/ Most Viewed

An Analysis of Microsoft’s MARID Patent Applications

The IETF MARID working group has been slogging away all summer trying to produce a draft standard about e-mail sender verification. They started with Meng Wong's SPF and Microsoft's Caller ID for E-mail, which got stirred together into a hybrid called Sender ID. One of the issues hanging over the MARID process has been Microsoft's Intellectual Property Rights (IPR) in Caller ID and Sender ID. The IETF has a process described in RFC 3668 that requires contributors to disclose IPR claims related to their contributions. more

A Psychoanalysis of Corporate Domain Names and Branding - Part I

A corporate name of any merged entity, at best, is really an outcry from the deep bottom of a corporation, all in search of attention and in pursuit of fame and glory. Whether you read a corporate brand name in a column, see it in a phone book, hear it on a radio, TV or come across it on the web, the name is always, a real show-off with a desperate mission to seek all the attention it can get...a corporate brand name is the single most important issue of corporate communications today. Equally, a domain name, the twin of a corporate name, still as to most CEOs, it is the most misunderstood term of corporate communications. Even now, domain name issues are often left to webmasters, ISPs and, sometimes to lawyers. It has yet to earn the respect as the single most important issue of e-Commerce and also to earn the respect as a real and a true passkey for global access for the web. more

OECD Reports on State of IPv6 Deployment for Policy Makers

OECD, Organization for Economic Co-Operation and Development, has released a report for policy makers assessing the level of IPv6 deployment around the world. "[T]he timely deployment of IPv6 by network operators and content/application providers is an increasing priority for all Internet stakeholders. In terms of public policy, IPv6 plays an important role in enabling growth of the Internet to support further innovation. In addition, security, interoperability and competition issues are involved with the depletion of IPv4." more

Let’s Not Forget About Solar Flares

As the world becomes more and more reliant on electronics, it's worth a periodic reminder that a large solar flare could knock out much of the electronics on earth. Such an event would be devastating to the Internet, satellite broadband, and the many electronics we use in daily life. A solar flare is the result of periodic ejections of matter from the sun into space. Scientists still aren't entirely sure what causes solar flares, but they know that it's somehow related to shifts in the sun's magnetic field. more

WSIS: What Is It ‘Really’ All About?

Until a few weeks ago, almost everyone in the Internet governance circus seemed to ignore the very existence of WSIS. After it popped up on international newspapers, however, things have been changing; and suddenly, I have started noticing plenty of negative reactions, on the lines of "we don't need WSIS, we don't need the UN, we don't need governments, we don't need internationalization - just go away from our network". However, I often find that these reactions are based on fundamental misunderstandings of the issues at stake; so please let me offer a different perspective. more

Technology Adoption in the Internet

How are new technologies adopted in the Internet? What drives adoption? What impedes adoption? These were the questions posed at a panel session at the recent EuroDiG workshop in June. In many ways, this is an uncomfortable question for the Internet, given the Internet's uncontrolled runaway success in its first two decades. The IPv4 Internet was deployed about as quickly as capital, expertise, and resources could be bought to bear on the problem... more

Who is Blocking WHOIS?

On April 16 ICANN issued a breach notice to Turkish Registrar Alantron for not consistently providing access to its WHOIS database via Port 43, a command-line query location that all Registrars are required to supply under conditions of their contract with ICANN under section 3.3.1. Four days later they issued a breach to Internet Group do Brazil for the same problem. ... The WHOIS record, as we all know, is a massive fraud with illicit parties filling records with bogus information and hiding behind anonymity. more

VIPR: New Developments in the VoIP Market

This is a new development in the VoIP market. This is how one of my colleagues, Cullen Jennings explained it to me. Today we have two widely deployed global identifiers for reaching people. One is delegated address out of DNS and the other is phone numbers. So I consider an address like email: [email protected] or xmpp:[email protected] to roughly be out of the DNS namespace and phone number to be out of the E.164 name space. Phone numbers have lots of parts that are not cool, but they also have some cool parts... more

Is There a Positive Business Case for IPv6? We Are About to Find Out, If You Help Us…

Large-scale IPv6 deployments suggest that IPv6 is at least a technical success, the technology works. Time to visit the other important question: does it work commercially. Does IPv6 really come with a positive business case? We are about to find out, if you help us... The Internet technical community has spent about two decades making IPv6 work on a technical level. We have developed the protocol, modified and expanded a few others; we set up the registry system and distributed the addresses. more

Will Stonewalling on .xxx Be Beckstrom’s First Big Mistake?

The .xxx controversy is a legacy of the Bush era. In the dark period of WSIS and the Iraq invasion, ICANN's independence was fatally undermined when a political appointee of the Bush administration, in response to an email campaign from rightwing groups in the Bush "base", issued a direct threat to Paul Twomey that if ICANN approved the .xxx Top-Level Domain (TLD) it would not put it in the root. more

10 Reasons Why Involving Government in Spam Control is a Bad Idea

1. Many jurisdictions already have laws which cover abuse of computer systems and networks -- and spam is of course abuse. These laws are only sporadically enforced, however, usually when a sufficiently visible/powerful entity is the aggrieved party. Adding more laws (a) is redundant and (b) does not increase enforcement. 2. Laws are only enforced as law enforcement has resources available. Spam/abuse is not a high priority unless a sufficiently visible/powerful entity makes it so, and those cases are rare. more

98% Of Internet’s Main Root Server Queries Are Unnecccary: Should You Be Concerned?

A recent study by researchers at the Cooperative Association for Internet Data Analysis (CAIDA) at the San Diego Super Computer Center (SDSC) revealed that a staggering 98% of the global Internet queries to one of the main root servers, at the heart of the Internet, were unnecessary. This analysis was conducted on data collected October 4, 2002 from the 'F' root server located in Palo Alto, California.

The findings of the study were originally presented to the North American Network Operators' Group (NANOG) on October 2002 and later discussed with Richard A. Clarke, chairman of the President's Critical Infrastructure Protection Board and Special Advisor to the U.S. President for Cyber Space Security. more

Remembering Jon: Looking Beyond the Decade

A decade has passed since Jon Postel left our midst. It seems timely to look back beyond that decade and to look forward beyond a decade hence. It seems ironic that a man who took special joy in natural surroundings, who hiked the Muir Trail and spent precious time in the high Sierras was also deeply involved in that most artificial of enterprises, the Internet. more

Neustar and .GPRS

Ever since Neustar announced they signed a deal with GSMA to oversea global database for the mobile operators last week (see also Washington Post), there are many debates about the deal online. "Neustar, a company that should certainly know better, has announced that they're going to create a .gprs TLD to serve the mobile phone industry This, of course, requires creation of a private root zone, against the very strong warnings in RFC 2826" said Steven Bellovin. To the more supportive John Levine: "This isn't quite as stupid as it seems. The GSM industry needs some way to maintain its roaming user database, the database is getting considerably more complicated with 3G features, and it looks to me like they made a reasonable decision to use DNS over IP to implement it rather than inventing yet another proprietary distributed database." more

URLs, IP Numbers, and Speech

There's a great fight going on right now in Philadelphia...The case is about a Pennsylvania statute [PDF] that mandates that Pennsylvania ISPs remove access to sites that the AG believes contain child pornography. Now, child pornography is abhorrent and any ISP will cooperate in taking down such sites that it is hosting. But the problem is that in complying with the statute with respect to sites the ISPs don't themselves host, ISPs are (rationally) using either IP blocking ("null routing") or "domain poisoning" techniques, both of which (particularly the IP number blocking) result in rendering inaccessible millions of perfectly legal sites. more