/ Most Viewed

Registration of Generic Names: Advocate General’s Opinion Before the Court of Justice of the EU

One of the most debated questions at the time of the opening of the .eu Top-Level Domain (TLD) was whether or not it was possible to register names on the basis of prior rights on signs which include special characters, such as an ampersand. The Advocate General of the Court of Justice of European Union has just published his opinion (4 years later...) more

Dispersing a DDoS: Initial Thoughts on DDoS Protection

Distributed Denial of Service is a big deal -- huge pools of Internet of Things (IoT) devices, such as security cameras, are compromised by botnets and being used for large scale DDoS attacks. What are the tools in hand to fend these attacks off? The first misconception is that you can actually fend off a DDoS attack. There is no magical tool you can deploy that will allow you to go to sleep every night thinking, "tonight my network will not be impacted by a DDoS attack." more

IBM Predicts the Future for 2016 and It Includes No Spam

IBM published a video where it predicts what the world will look like in 2016 (see bottom of this post for the link). It includes the following five predictions. I want to start with the last one -- that junk mail (i.e., spam) will disappear. You'll need to watch the video to get the nuances of the prediction, but IBM says that in five years, Junk Mail will become a thing of the past. more

Summit to Focus on Knowledge Sharing for IPv6 Deployment

The IPv6 Forum, the North American IPv6 Task Force, and Charmed Technology, Inc. today announced that the U.S. IPv6 Summit 2003 will be held December 8 - 11, 2003 in Arlington, VA, at the Doubletree Crystal City. The U.S. IPv6 Summit 2003 will focus on deployment, technical depth of key IPv6 features, and applications or services of Internet Protocol version 6 (IPv6).  more

Metrics for New gTLDs Performance

The essay describes six groups of gTLD performance indicators: (1) the presence of a secondary market; (2) uses of second-level domain names; (3) the identity of the owners of parked and not-in-use domain names; (4) domain name renewals; (5) the market size of the supporting complementary assets; and (6) the character of the person in charge of a given registry. A time-trend of these indicators would convey any price inefficiencies and bubbles, and the health of the industry. more

Next Generation gTLD Registration Directory Services (NG RDS) - Proposed Successor to WHOIS

The information in WHOIS database is very important to Law Enforcement Agencies, Intellectual Property Owners, and all Internet Users in general, who use this data to locate/contact domain name owners for various purposes including but not limited to enforcing laws or addressing grievances related to cybercrime and other cases of DNS abuse like Spam, Phishing, Malware etc. However, Privacy and Proxy Services are also available for many Top Level Domain Registries... more

President of Name Intelligence Responds to WLS Issue

Part of the stated reason for the high price point stated by Verisign was to "deter domain speculators" with a price that was high. If the price was set at $1, they claim, speculators would buy all the WLS subscriptions before any other people. So if Verisign is trying to really deter domain speculators then why are they not releasing information on who owns a WLS? Or limiting the number of WLS that a person can have. Seems like a shallow argument if the only deterring thing is raising more money for the Verisign monopoly rather than setting limits... more

Privacy and Trust Go Hand-In-Hand

A few days ago, Eric Goldman wrote an interesting thinkpiece in CircleID regarding users' feeling about privacy. He seems to conclude that the existent regulations and policies on the matter are unnecessary, since Privacy doesn't "really" matters to the consumer. Eric based his argumentation on a number of surveys, stating that, even when the user expresses concerns about their privacy, on line behavior shows a different reality. We don't want to discuss here the soundness of surveys as a reliable source of information, but the author could be assuming too much in his analysis. more

Facebook Enters Wholesale Fiber Business, Plans to Sell Unused Capacity on New Fiber Routes

Facebooks says it intends to allow third parties - including local and regional providers - to purchase excess capacity on its fiber. more

Wireless Net Neutrality

To date, most of the discussion on net neutrality has dealt with the behaviour of conventional wireline ISPs. RCR Wireless News is carrying an opinion piece called "Paying for the bandwidth we consume" by Mark Desautels, VP -- Wireless Internet Development for CTIA -- the trade association for the US wireless industry. His article follows up on reports of Comcast cable moving to discontinue internet access service to so-called "bandwidth hogs"... more

More Targeted Phishing, Spam and Mobile Attacks; IBM Reports 150K Security Events Per Second

IBM today released the results from its annual X-Force 2010 Trend and Risk Report, identifying more targeted phishing, spam and mobile attacks. The report also finds cloud security continuing to evolve. "From Stuxnet to Zeus Botnets to mobile exploits, a widening variety of attack methodologies is popping up each day," says Tom Cross, threat intelligence manager, IBM X-Force. "The numerous, high profile targeted attacks in 2010 shed light on a crop of highly sophisticated cyber criminals, who may be well-funded and operating with knowledge of security vulnerabilities that no one else has. Staying ahead of these growing threats and designing software and services that are secure from the start has never been more critical." more

i2Coalition and The Domain Name Association Announce Their Intent to Merge

The Internet Infrastructure Coalition (i2Coalition) and The Domain Name Association (DNA) have announced their intent to merge, forming the largest Internet infrastructure advocacy group in North America. more

Google’s .App TLD Application Under Fire

I've written about "closed generic" new TLD applications several times over the last year. I'm opposed to them, as I've said in the past and continue to say today. However I've generally been supportive of "restricted" TLDs. The Association for Competitive Technology (ACT) has serious concerns about Google's application for .app and want ICANN's board of directors to treat as a "closed generic". more

The Rising Technical Challenges of Networking at Home

For me, one of the more interesting sessions at the recent IETF 81 meeting in July was the first meeting of the recently established Homenet Working Group. What's so interesting about networking the home? Well, if you regard challenges as "interesting", then just about everything is interesting when you look at networking in the home! more

The Front Running Class Action Suit

In a recent press release, Los Angeles law firm Kabateck Brown Kellner says it's filed a class action suit against Network Solutions and ICANN for front running. (If you tuned in late, NetSol admits that if you query a domain name on their web site, they will speculatively register it so that it's only available through NetSol for five days, at their above market price.) This is a very peculiar suit... For one thing, it's hard to see how the total class damages would be large enough to be worth a suit... more