrough advance in the use of applied mathematics to describe behaviours of statistically multiplexed networks. more

Cuba’s New WiFi Regulations – Good, Bad or Meh?

Soon after ETECSA began rolling out WiFi hotspots for Internet access, people began linking to them from homes and community street nets. These connections and importing the WiFi equipment they used were illegal, but generally tolerated as long as they remained apolitical and avoided pornography. Regulations passed last month legalized some of this activity in a bid to boost connectivity by allowing Internet access from homes and small private businesses like restaurants and vacation rentals that are located close enough to a hotspot to establish a WiFi connection. more

Some Hackers Earning Over 16 Times That of Full-Time Software Engineers in Their Home Country

A report from one of the largest documented surveys conducted on the ethical hacking community reveals some hackers are earning over 16 times that of full-time software engineers in their home country. more

Why African Telecom Union (ATU) Proposal Should be Rejected

My attention was drawn to the recent African Telecom Union (ATU)'s proposal for the modification and expansion of Resolution 47... As an affected party to the proposal, I feel obliged to make a comment: Recalling my last article to The Hill titled "ICANN is already under the influence of Foreign Governments", I drew an example of how ICANN allowed the African Union Commission, an Intergovernmental body to heavily interfere in the .Africa application so as to delegate it to itself, which led me to take ICANN to Court. more