/ Most Viewed

“Globally, Internet Traffic Passes Through 13 Root Servers” (!)

The Times of India recently interviewed India's Minister of State for Communications and IT, Sachin Pilot, on Internet Governance. Titled "'Internet's governance can't be limited to one geography'", the article started off with an amazing assertion by the minister... While this interview is a fairly standard restatement of the position some Governments (including India) have about governmental control of Internet Governance, it is sadly apparent that the minister unfortunately doesn't appear to understand what the root servers are, or how they work. more

CMO Offers Fresh View on New gTLDs: “They’re a Channel, Not Just a Label”

Several years ago, I had a very interesting conversation with a talented marketing executive from Portland, Oregon who joined the DotGreen Community, Inc. Board of Directors. When I told him about the new gTLD program, which was then under development at ICANN, Dave Maddocks immediately understood the value of what new gTLDs would mean to all businesses that have an online location. more

Video: Engineers in Washington Discuss How Pending US Regulations Could Impact the Internet

"What Will the Internet of the Future Look Like?," was the subject of a panel discussion held this week in Washington, DC, organized by the Information Technology & Innovation Foundation (ITIF). The discussion was aimed at examining pending Internet regulations in the U.S. and their impact on packet discrimination, traffic shaping, network management, and carrier business models. The panel, moderated by Robert Atkinson, included: Richard Bennett; Dr. David Farber; Charles Jackson; and Jon Peha. more

IDN and Email: The Harsh Reality

There has been a lot of talk about IDNs here and elsewhere but what does the reality look like for a plain user? As a test, I randomly choose 28 domains from Alexa's top 100 Sites and tried to create a user account with the email address user@??.com. The bleak result... more

To Serve the Public Interest You First Have to Define ‘Public Interest’

In the ancient parable, six blind men are asked to describe an elephant, with each coming up with wildly different answers, depending on which part of the animal they touched. Now, while I would hesitate to call participants in the ICANN process "blind men," I am starting to think that "public interest" is their elephant. ICANN is on the threshold of completing its first major obligation under the Affirmation of Commitments it signed with the U.S. Government in 2009. more

Access Logs Reveal 12M Visits to .CM Typosquatted Sites Just in 2018 So Far

An anonymous tip has lead security experts Brian Krebs and Matthew Chambers to four years of access logs for the entire network of more than 1,000 dot-cm typosquatting domains. more

Time to Play Offense

The United States is under cyber-attack. An article in Time magazine titled "The Invasion of the Chinese Cyberspies" discusses a computer-network security official for Sandia National Laboratories who had been "tirelessly pursuing a group of suspected Chinese cyberspies all over the world." The article notes that the cyberespionage ring, known to US investigators as Titan Rain, has been "penetrating secure computer networks at the country's most sensitive military bases, defense contractors and aerospace companies." more

It’s Not Paranoia if They Are Really After You!

In the latest development from the World Conference on International Telecommunications, a new "compromise proposal" has been leaked to wcitleaks.org. This proposal is certainly no compromise, as it not only is a bald faced power grab by the sponsors (Russia, UAE, China, Saudi Arabia, Algeria, Sudan at this point), but shows a stunning lack of comprehension of how the Internet works and how it is currently governed. It also shows that the coalition of Civil Society groups and private sector organisations that have focused on WCIT have been correct all along.  more

Relief Denied to Personal Name of Danish Businessman

Danish businessman Joacim Bruus-Jensen challenged the domain name www.joacimbruus-jensen.com in ICANN UDRP proceeding. He failed to prove enforceable trademark rights in his name and was denied relief in this decision by Panelist Derek Minus. Joacim Bruus-Jensen v. John Adamsen, Case No. D2004-0458 (WIPO Sept.29, 2004). The case should be considered before seeking to use the ICANN UDRP to take action based on the personal name of a business executive. more

FCC Approves White Space for Broadband in Unanimous Vote

The Federal Communications Commission (FCC) today approved, in a 5-0 unanimous vote, the plan to open up unused, unlicensed portions of TV white space spectrum for wireless applications and devices. However, to prevent interference, FCC has also placed some "rigorous certification process" which device offered by a technology company for use on the white spaces will have to go through. more

The Pros and Cons of Vectoring

Vectoring is an extension of DSL technology that employs the coordination of line signals to reduce crosstalk levels to improve performance. It is based on the concept of noise cancellation: the technology analyses noise conditions on copper lines and creates a cancelling anti-noise signal. While data rates of up to 100Mb/s are achievable, as with all DSL-based services this is distance related: the maximum available bit rate is possible at a range of about 300-400 meters. more

Network Neutrality, UPS, and FedEx

I buy a lot of things that are delivered by UPS or FedEx. And I kinda like to watch the progress of the shipments. Now we all know that UPS and FedEx have different grades of service -- Overnight, Two Day, Three Day, etc. And faster deliver costs more. Several years ago UPS and FedEx would frequently deliver a Two Day package the next day, i.e. they would effectively elevate the class of service. more

ICANN Receives 67 Unique Applications for Chinese gTLDs

At the press conference held in London on June 13, the Internet Corporation for Assigned Names and Numbers (ICANN) officially announced a list of 1930 applications for the new generic top level domain (gTLD). During the 40 years since the launch of the Internet, there are only 22 gTLDs such as .com. The 1930 applications represent a historical change to the Internet; For the first time, Chinese gTLDs will become available and there are 67 unique applications for Chinese gTLDs. more

NTP is Still a Security Risk

The Network Time Protocol (NTP) has been in the news a number of times over the past couple of years because of attacks on the protocol, vulnerabilities in the daemon, and the use of NTP in DDoS attacks. In each case, the developers of NTP have responded quickly with fixes or recommendations for remediating these attacks. Additionally, the development team has continued to look ahead and has worked to enhance the security of NTP. Unfortunately, that has not translated to an improved security picture for NTP. more

Internet Governance: Analogue Solutions to Digital Problems

This is an overview of the booklet, "Internet Governance: Issues, Actors and Divides," recently published by DiploFoundation and the Global Knowledge Partnership. "Internet Governance is not a simple subject. Although it deals with a major symbol of the DIGITAL world, it cannot be handled with a digital - binary logic of true/false and good/bad. Instead, the subject's many subtleties and shades of meaning and perception require an ANALOGUE approach, covering a continuum of options and compromises." Update: This article was reposted with additional information and a new title. more