/ Most Commented

In Which We Explore the Federal Laws that Apply to Cyberstalking

Tragedies frequently result in flurries of legal activity. Last years witnessed the Myspace tragedy in which a 13 year old girl committing suicide. Unfortunately stalking laws have been clumsy tools that are difficult if not impossible for law enforcement officials to wield. Where existing laws respond poorly to tragedies, the option behind Door Number One is to enact a new law, and the option behind Door Number Two is to argue for a reinterpretation of current law that would somehow miraculously shoehorn the tragedy into the law. Unlike game shows, legal contestants can pick both doors -- which is what happened in this case. more

An Astonishing Collaboration

Wow. It's out. It's finally, finally out... So there's a bug in DNS, the name-to-address mapping system at the core of most Internet services. DNS goes bad, every website goes bad, and every email goes...somewhere. Not where it was supposed to... I'm pretty proud of what we accomplished here. We got Windows. We got Cisco IOS. We got Nominum. We got BIND 9, and when we couldn't get BIND 8, we got Yahoo, the biggest BIND 8 deployment we knew of, to publicly commit to abandoning it entirely. It was a good day... more

Battling Over Clouds

More than 40 years ago, the FCC was worried about telephone companies using their power over communications to control the then-nascent (and competitive) data processing marketplace. The Bell System at that point was already banned from providing services that weren't common carriage communications services (or "incidental to" those communications services)... In a 1999 article in the Texas Law Review, Steve Bickerstaff pointed out that Computer 1 meant that no one could provide a "computer utility" service... Today, we'd call the "computer utility" something different -- we'd use the term "cloud computing." more

Google, Viacom, Privacy and Copyright Meet the Social Web

In all the recent uproar (New York Times, "Google Told to Turn Over User Data of YouTube," Michael Helft, 4 July 2008) about the fact that Google has been forced to turn over a large pile of personally-identifiable information to Viacom as part of a copyright dispute (Opinion), there is a really interesting angle pointed out by Dan Brickley (co-creator of FOAF and general Semantic Web troublemaker)... more

ICANN’s New gTLD Process: Hype and Reality

At its 32d International Junket Meeting last week, ICANN's Board approved the GNSO Council's recommendations for the eventual addition to the root of new generic top-level domains (gTLDs). This means that eventually, when the staff drafts, community comments upon, and Board approves implementation processes, those with deep pockets will have the opportunity to bid for new TLD strings... more

IPv6 and MEID’s… Stop Choking on 32 Bits

Both the Internet and North American cellphones are choking under a 32 bit limitation and reactions from protagonists involved in both cases offer striking similarities. 1983 saw the debut of IPv4 and North American mobile telephony started in earnest with Bell's analog AMPS (Advanced Mobile Phone Service). Responding to the need to uniquely identify the growing number of mobile devices in order to bill their owner, the FCC ordered that handsets be equipped with a unique identification number embedded on a chip. This became the 32 bit ESN... more

ICANN to Add New Top-Level Domains, World to Come to an End

The biggest buzz from the Paris ICANN meeting was that the board accepted last fall's proposal for a streamlined process to add new TLDs. A variety of articles in the mainstream press, many featuring inflammatory but poorly informed quotes (from people who probably got a phone call saying "We go to press in five minutes, what do you think about ICANN's plan to add a million new domains?") didn't help. When can we expect the flood of TLDs? Don't hold your breath... more

Why New TLDs Don’t Change a Thing

I have a heard a lot lately about ICANN unanimously voting in favor or relaxing top level domain rules and had a few people come to me and ask 'how does that affect what you do?' The short answer is, it won't; at least not for a long time and here is why... There might be some huge potential gain if all shoe companies got .shoes and branded it, but someone would have to manage it and each would have to spend money to brand .shoes to consumers. Adidas gets adidas.shoes but spends nothing to brand it and lets Nike pay to brand .shoes and Reebok to brand it as well and leech. So instead of cartel like behavior (which is hard to maintain), we fall back into .com more

Identifying Spam: MAAWG’s Latest Documents Improve Accuracy of Reputation Systems

The Messaging Anti-Abuse Working Group (MAAWG), of which Return Path (my employer) is a very active participant, met recently in Heidelberg, Germany. Among other exciting projects, they finished two new best practices documents which have been lauded in the press as a big step towards stopping botnet spam... more

ICANN Takes First Step to Becoming a Global Content Regulator

There has been wide coverage of ICANN's decision this week to adopt a new process for creating new global Top Level Domains (gTLDs). Publishing a clear, transparent and objective process is thought likely to result in a considerable expansion of gTLDs -- although nobody really knows whether this means "quite a lot" or "many thousands"... Less attention has been given to one of the new tests ICANN will use when considering whether to approve a new gTLD, contained in GNSO's sixth recommendation... more

The FCC Stumbles Into Internet Filtering

What could be bad about free wireless Internet access? How about censorship by federally mandated filters that make it no longer "Internet." That's the effect of the FCC's proposed service rules for Advanced Wireless Service spectrum in the 2155-2180 MHz band, as set out in a July 20 Notice of Proposed Rulemaking. Acting on a request of M2Z Networks, which wants to provide "free, family-friendly wireless broadband," the FCC proposes to require licensees of this spectrum band to offer free two-way wireless broadband Internet service to the public, with least 25% of their network capacity. So far so good, but on the next page, the agency guts the meaning of "broadband Internet" with a content filtering requirement. more

The Future of the Internet: A Political View

Lets face it, gathering a collection of ministerial delegations to laboriously recite prepared speeches to each other sounds about as exciting as watching paint dry. And observing meetings where the major outcome appears to be limited to the scheduling of the next meeting can become somewhat tedious after a while. It should not be surprising that the level of expectation of tangible outcomes for such governmental meetings is invariably abysmally low. So what's the value of adding yet another meeting to governments' schedule? What makes the OECD-hosted ministerial meeting on the Future of the Internet Economy so unique in the context of the Internet's current political landscape and its political future? Why would a meeting about the dismal science of economics hold any interest at all? more

Cisco: P2P Flat in North America? Some Experiencing Major Growth

North American p2p went from 370 petabytes in 2006 to only 416 petabytes in 2007 according to Cisco's figures. Since U.S. users increased 16% in the same period, that's a drop in p2p per user and a significant drop in p2p as a percentage of all traffic. There's a major margin of error in these figures, so I'm calling it "flat." That's very different from pre 2007 experience, when p2p grew rapidly. It severely contradicts what many in Washington D.C. are saying... more

Chinese Internet Research Conference: Getting beyond “Iron Curtain 2.0”

At last week's Chinese Internet Research Conference, much discussion of the "myths and realities" of the Chinese Internet revolved around images, metaphors, and paradigms. In his award-winning paper titled The Great Firewall as Iron Curtain 2.0, UPenn PhD Student Lokman Tsui argued that "our use of the Great Firewall metaphor leads to blind spots that obscure and limit our understanding of internet censorship in the People's Republic." more

Bit Caps, Consolidation, and Clearwire

The news that Comcast, Time Warner, and AT&T are all considering capping use of their networks -- so that "overuse" would trigger a charge -- has prompted intense discussion of just why these network operators are moving in this direction. One camp suggests that these operators have to do *something* to manage congestion, and because any protocol-specific discrimination plan raises howls of protest from the Net Neutrality side of the fence adopting bit-usage discrimination schemes is inevitable. It's the least-bad approach, following this view. more