Virtualization of core network services such as DDI has created a lot of controversy over the last couple of years. Perhaps most notably, Infoblox and Gartner have been both claiming that virtualized network services are not on the agenda of larger organizations, nor will they ever be. I'm not sure I have ever seen a convincing technological reasoning for this position. Rather, the logic has always been circular: it's not going to happen because we're not seeing it happening. more
United States District Court for the Southern District of Texas Galveston Division has denied plaintiffs motion for a temporary restraining order thus allowing IANA transition to proceed as planned. more
Ajit Pai recently wrote an article in the National Review where he talks about how his decision as head of the FCC to repeal net neutrality was the right one. He goes on to claim that repealing net neutrality was the driver behind the current boom in building fiber and upgrading other broadband technologies. He contrasts the progress of broadband in the U.S. with Europe and says that the FCC's action is the primary reason we are seeing a fiber boom in the U.S. more
Sen. Scott Wiener along with ten state assembly and Senate Democrats have proposed legislation which includes a number of ways to ensure telecom companies operating in California adhere to the principles of net neutrality. more
Burger King released a three-minute ad today trolling FCC's decision to repeal Net Neutrality rules. more
Earlier this week the Latin American and Caribbean TLD Association (LACTLD) put out a statement about ICANN meetings. The statement, which is available in both Spanish and English, while very polite and diplomatic, expresses the organisation's concerns with ICANN moving meetings out of Latin America due to health concerns. So far this year the meeting scheduled for Panama (ICANN 56) has been relocated to Helsinki. more
From time to time, we see unenlightened comments about the efficacy of laws in the fight against spam. "Laws won't stop spam" being the most common. No, they won't. What laws do is dissuade some people from undertaking shoddy mailing practices or even outright spam campaigns. Laws don't stop murder, rape and robbery either, but for those un-dissuaded who undertake such heinous crimes, we, as a society, have laws for punitive effect. They pay the price society exacts for their actions. C-28 will attenuate spam in Canada, and help us to fight spam internationally. more
I've been incredibly lucky in my time at Neustar to lead both the exceptional Registry and Security teams. While these divisions handle their own unique product and service offerings, it's clear that they have some obvious crossovers in their risks, opportunities and challenges. Having been closely involved in the strategy of both these teams, it strikes me that there is more we as Registry Operators and service providers can and should be doing to align the world of cybersecurity with that of domain names. more
For those interested in encouraging innovation in the domain name space -- which presumably includes the ICANN community currently convening in Dakar -- the recent episode in which VeriSign proposed, and then quickly withdrew, a bundle of new services (the VeriSign anti-abuse domain use policy) raises important issues that will be revisited as new gTLDs are introduced. Some of those issues are referenced in a recent blog post by Milton Mueller, but his emphasis on "due process" suggests a regulatory framework that is not friendly to innovation. more
In June 2016 the Organization for Economic Cooperation and Development (OECD) hosted a meeting of ministers to consider the state of the Digital Economy. The central message from this meeting was the message that: "Governments must act faster to help people and firms to make greater use of the Internet and remove regulatory barriers to digital innovation or else risk missing out on the potentially huge economic and social benefits of the digital economy." All well and good, and as a piece of rhetoric it seems to strike an appropriately positive note without straying far from what appears to be bland truisms of our time. more
Necessity has led Cubans to become do-it yourself (DIY) inventors -- keeping old cars running, building strange, motorized bicycles, etc. They've also created DIY information technology like software, El Paquete Semanal, street nets and WiFi hotspot workarounds. Last June the International Telecommunication Union (ITU) adopted a standard for "low-cost sustainable telecommunications infrastructure for rural communications in developing countries," L.1700. L.1700 cable should be of interest to both DIY technologists and ETECSA. more
Broadband providers are not taking the recent move by the FCC to reclassify broadband under Title II; i.e., put broadband under its regulation arm along with the likes of telephone companies, very lightly and have come out swinging to stop that effort... Seemingly at issue; an appeal brought by Comcast with the D.C. Court of Appeals and the subsequent defeat of the FCC's perceived role as a broadband regulator, ruling the communication had no authority under current legislation to sanction Comcast over a 2008 Internet throttling incident. more
As we reported in our Post-GDPR Compliance Rate retrospective in January 2020, registrar compliance rates in response to verified requests for redacted registrant information using the Appdetex WHOIS Requestor System was 25 percent. Our most recent report shows the compliance rate has increased to 27 percent, based upon a total of 243 requests for redacted WHOIS information sent to 68 registrars over the period starting January 1, 2020, through February 24, 2020. more
Domain Name System (DNS) Operators (Registries and Registrars) receive notices asking them to take action on a wide range of alleged technical and content-related abuses. However, there is a fundamental question of when it is appropriate to act at the DNS level and the evaluation of whether the alleged abuse meets a sufficient threshold for action at the DNS level. Additionally, given the volume of abuses occurring on the internet, existing resources, mechanisms, and protocols available in-house to Operators are in many cases insufficient to address abuses in a timely fashion. more
On Thursday, Stephen J. Lukasik passed away peacefully at the age of 88. He was the legend in a field with no peer. For nearly half a century, he shaped the development of national security and network technology developments at a level and extent that is unlikely ever to be matched. For a great many of us in that arena from the 1960s past the Millennium, he was the demanding visionary leader who set the policies and directions, framed the challenges, approved and funded the projects, and questioned the results. more