In The Limits of Filtering, Evan Engstrom and Nick Feamster argue eloquently that the costs of a "takedown-staydown" system to defend against copyright infringement would be prohibitive for online service providers (OSPs) and therefore deprive OSPs of otherwise interested investors. I agree that Engstrom and Feamster raise some valid points, particularly including that content recognition technologies are not perfect... However, we must also remember that the current DMCA regime imposes significant costs... more
The key to fixing any part of the Internet infrastructure is to understand the business cases for the parties whose behavior you want to influence and design the technology accordingly. People who follow this approach (Sir Tim Berners-Lee and the World Wide Web) have a chance of succeeding. People who ignore it (DNSSEC, IPv6) will fail. The root problem here is that the ICANN DNS does not differentiate between the parts of the Internet that are accountable and those that are not. more
U.S. Presidential elections and the resulting Administrations can make an enormous difference on many levels and become profound points of inflection. This reality is certainly starkly visible today. Perhaps for the Internet community as well as the general public, some of the largely unknown events and actions surrounding the Internet and the Clinton team from 25 years ago can provide a basis for engagement over the coming months. more
The DNS Operations, Analysis, and Research Center (DNS-OARC) meetings are an instance of a meeting that concentrates on the single topic of the DNS, and in this case, it delves as deep as anyone is prepared to go! It's two days where too much DNS is barely enough! The hot topic of the meeting was the news that the proposed roll of the Key-Signing-Key of the root zone of the DNS, originally scheduled for October 11, was to be postponed. more
On Monday the Wall Street Journal published an article alleging that Google was trying to arrange a "fast lane for its own content" with telecom carriers and contending that Google and Professor Lessig were in the midst of changing their position on network neutrality policy. The WSJ reporters received a lot of flak for the piece -justifiably so. There was no real "news" in this news article. more
Everyone who's been in the e-mail biz long enough knows the term FUSSP, Final Ultimate Solution to the Spam Problem, as described in a checklist from Vern Schryver and a form response that's been floating around the net for a decade. FUSSPs fall into two general categories, bad ideas that won't go away, and reasonable ideas that are oversold. more
Iran has almost entirely shut down internet access across the country amid protests over an increase in fuel prices. more
ICANN has now accepted several hundred new top level domains (TLDs) and some of them are now open for general registration. I have sized up for zone file access, so I can download daily snapshots of most of the active zones, and I'm making daily counts of the number of names in each zone. more
The internet fragmentation practiced by various countries have, for the most part, been alternations to the information flows on top of the internet architecture, not the architecture itself. China, for instance, still relies on the global DNS and is yet to unplug from major internet exchange points. more
This week, I ran into an interesting article over at Free Code Camp about design tradeoffs... If you think you've found a design with no tradeoffs, well... Guess what? You've not looked hard enough. This is something I say often enough, of course, so what's the point? The point is this: We still don't really think about this in network design. This shows up in many different places; it's worth taking a look at just a few. more
Around the world, communities are racing to close the digital divide. From fiber deployments in rural areas to affordable smartphones and digital skills training, the goal is clear: connect the unconnected. But as we pursue that goal, a deeper question emerges that demands just as much urgency as infrastructure: When people get online, can they actually participate in the digital world? more
In an important test of ICANN's primary accountability mechanism, its Independent Review Process (IRP), the organization has been handed a stinging blow over its mishandling of the bid for the new generic Top-Level Domain (gTLD) .AFRICA. At the crux of the issue are two competing applications for the .AFRICA new gTLD and the decision by ICANN's Board to abdicate its responsibility to ensure that ICANN's evaluation and subsequent rewarding of the domain was carried out fairly, transparently, and in accordance with the organization's Bylaws, Articles of Organization, and established policies. more
A split Panel in an early decision under the Uniform Domain Name Dispute Resolution Policy (UDRP) held that parties deserve more than "[i]t depends [on] what panelist you draw." Time Inc. v. Chip Cooper, D2000-1342 (WIPO February 13, 2001). That's one side of the paradigm; the other side makes demands on the parties to prove their contentions, either of cybersquatting (one element of which is proving that respondent lacks rights or legitimate interests) or rebutting the claim (one element of which is respondent demonstrating it has rights or legitimate interests). more
For decades, IT followed business. Even the development of the World Wide Web didn't move this development much beyond the four walls of corporate offices -- outside connections were essential but never informed the growth of business-critical technology. Now the growth of public clouds, enterprise-grade social networking and mobile device use in the workforce is creating a new paradigm, one where business networks are reactive to IT trends -- here are six that are set to impact companies this year. more
In the past three years, Akamai has seen 2,000% increase in the number of DDoS attack incidents investigated on behalf of its customers. The latest State of the Internet report released today by Akamai also identifies top countries from which this observed attack traffic originates, as well as the top ports targeted by these attacks. more