/ Most Viewed

Deep Sea Diving: The State of Submarine Cable Technology

There is something quite compelling about engineering a piece of state-of-the-art technology that is intended to be dropped off a boat and then operate flawlessly for the next twenty-five years or more in the silent depths of the world's oceans! It brings together advanced physics, marine technology, and engineering to create some truly amazing pieces of networking infrastructure. more

An End to Spam Litigation Factories? (Gordon v. Virtumundo)

When CAN-SPAM was passed in 2003, it was fairly clear that Congress wasn't trying to enable broad private enforcement. Everyone knew that rabid anti-spammers would seize any new statutory right for a litigation frenzy... Although I personally think Congress would better served all of us by omitting all private enforcement rights in CAN-SPAM, unquestionably the private rights in CAN-SPAM are drafted narrowly to prevent their abuses. That hasn't stopped some zealous anti-spammers from testing the limits of CAN-SPAM's private enforcement remedies anyway. more

.Mobi Premium Name Auction Off to Wild Success at TRAFFIC in Miami

I'm in attendance at the the TRAFFIC EAST 2006 show, in Hollywood [Miami], Florida. There has been a lot of buzz here about the .Mobi top level domain, ranging from the talk of early registrants hoping to create the next big mobile portal to those that were keen to see implementations of mobile content. There was a domain name auction this evening where flowers.mobi sold for $200,000.00 (USD), and fun.mobi for $100,000.00 (USD) from a long list of domain names in the com, net, info, org, us and mobi extensions. more

Premium Generics, the Domain Industry’s Luxury Goods

Categories. The mere mention of the word risks eliciting groans from any domain industry specialist. In the run up to the new gTLD program, this concept was oft discussed. It seemed obvious to most that TLDs were not a homogenous ensemble but instead, could exist in many different shapes and sizes. Except to ICANN staff. They systematically refused to entertain the notion of categories. Even when ICANN Board members suggested some kind of recognition for different TLD types should be hardwired into the program! more

Black Hats, White Hats, Crackers and Bots

One of the other web sites I subscribe to is Stratfor. It's a global intelligence website and doesn't really have much to do with spam. But I like politics so I read it. They have some articles which you can get for free, but the better stuff you have to pay for. About two weeks ago, they ran a three-part series on Cyberwarfare. The first article was the title of this post, which you can access here (requires registration). In the article they described different types of cybercriminals and not-so-criminals which they referred to under the umbrella as "hackers." more

The End of HFC and FttN Networks is Approaching

In the global telecoms industry, it looks as though 2013 will be remembered as the year when construction of new greenfield HFC networks came to a halt. Of course, there will still be upgrades to existing networks but the cost of fibre deployment -- linked to its much lower operational cost -- is now convincing cablecos and telcos alike to build new fibre networks wherever possible. This is not necessarily directly driven by customer demand, but by network costs and network efficiencies. more

When the Backend Domain Name Registry Is Too Expensive

What we call a "backend registry" is the mandatory technical platform to operate a domain name extension and all registries have one. It is the backend registry that allows accredited registrars to technically sell domain names for each top-level domain (TLD). The question here is: what happens to a registry, who sells domain names to accredited registrars when his backend registry solution provider is too expensive? more

Creating a National Cybersecurity Framework: Need For New Regulation?

The Congressional Research Service (CRS) recently released a major new study examining cybersecurity. The report, "Creating a National Framework for Cybersecurity: An Analysis of Issues and Options" discusses a variety of significant public and private cybersecurity concerns. The CRS analysis lists several broad options for addressing cybersecurity weaknesses ranging from adopting standards and certification to promulgating best practices and guidelines and use of audits among other measures. more

Words and Descriptive Phrases as Trademarks Registered as Domain Names

In a trademark context, who owns or controls, or would prevent others, from using words and phrases commonly available to speakers in a language community, is in persistent tension. While common words alone or combined may become protected from infringing uses under trademark law, their protection is contingent on factors such as linguistic choices and strength or weakness of marks in the marketplace. more

Of Canaries and Coal Mines: Verisign’s Proposal and Sudden Withdrawal of Domain Anti-Abuse Policy

Too many techies still don't understand the concept of due process, and opportunistic law enforcement agencies, who tend to view due process constraints as an inconvenience, are very happy to take advantage of that. That's the lesson to draw from Verisign's proposal and sudden withdrawal of a new "domain name anti-abuse policy" yesterday. The proposal, which seems to have been intended as a new service to registrars, would have allowed Verisign to perform malware scans on all .com, .net, and .name domain names quarterly when registrars agreed to let them do it. more

MIT 2010 Spam Conference Starts Tomorrow…

In January we presented the glorious history of the MIT spam conference, today we present the schedule for the first day. Opening session will be from this author, Garth Buren with a topic entitled The Internet Doomsday Book, with details be released the same day as the presentation. Followed by Dr. Robert Bruen with a review of activities since the last MIT spam conference... more

5G Base Stations $13,000 in China

Most carriers don't order 200,000 5G base stations, so they will pay more, but that's the actual price for the joint procurement of China Telecom and China Unicom. The 200,000-300,000 cells the two jointly are upgrading are probably more than the entire rest of the world will add. The second Chinese network, jointly built by China Mobile and China Broadcast, is growing even faster. more

Hackers Use Tesla’s Amazon Cloud Account to Mine Cryptocurrency

Tesla's cloud environment has been infiltrated by hackers and used to mine cryptocurrencies, researchers have discovered. Other victims include Aviva and Gemalto. more

Court Says gTLDs Aren’t ‘Domain Names’ for Cybersquatting Purposes, Declines LRO Review of .delmonte

A Swiss Del Monte entity that had a license to use the "DEL MONTE" mark applies to operate the .delmonte generic top level domain (gTLD). Another Del Monte entity, based in Delaware, filed a "legal rights objection" (LRO) - under WIPO-established procedures - to the Swiss Del Monte's application. A three member panel sustained the Delaware company's LRO... The Swiss entity sued in federal court seeking a declaration that it had sufficient rights in the "DEL MONTE" mark to operate the TLD... more

ICANN to Auction New Generic Top Level Domains

ICANN has just published a paper from its contractor PowerAuctions LLC, regarding the use of auctions to award new Top Level Domains (TLD) strings in case of contention. I can understand what ICANN wants to avoid. In the past, it has been criticized for using the "beauty contest" model with the redelegation of the .net TLD... However, the auction model is based on the idea that whoever wins the auction will be able to recoup its investment on the sale... more