/ Most Viewed

A Proposed New gTLD Timeline Without Batching

Following the release of our new gTLD multiple batch timeline yesterday, today we would like to take the opportunity to demonstrate to ICANN and the community exactly how a single batch timeline could be implemented and how this would benefit all applicants. In recent weeks, ARI Registry Services has publicly expressed concern about the current batching model and digital archery system. Several other key stakeholders within the community have also raised concerns and expressed support for our position. more

Governing the Invisible: AI Risks in Telecom Infrastructure Outpace Global Legal Frameworks

As AI systems take on critical roles in telecommunications, global regulatory frameworks remain outdated and fragmented, leaving essential infrastructure vulnerable to novel risks that current laws on cybersecurity and data protection fail to address. more

ICANN Should Keep Content Regulation and Other Arbitrary Rules Out of Registry Contracts

The domain name system is not the place to police speech. ICANN is legally bound not to act as the Internet's speech police, but its legal commitments are riddled with exceptions, and aspiring censors have already used those exceptions in harmful ways. This was one factor that made the failed takeover of the .ORG registry such a dangerous situation. But now, ICANN has an opportunity to curb this abuse and recommit to its narrow mission of keeping the DNS running... more

Facebook Is Right to Call the Australian Government Bluff

As mentioned in previous analyses, the way that the Government has approached its battle with the digital giants has been flawed from the beginning. True, its tough stand had made Google pay media companies well above what these companies would have been able to negotiate individually with Google, but the fundamentals of why these battles are taking place are still unchanged. more

Outages Never Sleep!

Not matter how much robustness and redundancy you build around your multi-tiered infrastructure you are bound to suffer outage(s). I'm not implying the failure of a single server, but a complex outage that's usually external to the operation of the infrastructure. What matters is how you communicate outage notification when things do go awry. I think the words that I'm searching for are transparency and openness. more

UDRP Complaints: Getting it Right the First Time; Second Chance With New Facts

UDRP complainants are expected to get it right the first time, and if they don't there's a narrow window for a second filing. Evidence previously available but overlooked will not support a new complaint, although this does not preclude the possibility of one being accepted on evidence of new facts. In Haru Holding Corporation v. Michael Gleissner / NextEngine Ventures LLC the Panel concluded that the time between registration of the domain name and the filing of the complaint was too short for bad faith use... more

Network Security: How Attackers Gain Access from Inside

Most people - mistakenly - believe that they are perfectly safe behind a firewall, network address translation (NAT) device or proxy. The fact is quite the opposite: if you can get out of your network, someone else can get in. Attackers often seek to compromise the weakest link in a network and then use that access to attack the network from the inside, commonly known as a "pivot-and-attack." more

The Early History of Usenet, Part VIII: The Great Renaming

The Great Renaming was a significant event in Usenet history since it involved issues of technology, money, and governance. From a personal perspective -- and remember that this series of blog posts is purely my recollections – it also marked the end of my "official" involvement in "running" Usenet. I put "running" in quotation marks in the previous sentence because of the difficulty of actually controlling a non-hierarchical, distributed system with no built-in, authenticated control mechanisms. more

Court Case Serves as a Good Reminder as to the Perils of Marketing Through Text Messages

A court in Illinois rejected a motion to dismiss case filed by defendants in a class action brought on behalf of plaintiffs who received SMS spam marketing for an animated film called "Robots". The court's ruling is not surprising, given the other cases which have come to a similar conclusion. more

China Closing the Door to New Technologies

2013 may be a promising year for global trade in technology with the kick-off of the International Technology Agreement expansion discussions, the Trans-Atlantic Trade and Investment Partnership, and as the Trade in Services Agreement gets going. But China calls its own tune, and is now threatening to restrict its market for Internet-enabled technologies through a clever device that could cost its trading partners billions. more

A Closer Look at the AIP Internet Draft Proposal

Just in time for ICANN's 44th meeting next week, a new Internet Draft has turned up, purporting to fix the centralization of the DNS. The draft has received some attention, including an article in PC World. It isn't entirely clear what the real purpose of the draft is, but it is hard to credit the notion that it is solving any technical problem. Without examining the reasons why the draft exists, I want to debunk a claim in it. more

ICANN Launches $10 Million Grant Program to Boost Global Internet Growth

ICANN, the organization overseeing the Domain Name System, has announced a $10 million grant initiative to propel projects supporting "the growth of a single, open and globally interoperable Internet." The first application cycle for grants is set to open in March 2024. more

In a Networked World Knowing the Right Time Is Essential but How Accurate Are the Computer Clocks?

Computers have always had clocks. Well maybe not clocks as you might think, but digital computers have always had oscillators, and if you hook the oscillator to a simple counter then you have a clock. The clock is not just there to tell the time, although it can do that, nor is it there just to record the time when data files are created or modified, though it does that too. Knowing the time is important to many functions, and one of those is security. more

Combating Counterfeit and Substandard ICT Devices

Counterfeiting is a negative activity that is affecting almost all areas of economies, incidentally it has become a menace in the Internet world. Apart from selling of fake products online, the production and sale of imitated or counterfeit products create huge market for products that hurt the producers of the genuine goods and also create a menancing health risk to the users. more

Second House Amendment Ups the Stakes on IANA Transition

The House of Representatives has passed another measure related to the proposed IANA functions transition, and has again attached it to "must pass" legislation. This move ups the ante and may well be the final straw that compels the Senate Commerce Committee to hold its own oversight hearing on the IANA transition proposal.On May 30th the House adopted the Duffy Amendment to the Appropriations bill funding the Commerce, Justice, and State Departments in FY 2015. The final vote on the amendment was 229 in favor and 178 opposed -- it was fairly partisan outcome, with only ten Democrats voting aye while just one Republican voted nay. more