Teledesic was the first company to plan to offer broadband connectivity using a constellation of low-earth-orbit (LEO) satellites. Craig McCaw, who had sold McCaw Cellular to AT&T, founded Teledesic in 1990 and it got a big visibility and credibility boost when Bill Gates made a small ($5 million) investment in the company. McCaw and Gates were able to attract capital - $200 million from a Saudi Prince, $750 million from Motorola, and $100 million from Boeing, which signed on as the prime contractor. more
Imagine if, every time you wanted to visit a website, you were expected to type in letters from a foreign language, or worse, an entirely foreign script, such as Arabic, Cyrillic, or Chinese. For more than a billion people, this is how they experience the Internet today. The Internet was designed to be global, but it was not designed to be multilingual. For decades, this limitation was most evident in website and email addresses, which permitted only a small set of Latin characters. more
Many in the technical community attribute the rapid growth and spread of the Internet to innovation that took place at the "edge" of the network, while its "core" was left largely application neutral to provide a universal and predictable building block for innovation. It is this core neutrality that provides a basis for the security and stability of the Internet as a whole. And it is this same core neutrality that is critical to the continued spread of the Internet across the Digital Divide. Unfortunately, when the politics of censorship rather than solely technical concerns drive the coordination of these "core" Internet resources, it threatens the future security and stability of the Internet. This paper proposes a paradigm upon which all the governments of the world have equal access to these core Internet resources to empower them and their citizens with the rights acknowledged in the WSIS Declaration of Principles. more
The SWOT analysis (alternatively SWOT Matrix) is a structured planning method used to evaluate the Strengths, Weaknesses, Opportunities, and Threats involved in a project or in a business venture. The following is an attempt to apply the SWOT Analysis to ICANN's new gTLD program. more
Verisign recently informed ICANN that it had received a letter from the National Institute for Standards and Technology (NIST), an agency of the U.S. Department of Commerce, regarding the proposed auction of o.com described in the Second Amendment to the .com Registry Agreement agreed to by ICANN and Verisign in March 2019. This letter, which doesn't appear to be on official letterhead, is from a NIST Grants Officer and purports to overturn a letter raising objections to the auction... more
The majority of private Internet users in Germany favour the increased usage of local domain endings as in .city or .region in the future because the more memorable names will help them to better find the information that they are looking for. That is the core result of a representative survey that was commissioned by eco Verband der deutschen Internetwirtschaft and conducted by the market research company eResult at the beginning of October. eco is the registered association of German Internet enterprises... more
Spending on blockchain solutions in the Middle East and Africa (MEA) will more than double this year, according to the latest insights from International Data Corporation. more
The Internet Corporation for Assigned Names and Numbers (ICANN) has postponed plans to change the cryptographic key -- a critical step in updating protection measures for the Domain Name System (DNS). more
Internet Systems Consortium (ISC), formerly Internet Software Consortium, has changed its name to better reflect the new direction of the organization. The renamed company has expanded the mission of the original ISC to include more focus on Global DNS operations. In addition to developing and maintaining production quality Open Source software, such as BIND and DHCP, ISC will now enhance the stability of the global DNS through reliable F-root nameserver operations and ongoing operation of a DNS crisis coordination center, ISC's OARC for DNS; and further protocol development efforts, particularly in the areas of DNS evolution and facilitating the transition to IPv6. more
1974, Bob Kahn and Vint Cerf checked in the Crown Plaza Hotel in Palo Alto, worked a couple of days and presented to the world the TCP/IP protocol. Stanford hosted one of the four computers connected on equal footing (ARPANET) in 1969... A framed document in the hotel lobby remembers the historic moment. On March 31, 2014 a crowd of about 30 people from all over the world checked in the same Crown Plaza hotel for the first working meeting of the new Coordination Council (CC) of the NetMundial Initiative (NMI). more
On Monday the 3rd, California state Senator Dean Flores held a hearing of the E-Commerce, Wireless Technology, and Consumer Driven Programming committee grandly titled AOL: You Have Certified Mail, Will Paid E-mail Lead to Separate, Unequal Systems or is it the Foolproof Answer to Spam?. The senator's office said they were very eager to have me there, to the extent they offered to fly me out from New York, so since I happened to be on the way home from ICANN in New Zealand that weekend, I took a detour through Sacramento. Sen. Florez conducted the hearing, with Sens. Escutia and Torlakson sitting in briefly. Unfortunately, Sen. Bowen, who is very well informed on these topics, wasn't there. There were five panels of speakers, and I got to lead off... more
Andrew McLaughlin, in his excellent dismemberment of the BBC's report on the "IPv4 address crisis", is observing not a random piece of sloppy research, but the success of settled policy. That policy, pursued by public relations companies serving information technology and telecommunications (IT&T) companies, is simple to sum up: "identify, support and encourage technically ignorant journalism". It centres around the most valuable word in the lexicon of the public relations firm: "placement"...A key characteristic of the "placement" story is its conformance to a template...With one search, I found a CNET story published in July with quite startling parallels to the BBC story... more
The saga of the IPv6 transition continues to surprise us all. RFC 2460, the first complete effort at a specification of the IPv6 protocol, was published in December 1998, more than twenty years ago. The entire point of IPv6 was to specify a successor protocol to IPv4 due to the prospect of running out of IPv4 addresses. Yet we ran out of IPv4 addresses more than a decade ago. more
A recent Infonetics press release says "WiMAX has gained such momentum across so many regions that it is no longer sensible to suggest that WiMAX growth will be flattened by the emergence of LTE [Long Term Evolution] in the next few years." Probably true, but it's also clear WiMAX will never reach the scale of either mainstream wireless family, i.e., WiFi or GSM/3GSM. By comparison with these giants, WiMAX will be a fringe operation. The critical issue is volume, and what counts is the wireless technology brand, not the technology itself. more
The ability to rank results according to the level of threat they pose (based on factors such as, for example, the extent to which a webpage relates to a brand of interest) is a key component of many brand protection services. The prioritisation process has a number of purposes, including the identification of: (a) priority targets for further analysis; (b) candidates for content tracking (i.e. regular reinspection of content or configuration, and the generation of an alert if high-concern findings are identified) - as may be appropriate in cases where a domain name presents a high potential level of risk but is not currently associated with any live site content; and (c) priority targets for enforcement actions. more