First of all, I am biased. I am a common sense thinker who tries to analyze risk and reward based on societal trends and conventional wisdom. Watching the new gTLDs (generic Top Level Domains) launch over the last 2 years reminds me of the circus we are now seeing in the U.S. election. Myself, a self-proclaimed libertarian, can now be labeled as the establishment, while the so-called "outsiders" act and behave like they are not politicians yet seem to be masters of messaging and propaganda. more
At the time of this writing DNSSEC mostly does not work. This is not a bad thing - in fact it's expected... There is a significant last-mover advantage DNSSEC deployment (or IPv6 deployment) and that can't be helped. It's all in a good cause though - everybody knows we need this stuff and some farsighted contributors put a lot of money and other resources into DNSSEC years or decades ago to ensure that when the time comes the world will have a migration path. Sadly, this leaves current investors and application designers and developers wondering whether there's a market yet. more
Web traffic delivery surged to record levels during President Barack Obama's inauguration yesterday, according to content delivery network provider, Akamai. As the largest day ever for the delivery of concurrent live streaming over Akamai's global servers, the company reported it delivered a peak of over 7 million active simultaneous streams (the majority being live streams) at approximately 12:15 p.m. ET on Tuesday, January 20, 2009. Typical simultaneous streams on an average day are less than 1 million. more
The essay expands a cooperative solution to third-party use of brands in domain names. Like any approach that depends on cooperation, the solution will require both sides to change behavior but also allow both sides to take credit for the resulting benefits, i.e. a triangular solution. If not immediately addressed, the problem of third-party use can become a major threat to the industry. But we already know one thing: when it comes to this issue, legal action and bullying don't work. more
Those of you familiar with the American comic series "Peanuts" by the late Charles Schultz may be familiar with the recurring theme of Lucy's football. Lucy holds a football on her toe for Charlie Brown to practice a field goal kick. Charlie Brown realizes that the last 25 times Lucy has held the ball for him to kick, she pulled the ball out of the way at the last minute, causing him to trip and fall. Charlie Brown knows full well that Lucy may not keep the ball in place for him to kick, yet his determination gets him running towards that unlikely opportunity each and every time. more
As someone closely involved with the Australian National Broadband Network (NBN) and many other fibre plans around the globe, I would like to provide an inside picture of the revolutionary developments that are taking place in the Australian broadband market. Australia's national broadband network will be an FttH-based open wholesale network -- a network that will connect (not pass) 90% of all Australians to fibre, with the remaining 10% of the population being linked to that network through technologies that are capable of delivering equivalent services. more
While people may debate the death of email, there is no question that many email servers are already overloaded with spam. Current spam solutions are beginning to address the problem, but so far they all suffer from the arms race issue - as fast as we come up with new ways to fight spam, spammers are finding new ways to deliver it to us. While the functionality of email will certainly continue, the current system must change. When the change comes, it will deliver the future of email to Microsoft. more
I'm going to try something new here. I'm sitting here at the ICANN meeting on whois and I'll try to jot down some of my thoughts as they occur to me in reaction to what is being said:
- What is the "purpose" of whois? When a person acquires a domain name he/she has a decision to make: whether he/she will give the vendor/registrar his/her personal information? (If not, the person might have to forego getting the name, but that's his/her choice.) It seems that that is the context in which we need to evaluate the "purpose" of whois. In other words, the person relinquishes the information for the purpose of acquiring a domain name and not the broad panopoly of uses that have grown around whois. more
One of the most profoundly disruptive developments occurring in the cyber security arena today is the headlong rush by a set of parties to ubiquitously implement extreme End-to-End (e2e) encryption for communication networks using essentially unbreakable encryption technology. A notable example is a new version of Transport Layer Security (TLS) known as version 1.3. The activity ensues largely in a single venue... more
The fact that the market for mobile phones that provide Internet access (aka "smart phones") is predicted to increase during the next several years, with global shipments growing to an impressive nearly 125 million units in 2009, means the competition for bridging mobile content and mobile phone use is likely to be keen. Indeed, dotMP already must face competition for registry services that will target mobile phone users. A few of the biggest names in information technology and mobile communications -- led by Nokia and including Microsoft, Vodafone, HP, Orange, Samsung and Sun Microsystems are planning to wedge into the Top-level Domain name space (TLD) by supporting a new TLD registry for mobile web content focused on web pages built specifically for access by mobile devices like smart phones and handheld computers or Personal Digital Assistants (PDAs)... what may set dotMP apart from the technology giants led by Nokia, is a significant value added benefit to its domain name registration services...it will protect the privacy of its registrants. more
The announcement this week that DotAsia will work with Pool.com on an auction system to introduce its new domain names is a good reaction to problems of the past. Previous launches worked (sometimes not well) on a first-come, first-served basis. For example, sex.eu had over 280 potential applications but only the first was even considered. Yet, today, nearly 2 years later, the domain application is still being reviewed... more
Apple has reportedly removed nearly 60 VPN apps from its Russia App Store, significantly higher than the 25 VPNs acknowledged by Russian authorities, according to a recent report by the App Censorship Project. more
A new type of domain-name hijacking is being carried out unnoticed. It involves third-level domain-names associated with affiliate programs. If you had been an online affiliate of, say, company xyz.com, your affiliate Internet address could have looked like YourCompanyName.xyz.com. more
ICANN has submitted the first report of what will be a series of annual reports summarizing its "expierince" with the Whois Data problems and inaccuracies. While emphasizing that "ICANN-accredited registrars are obligated by the terms of their accreditation agreements to investigate and correct any reported inaccuracies," the report provides the following conclusions: more
Negotiation processes in the UN are remembered not just for what came out of them, but also for what they were like, who participated, and how they were conducted. People who participated in the first World Summit on the Information Society (WSIS) back in 2003 and 2005 often talk about the process, its challenges and its achievements. more