Russia's Ministry of Communications has announced that it has successfully tested a country-wide alternative to the global Internet and that general users did not notice any changes. more
The SWOT analysis (alternatively SWOT Matrix) is a structured planning method used to evaluate the Strengths, Weaknesses, Opportunities, and Threats involved in a project or in a business venture. The following is an attempt to apply the SWOT Analysis to ICANN's new gTLD program. more
Cryptocurrencies (such as Bitcoin) are all the rage -- so, naturally, related domain name disputes are, too. The wild fluctuations in cryptocurrency prices (Bitcoin hit a low of close to $6,000 this week, after reaching an all-time high of more than $19,000 only two months ago, and less than $1,000 a year ago) have attracted speculators, regulators and now even cybersquatters. more
The judge in E360 vs. Comcast filed his order yesterday (read previous postings here and here), and to put it mildly, he agreed with Comcast. It starts: "Plaintiff e360Insight, LLC is a marketer. It refers to itself as an Internet marketing company. Some, perhaps even a majority of people in this country, would call it a spammer." ...and from E360's viewpoint, goes downhill from there. more
Anyone seeking to honor a groundbreaking contribution toward a better online world should submit a nomination for the 2014 M3AAWG J. D. Falk Award. Presented to people whose work on specific projects made the Internet a safer, more collaborative, more inclusive place, the J. D. Falk Award has recognized leaders and pioneers who saw elements of the online experience that needed improvement and took action to fix them. more
This year, 2013, I got 24 days of IPv6 and DNSSEC measurements. All in all it created 15GB logs with more than 62 million rows. On the 21st of December, early in the morning, the goat was "traditionally" burnt down, however this year with one exception. Via the Swedish newspaper Expressen the arsonists anonymously took the blame and also filmed their own act. more
The Virus Bulletin Conference last month had some good presentations, including this one by Fabio Assolini of Kaspersky. He spoke about how Brazil is the the newest up-and-comer on the cyber crime block. The tale begins with the story of Igor and Emily, two cyber criminals operating out of Brazil. Together, the two of them stole $300,000 US from a single Brazilian bank in one year. more
Two things are important to stress. First, nothing was decided in this meeting, and no actions will be taken until the next meeting in 2005. Secondly, and more importantly, as with anything the devil is in the details. Given the vagueness of the documents available, there are few reliable conclusions that can be drawn from the summit...Before any judgments can be made about the effectiveness, or feasibility of the ideas outlined in the Plan of Action more concrete information is needed. The details of these plans are currently unknown to the Internet community at large, and may even be unknown to the members of the WSIS. Based on the information that is available it appears the Plan of Action needs to be thought through a little more thoroughly. more
The Wall Street Journal and others are reporting that the Recording Industry Association of America is adjusting its strategy for combating the massive infringement occasioned by the sharing of music files over the internet. Since 2003, that strategy has been to pursue copyright infringement cases against individual file sharers. The RIAA now says it will focus less on pursuing infringement litigation and more on working with internet service providers to shut down the accounts of individuals suspected of illegally trading files. more
Please pardon me if I start this story by telling about an incident that happened to me at the Madrid airport while flying to the ICANN meetings in Rio.
It was about midnight when, after flying in from Turin, my hometown, I had to go through the passport control to reach my gate for the flight to Rio. The war between the US/UK and Iraq had started two days before, and even if the Spanish government was among its supporters, security checks were apparently proceeding as usual. Passport controls inside the EU for EU citizens usually take a few seconds, and the line ahead of me was proceeding quickly. more
John Ferron is one of several "repeat" plaintiffs around the country suing over unsolicited email (perhaps not coincidentally, he's also an attorney). In this case, Ferron sued a variety of defendants associated with unsolicited email promoting dish satellite offerings for violations of Ohio's consumer protection law and the Electronic Mail Advertising Act (EMAA). more
This article addresses the issues around the planned sale of the PIR .org registry by ISOC. It examines the history and issues plus looks at several possible paths forward, including PIR becoming a Benefit Corporation (B-Corp) and identifying possible alternative buyers who could retain PIR's non-profit status. Before Tim Bernier-Lee brought the HTML markup language to the Internet, starting in 1989, there were few registered domain names. Access for public registration started in 1986, and by December, there were about five dozen registered .com domain names. more
Gordon Crovitz's Op-ed in the Wall Street Journal about the relationship between ICANN and the future of free speech quotes me a couple of times... Crovitz emailed me last week when he was researching his column. I was somewhat more critical of ICANN's status quo in our exchange than in the quotes he ended up using. Following are my full answers, emailed to him on Thursday. more
Huawei's Cloud is growing faster than Amazon, Microsoft, or Google, Iain Morris writes. He cites U.S. Senator Tom Cotton on growth in "Egypt, Indonesia, Malaysia, Mexico, Saudi Arabia, Turkey, and the United Arab Emirates." Cotton further says: "In addition, Huawei's cloud services revenues reportedly rose by almost 170 percent in 2020. This accelerating revenue stream threatens to undermine U.S. efforts to curtail Huawei's power, influence, and financial strength." I think Cotton is a little high on Huawei Cloud growth... more
A factual paper prepared in October 2009 for and endorsed by the Chief Executive Officers of ICANN and all the Regional Internet Registries that provides answers to commonly asked questions about IPv6 such as: How are allocations made, and to whom? How are IPv6 addresses actually being allocated? And why did such large IPv4 address allocations go to US organizations, including the US Government, and its Department of Defense? more