/ Most Viewed

Who is Wagging Who? Same Dog, New Tale.

Today, my company AusRegistry International signed an open letter to the United States House Subcommittee on Intellectual Property, Competition, and the Internet as a show of support for ICANN and its new Top-Level Domain program. I'm disappointed by the nature of the oversight hearing the Subcommittee has called and I believe it will only be a distraction. Let's not kid ourselves; the reason for this hearing is to beat up ICANN over the new TLD program. I think this is unfair and unjustified... more

Reputation and “The Cloud”

As Reddit recently learned it's not a great idea to use the Amazon EC2 cloud to host mailservers. There are a number of reasons for this, most of them related to the reputation of mail coming from EC2 servers. When you're using machines in the cloud, changing IP addresses is as simple as initializing a new server. Spammers discovered this almost as soon as the EC2 cloud became public. more

Apple’s Naked Self Interest

Any vendor in the platform business knows that their primary product is programming interfaces -- the so-called APIs that developers depend upon in order to deliver applications. The API exposes features of the platform, and differentiate applications running on that platform from all others. Lose control of the API, and you will lose control of the developer. Developers are the leading indicator for platform success. Ergo, lose the developer, lose the platform. more

An Alternative to CCWG Overreach

ICANN is in the midst (I wouldn't yet say the middle) of its transition from oversight by the US Department of Commerce to oversight by something else. A Cross Community Working Group (CCWG) on Accountability delivered a long report in August that proposes a new oversight structure for ICANN. But it has the practical problem that the ICANN board really, really hates it. Having looked at it, I can't entirely blame them. more

Advantage of Commercial Clouds vs. HPC for Scientific Research

The Department of Energy (DoE) recently came out with an excellent report, called the Magellan report, on the advantages and disadvantages of using commercial clouds versus in house High Performance Computers (HPC) for leading edge scientific research. The DoE probably supports the largest concentration of HPC facilities in the world. I agree with the report that for traditional applications such as computational chemistry, astrophysics, etc. will still need large HPC facilities. more

Questions About the Robustness of Mobile Networks

With mobile phones having become a utility, people are beginning to rely completely on mobile services for a large range of communications. All mobile users, however, are aware of some level of unreliability in these phone systems. Blackspots remain all around the country, not just outside the cities, and in busy areas the quality of the service goes down rather quickly. Drop-outs are another fairly common occurrence of mobile services. more

EU Ruling on Google Ad Keywords: Implications for Brand Owners

In a landmark judgment issued this past Tuesday, the European Court of Justice (ECJ) ruled that Google is not liable for trademark infringement when an advertiser purchases a keyword based on a competitor's trademark to trigger a search ad, so long as it removes infringing ads promptly when notified by brand owners. However, and this is critical, individual advertisers could be held liable if ads triggered by a keyword involving a competitor's trademark are found to confuse consumers. So, what qualifies as consumer confusion? more

Interest Grows for Video-On-Demand Opportunities

With the DVD rental market continuing to dwindle, we are again seeing interest emerge for online video-on-demand, with both the large Hollywood Studies and online content distributors making recent strategic moves in this direction. ... A sign of the times came with the 2010 bankruptcy of Blockbuster, once one of the largest move rental companies. more

DNSSEC Taking Center Stage at 2010 Black Hat

On July 28th DNSSEC took center stage at the 2010 Black Hat Conference in Las Vegas. Two years ago, at the same conference, Dan Kaminsky unveiled the infamous DNS bug that many believe became a major catalyst for DNSSEC implementation. To kick things off, Jeff Moss -- founder of Black Hat -- in his opening speech called out the fact that "we have not solved any fundamental problems" and noted that the technical community must catch up. more

When It Comes to Domain Name Rights Protection, scapegoat.sucks

It is not surprising that the phase 1 review of domain name rights protection mechanisms is delayed, but it is a bit of a surprise that in responding to a question posed in 2020, business executives and their lawyers replied with answers first offered and rejected five years earlier. In that time before COVID-19, the launch of the Vox Populi Registry and its dotSucks domain names drew quite a lot of attention. more

Navigating the “Pentest” World

The demand for penetration testing and security assessment services worldwide has been growing year-on-year. Driven largely by Governance, Risk, and Compliance (GRC) concerns, plus an evolving pressure to be observed taking information security and customer privacy seriously, most CIO/CSO/CISO's can expect to conduct regular "pentests" as a means of validating their organizations or product's security. more

Filing Cybersquatting Complaints With No Actionable Claims

I noted in last week's essay three kinds of cybersquatting complaints typically filed under ICANN'S Uniform Domain Name Dispute Resolution Policy (UDRP). The third (utterly meritless) kind are also filed in federal court under the Anticybersquatting Consumer Protection Act (ACPA). While sanctions for reverse domain name hijacking are available in both regimes, the UDRP's is toothless and the ACPA's a potent remedy. more

Time to Take Stock: Twelve Internet and Jurisdiction Trends in Retrospect

With the growing tension between the cross-border Internet and the patchwork of national jurisdictions, it becomes crucial to keep track of key global trends that drive the debate on appropriate frameworks. One year ago, the Internet & Jurisdiction Project initiated a global multi-stakeholder dialogue process on these issues. To provide a factual basis for such discussions, it established an Observatory, supported by a network of selected international experts, to detect and categorize relevant cases via an innovative crowd-based filtering process in order to identify high-level patterns. more

What Must We Trust?

My Twitter feed has exploded with the release of the Kaspersky report on the "Equation Group", an entity behind a very advanced family of malware. (Naturally, everyone is blaming the NSA. I don't know who wrote that code, so I'll just say it was beings from the Andromeda galaxy.) The Equation Group has used a variety of advanced techniques, including injecting malware into disk drive firmware, planting attack code on "photo" CDs sent to conference attendees, encrypting payloads... more

New gTLDs’ Sales Force a Bottleneck?

A number of the new generic Top-Level Domains (gTLDs) have not fared well, as reflected in the dismal domain registrations. Most often we're told the problem is that end users don't know about the gTLDs, or that they don't understand or fully believe in the gTLDs' benefits, or that they demand a tremendous amount of benefits before giving up the familiar for something new (so-called .com-stickiness). My point: Behind all these explanations there may be another, the lack of decent sales force strategies. more