/ Most Viewed

One Good Outcome from the Wall Street Journal: Google Flap

On Monday the Wall Street Journal published an article alleging that Google was trying to arrange a "fast lane for its own content" with telecom carriers and contending that Google and Professor Lessig were in the midst of changing their position on network neutrality policy. The WSJ reporters received a lot of flak for the piece -justifiably so. There was no real "news" in this news article. more

How to Increase Broadband Competition

Susan Crawford, seeking to learn from Korea and Japan, identifies three routes towards broadband competition... Facilities based competition: Still waiting for that mythical third wire, or perhaps some unused, unlicensed TV spectrum, but not holding my breath. (Broadband over powerline? It is such an encumbered technology that it is its own barrier to entry.) Wholesale access: Been there, tried that, but the Bells wouldn't unbundled elements... more

IS3C Report: Socio-Political and Technical Impacts of Post Quantum Cryptography Policies

At the 20th Internet Governance Forum in Lillestrøm, Norway, the UN Internet Governance Forum's dynamic coalition Internet Standards, Security and Safety (IS3C) released its new report on post-quantum policies. This report presents the findings of a collaborative study undertaken by IS3C and the French domain name registry Afnic and examines the critical need for Post-Quantum Cryptography (PQC) to achieve greater security in the ever-expanding global IoT landscape. more

“Objective” and “Objectivity” in UDRP Decision Making

No one will disagree that disputes before arbitral tribunals and courts should be determined on the merits. I have noticed that some Panels appointed under the Uniform Domain Name Dispute Resolution Policy (UDRP) have employed the words "objective" and "objectively" in their recent decisions. In pondering these linguistic choices, it seems to me that there are two possible reasons for their use; the first is more acceptable than the second. more

Global Internet Traffic to Quadruple by 2015, Reaching 966 Exabytes Per Year

Cisco predicts that the number of network-connected devices will be more than 15 billion, twice the world's population, by 2015. In its Visual Networking Index (VNI) Forecast (2010-2015) report released today, the company also predicts the total amount of global Internet traffic to quadruple by 2015 and reach 966 exabytes per year. more

Verisign Expands MANRS Relationship to Strengthen Global Routing Security

Verisign has been involved with an initiative known as Mutually Agreed Norms for Routing Security, or MANRS, since its inception. MANRS, which is coordinated by the Internet Society, focuses on strengthening the security and resiliency of IP networks throughout the world by identifying and providing best practices for mitigating common routing security threats. MANRS began as a collaboration among network operators and internet exchange providers, with Verisign formally becoming a participant in its Network Operator Program in 2017. more

The Trembling Trademark Owners

Why is so much fear being created in the name of protecting trademark owners? Say, if ICANN allowed some third party a generic Top-Level Domain (gTLD) called .panasonic will the sky fall? No, not at all, as Panasonic, the true and rightful TM holder will hit the unauthorized gTLD with a 2x4 and no judge would oppose issuing a cease-and-desist order. Now the other question is... more

Comments on the National Strategy for Trusted Identities in Cyberspace

The White House has recently released a draft of the National Strategy for Trusted Identities in Cyberspace. Some of its ideas are good and some are bad. However, I fear it will be a large effort that will do little, and will pose a threat to our privacy. As I've written elsewhere, I may be willing to sacrifice some privacy to help the government protect the nation; I'm not willing to do so to help private companies track me when it's quite useless as a defense. more

Why .CHAT Could Be All That .TEL Wanted to Be and More

Almost everyone that has been working in the domain name industry for a while has a story about .TEL. It was introduced in 2005 and went live in 2009 with a flurry of publicity. It was a grand concept aiming to revolutionize the way in which people keep in touch. Unlike traditional domain names, the purpose of a .TEL domain name is to help manage and exchange contact information about people and corporate entities. more

Top Six IT Trends Impacting Business Networks

For decades, IT followed business. Even the development of the World Wide Web didn't move this development much beyond the four walls of corporate offices -- outside connections were essential but never informed the growth of business-critical technology. Now the growth of public clouds, enterprise-grade social networking and mobile device use in the workforce is creating a new paradigm, one where business networks are reactive to IT trends -- here are six that are set to impact companies this year. more

New gTLDs: What Is Really Happening at the Moment?

Many of us have noticed there will soon be a new CEO at ICANN. Actual CEO Rod Beckstrom will be thanked and everyone will congratulate each other...(in English :-). OK, done... But what is really going to happen in Prague? more

ICANN Paints Itself Into a Corner

ICANN recently commissioned a report from a domain auction company to see whether it would be a good idea to auction Top-Level Domains (TLDs) that have multiple applicants. Remarkably, the domain auctioneers came to the conclusion that auctions are a great idea, which they surely are for some people. But are they a good idea for ICANN? And if ICANN admits they can't evaluate competing applications on their merits, how can they keep the process from turning into another speculative land grab? more

Analysis of the Global IT Breakdown Caused by Microsoft-CrowdStrike

The Optus outage in Australia from last year was immediately on my mind when on Friday afternoon a similar event swept, this time, across the world. Also, in this case it was a software update that caused the problem. This time from global security software provider CrowdStrike. The culprit appears to be an update to the CrowdStrike Falcon platform, a security monitoring tool widely deployed by businesses and organisations on Microsoft desktop computers and notebooks. more

Watch Live - What Does “Success” For IPv6 Look Like? (Briefing Panel on Nov 5)

Now that IPv6 deployment is happening in major networks around the world, the question becomes -- what does "success" look like for IPv6? How much IPv6 traffic is "enough"? What are major milestones we should be tracking in IPv6 deployment? What is next for IPv6? more

Another Day in Court for CFIT vs. VeriSign and ICANN

The CFIT vs. VeriSign et. al. lawsuit had another day in court today. ...The key point coming out of a hearing today (Friday, June 09, 2006) in front of U.S. District Court Judge Ronald Whyte in San Jose, California is that the arguments made by CFIT against the .com deal between ICANN and VeriSign will continue. ...There was one moment of some drama. After lawyers for VeriSign and ICANN both argued that the 7 percent price increases without the need for justification would not be a violation of anti-trust law, Judge Whyte asked the lawyer for ICANN if it would be an anti-trust violation if VeriSign had been granted an annual 100 percent increase. The lawyer said, "no." Other lawyers for other matters sitting in the audience seemed to shift uneasily... more