Community gTLDs play an interesting and even unique role in the ICANN new gTLD process. They reflect the community-driven nature of the Internet. Indeed the story of how Community gTLDs came about is a fascinating example of the how bottom-up process can give rise to innovative policy outcomes. It has been over six years since the community gTLD concept was first discussed. In the mists of time, it's easy to forget the deep foundations upon which this concept is based. more
ICANN has delayed the decision for the sale of the .ORG registry, pushing the issue off for another month following a last minute letter from California's attorney. more
Today at 5:10pm EDT the IETF 90 Technical Plenary will be streamed live out of Toronto, Canada... After some initial reports, the technical focus will be on "Network topology and geography." The session will be recorded for later viewing. The slides are online and from what I can see it should be a very interesting talk for those of interested in the underlying infrastructure of the Internet. more
Back when I started working in this industry in 2001, ICANN was small, the industry was tight, and things moved slowly as interest groups negotiated a balance amongst the impacts of change. Change often meant added overhead and, at the very least, a one-time cost effort to implement on the commercial side. Registries and registrars preferred to be hands-off when it came to how their domains were being used. But e-crime became big business during the 2000s. more
When discussions with overseas colleagues made it clear to me how fast things are changing here in Australia compared with the rest of the world, I was prompted to write this update about the developments in Australia, particularly in relation to its incumbent telco, Telstra. Most people overseas have not yet fully caught up with the fact that the destructive regime of Telstra's former CEO is well and truly over -- in the past there has been plenty of international reporting of the shocking behaviour of Telstra under Sol Trujillo (former US West) and his persistent attacks on the government included suing Ministers and abusing the Regulator. more
Why do we run content filters at the recipient's side? Paul Graham's Plan for Spam introduced them that way. After several years, we can say that plan doesn't work very well. Email has become much less reliable. One way to recover reliability, at least between trusted parties, is to run filters at the sender's side. Let's look at the diagram in more detail... more
The big wireless companies have been wrangling for years with the issues associated with placing small cells on poles. Even with new FCC rules in their favor, they are still getting a lot of resistance from communities. Maybe the future of urban/suburban wireless lies with the big cable companies. Cable companies have a few major cost advantages over the wireless companies, including the ability to bypass the pole issue. The first advantage is the ability to deploy mid-span cellular small cells. more
Dictionary words, alone, combined as phrases, modified by other parts of speech, and single letters that function as marks also retain in parallel their common associations that others may use without offending third-party rights. As a rule of thumb, generic terms are not registrable as marks until they perceivably cross a threshold to suggestive and higher classifications. more
With the arrival of mobile saturation stagnation is occurring in telecoms revenue growth in most developed telecoms markets. Voice traffic is increasingly moving onto IP-based systems, which are either free or at very low cost to its users. This is taking place on both the fixed and mobile networks. While in the case of corporate and government organisations nearly all fixed voice traffic has moved to IP-based systems, in the SME and consumer market this has not been the case. more
"2010 should be viewed as the year distributed denial of service (DDoS) attacks became mainstream as many high profile attacks were launched against popular Internet services and other well known targets," reports Arbor Networks in its just released Sixth Annual Worldwide Infrastructure Security Report. According to the report, the year also witnessed a sharp escalation in the scale and frequency of DDoS attack activity on the Internet. The 100 Gbps attack barrier was reached for the first time while application layer attacks hit an all-time high. Service providers experienced a marked impact on operational expense, revenue loss and customer churn as a result. more
Last January, Doug Madory of Dyn Research reported on Cuban traffic, noting that C&W's share had increased. And this week Madory reported that ETECSA had activated a new internet transit provider, medium-Earth orbit (MEO) satellite-connectivity provider O3b Networks (Other 3 billion), replacing geostationary satellite provider Intelsat... the time for a data packet to travel from earth to an O3b satellite and back to Earth is significantly less than to an Intelsat satellite. more
Those advocates of a free market approach to fiber to the home (FttH), rather than a utilities-based one, often point to entertainment as the way to make that happen. And they then immediately point to the USA, where FttH rollouts have indeed been driven by competition between the cable TV companies... The telcos who were initially less enthusiastic about broadband (because it required them to abandon their lucrative ISDN services and replace them with the simpler and cheaper DSL technology) suddenly found themselves bested in the broadband market by the cable TV companies - a trend we also saw in some of the European markets - for instance, the Netherlands... more
Ed Felten has posted a nice taxonomy of the several meanings people take when they use the term Network Neutrality, briefly: End-to-End Design; Nonexclusionary Business Practice; Content Nondiscrimination ... I've been developing a taxonomy of issues that interact with and are bound with Network Neutrality. So far there are six items... more
The National Arbitration Forum has just handed down its decision in respect to the three domain names locked down at Public Domain Registry in response to the City of London Police Intellectual Property Crime Unit takedown requests. The decision is in favour of easyDNS and orders the three names to be transferred to us. more
With more and more stories coming in from all over the world about the prolific use of telecommunications to spy on what people are doing, the ball has been thrown back into the industry's court, to do something about it. In principle, ever since telecoms came into existence in the 1850s spying was high on the agenda of the people who started to use the new technology. In 1865 countries formed the International Telecommunications Union (ITU). This later became the first institution under the UN and all countries in the world are a member. more