/ Most Viewed

One Step Closer to an Accountable ICANN

We believe that certain updates in the latest draft that limit the scope of ICANN's Mission, as specified in paragraph 188, could explicitly prevent ICANN from actively enforcing its contracts with Registries and Registrars or use contracts as a tool to implement consensus policies in the future. We suggest in our comments that revised bylaw text be added explicitly stating that the enforcement and creation of ICANN's contracts with Registries and Registrars... more

Hassle Over LEOs

Every second, 4.5 billion people using computers and other electronic devices send 100,000 gigabytes of information to each other. Around 60% of the world's population has an Internet connection. North America and Europe have penetrations of 95% and 87%. But Asia and Africa do not yet get beyond 54% and 40%. On those continents, there are many remote areas where there is no Internet yet. At least no affordable Internet. more

Google Books Case Part 4,523: Decide Fair Use First

The endless lawsuit by the Authors Guild (which purports to represent authors, no longer including me), against Google moved another small step toward completion today. The Guild is just sure that Google's book scanning project means that end of civilization as we, or at least they, know it. Their arguments run from the somewhat plausible, that the scans are in violation of copyright, to the just plain goofy, that the scan data is so amazingly valuable yet vulnerable that Google must destroy it before someone steals it. more

Silencing the Cold War Hype: Understanding the Road to .ECO

With ICANN's announcement that the application window for new TLDs will be opening in January 2012 there has been an influx of media coverage directed at our bid for .ECO, as well as the bids of many other organizations the world over. To date, many articles related to our bid have drawn immediate reference to the involvement of Mikhail Gorbachev and Al Gore. more

Amazon Gets FCC Approval to Deploy Its Project Kuiper Broadband Satellites

Today, the FCC has sided with Amazon in a regulatory battle over Project Kuiper, the company's satellite internet system. Despite objections from rival SpaceX, the commission has approved Amazon's plan to prevent the upcoming satellite internet constellation from causing orbital debris in space. more

Calculating the Return on Investment of Online Brand Protection Projects

In the early days of Online Brand Protection (OBP), before it was commonly understood how damaging to revenue infringements could be, this was an extremely popular topic. I remember delivering webinars on the subject then and even running a couple of half-day in-person workshops for brand owners at major conferences. more

Virtual ICANN Meetings – YES, Please

In the early 2000s, when I began working in the domain name industry, I remember hearing from colleagues about these seemingly elusive ICANN meetings invariably hosted in some pretty incredible places, including Rio de Janeiro, Rome and Cape Town. I remember how some of my colleagues complained about being stuck in windowless conference rooms for hours on end, but secretly thinking that they were probably going to a few meetings, but then actually enjoying a fabulous vacation. more

Spanish Joint-Network Investment in FttH Seeing Returns

Spain's economic anguish has had a number of repercussions for the country's telcos, with stable or declining revenue causing much nervousness as operators struggle to fund essential investment in spectrum and both fixed-line and mobile networks. Earlier this year Vodafone felt the pinch, announcing plans to cut its Spanish workforce by up to 1,000. Though general economic conditions have not helped, the move partly resulted from its own decisions. The company saw revenue drop for several quarters and so decided to save money by cutting handset subsidies. more

I’m Impressed by Fadi

I could have ignored yesterday's ICANN New gTLD Applicant Update Webinar and just read summaries from the usual respected news and industry sources. However, with three hours slotted and likely questions regarding ICANN CEO Fadi Chehadé's somewhat eyebrow-raising comments at the regional ICANN Registry-Registrar meeting in Amsterdam last week -- led me wanting to hear it all myself. more

Data Center Operators Are Essential Critical Infrastructure Workers Amid COVID-19 Pandemic

The March 19, 2020, guidance from the U.S. Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA) declared what global citizens appreciate more each day as the COVID-19 pandemic crisis unfolds: "Functioning critical infrastructure is imperative during the response to the COVID-19 emergency for both public health and safety as well as community well-being." more

Tips for Managing Your Company’s Shadow IT Issues

Shadow IT -- the use of unsanctioned software and services by employees -- is a problem. It's a big one. According to Forbes, 72 percent of executives don't know how many "shadow" apps are being used on their network. Beyond overloading network resources and impacting data compliance, there is also the real threat of security breaches from unapproved apps. Managing IT you can't see is no easy task, but fortunately it's not impossible. Here are five tips to help bring light to the shadows. more

Hospitals Advised to Prepare for a Month of Downtime Following Cyberattacks

The Joint Commission, a healthcare accreditation agency, has advised hospitals and health systems to brace for at least a month of downtime following a cyberattack, according to The Wall Street Journal. This recommendation is part of new guidelines released by the agency for handling IT security events. more

Three Reasons Why Apple Didn’t Have to Unlock a Phone

The US government is demanding Apple unlock iPhones in about a dozen cases beside the San Bernardino one. In a strikingly similar case, Judge James Orenstein in Brooklyn rejected the government's request for three separate reasons. In the decision the judge refers several times to the San Bernardino case, and it is clear he expects this decision to be an important precedent for that one. more

Authentication Methods Used in the RIPE Database

Objects in the RIPE Database can only be modified by those authorised to do so. For instance, an object representing a certain range of IP addresses assigned to an organisation by the RIPE NCC or a Local Internet Registry (LIR) can be modified by the organisation holding that address space. Each database object contains one or more attributes referencing the maintainer(s) of that object. In a maintainer (MNTNER) object, credentials are listed for those who are authorised to modify any object referencing that MNTNER object. more

ISOC-NY Event: dot nyc - How Are We Doing? (Sat Apr 10)

Joly MacFie writes: Last October the NYC Department of Information Technology & Telecommunications (DoITT) issued a request for proposals for "services to obtain, manage, administer, maintain and market the geographic Top Domain name .nyc.". At ICANN's recent 37th meeting in Nairobi, consensus was reached on the "overarching" issue of intellectual property protection. This leaves only the issue of the final (4th) draft of the Applicants Guidebook, expected before the 38th meeting in Brussels in June 2010... more