/ Most Viewed

Video: IETF Chair Jari Arkko Summarizes The Activities of IETF 87 In Berlin

The 87th meeting of the Internet Engineering Task Force (IETF) in Berlin, Germany, concluded on August 2, 2013. IETF Chair Jari Arkko recently published his summary of IETF 87 on the IETF Blog highlighting what he felt were some of the more important aspects of what was a very successful IETF meeting. I also had the privilege of interviewing Jari on video about the meeting. more

Deep Sea Diving: The State of Submarine Cable Technology

There is something quite compelling about engineering a piece of state-of-the-art technology that is intended to be dropped off a boat and then operate flawlessly for the next twenty-five years or more in the silent depths of the world's oceans! It brings together advanced physics, marine technology, and engineering to create some truly amazing pieces of networking infrastructure. more

Please, Keep the Core Neutral

Many in the technical community attribute the rapid growth and spread of the Internet to innovation that took place at the "edge" of the network, while its "core" was left largely application neutral to provide a universal and predictable building block for innovation. It is this core neutrality that provides a basis for the security and stability of the Internet as a whole. And it is this same core neutrality that is critical to the continued spread of the Internet across the Digital Divide. Unfortunately, when the politics of censorship rather than solely technical concerns drive the coordination of these "core" Internet resources, it threatens the future security and stability of the Internet. This paper proposes a paradigm upon which all the governments of the world have equal access to these core Internet resources to empower them and their citizens with the rights acknowledged in the WSIS Declaration of Principles. more

WiMAX Will Be Successful, as a Fringe Technology

A recent Infonetics press release says "WiMAX has gained such momentum across so many regions that it is no longer sensible to suggest that WiMAX growth will be flattened by the emergence of LTE [Long Term Evolution] in the next few years." Probably true, but it's also clear WiMAX will never reach the scale of either mainstream wireless family, i.e., WiFi or GSM/3GSM. By comparison with these giants, WiMAX will be a fringe operation. The critical issue is volume, and what counts is the wireless technology brand, not the technology itself. more

Google’s Secret Strategy With the Kansas City Fiber Project

I have long been perplexed at how Google plans to make a profit with their Kansas City Fiber project. Originally the project was touted as an altruistic move by Google to really understand the underlying costs of deploying fiber in a large municipality. But as anyone who has been in the trenches can tell you, it is not the technology that determines the cost of a fiber deployment, but the tyranny of the take-up. more

Is ICANN’s .IR Response at Odds with the ACPA and ICE Domain Seizures?

An initial review of ICANN's response to litigation seeking it to turn over control of the ccTLDs of Iran, Syria and North Korea led to the conclusion that it had opened a "legal can of worms". A few more just wriggled out, and they threaten the basic assumption that underlies the U.S. statute governing cybersquatting and the practices engaged in by Federal officials seizing domain names engaged in intellectual property infringement. more

ICANN New gTLD Program SWOT Analysis: STRENGTHS (Part 1)

The SWOT analysis (alternatively SWOT Matrix) is a structured planning method used to evaluate the Strengths, Weaknesses, Opportunities, and Threats involved in a project or in a business venture. The following is an attempt to apply the SWOT Analysis to ICANN's new gTLD program. more

Internet Reporting Hotlines Are Censoring Art as Child Sexual Abuse

This week United States Attorney-General William Barr cited the need to address child exploitation as one of the factors motivating a mooted review of law called CDA 230, which provides that Internet companies aren't responsible for what their users say or do online. There are many dimensions to the problem of child exploitation, ranging from inappropriate comments on Instagram photos to child grooming on Fortnite... more

Thomson Reuters in Definitive Agreement to Sell Intellectual Property Unit Including MarkMonitor

The portfolio includes Web of Science, Thomson CompuMark, Thomson Innovation, MarkMonitor, Thomson Reuters Cortellis and Thomson IP Manager. more

Google Received 65.9 Million Take Down Requests Last Month, Company Reports

As part of its transparency report, Google says Copyright removal requests continue to be on steady rise and that the company received a new record 65,923,523 requests just last month. more

WSIS Deal: Oversight

The UN Secretary-General has been invited to "convene a new forum for multi-stakeholder policy dialogue." Everyone can see his/her hearts' desires in the WSIS deal: ICANN can believe that it has survived for another day; governments can believe that they will have "an equal role and responsibility for international Internet governance"; and there will be an enormous meeting in Greece by the second quarter of 2006 to start the Internet Governance Forum going. more

WHOIS Users Facing Serious Challenges Caused by Post-GDPR Fragmentation

On May 25, 2018, the European General Data Protection Regulation (GDPR) came into effect, meaning that European data protection authorities (DPAs) can begin enforcing the regulation against non-compliant parties. In preparation, the ICANN Board passed a Temporary Specification for gTLD Registration Data - essentially a temporary policy amendment to its registrar and registry contracts to facilitate GDPR compliance while also preserving certain aspects of the WHOIS system of domain name registration data. more

Who Contacts Whom: A Material Factor in Selling Domain Names Corresponding to Trademarks

Acquiring domain names for the purpose of selling them to complainants is the second most heavily invoked of the four circumstances that are evidence of abusive registration. Because no self-respecting domain name reseller will ever admit to acquiring domain names "primarily for the purpose" of selling them to complainants "for valuable consideration in excess of [their] documented out-of-pocket costs directly related to the domain name" evidence of bad faith is typically deduced by other factors. more

ICANN Reserves “.INTERNAL” Domain for Private Use

The Internet Corporation for Assigned Names and Numbers (ICANN) has officially reserved the top-level domain ".INTERNAL" for private-use applications. This decision follows years of technical evaluations, public consultations, and inter-organizational discussions. more

.XXX Exposes the Naked Truth for ICANN

Internet governance can be a little on the dry side. So when tech policy reporters get a chance to write an ICANN story that features porn stars on picket lines, it's hard to blame them when they run with it. But all the media hype about ICANN's .xxx decision at last week's meeting in San Francisco exposed the real dilemma facing ICANN: how to engage governments in a multi-stakeholder model that's led by the private sector. more