The FAKE45 sign in the photo lower right corner appearing on the front page of today's Washington Post -- ironically in front of the Department of Justice headquarters -- captures a result of yesterday's events that may have far-reaching consequences. About 4.5 million people -- including a million in Washington DC alone -- spontaneously came together from every corner of the nation and world to question the legitimacy of a Trump Administration, express disdain for its actions, and assert the repugnancy of its positions. I was there. more
Several posts have been made on the topic of contention resolution and private auctions around the new gTLD program over the last few weeks on CircleID. Many of the Applicants we spoke to thought it was appropriate to weigh in from the RightoftheDot.com perspective. We want you to know that the RightOfTheDot auction offering for contention resolution for new gTLD's, unlike other offerings, remains unchanged from when it was first announced to the Domain Industry. more
By now, we are all exposed to the narrative of how the Internet is no longer a safe place. It is full of bots, misinformation, abuse and violence; it is a space that has been overtaken by terrorists and extremists. The Internet is weaponized to influence elections, undermine democracies, and instill fear in its users. That's the story we are told. No one can deny the swift change that is taking place in global politics. The "brave new world" that has emerged is, currently, based on isolation and fear. more
Sometime later this year - at a venue still unknown - something short of a thousand people from around the world will gather together and engage in a now meaningless ritual almost exactly like they did in 1924. In the 1990s the name of the gathering was changed from the CCITT Plenary Assembly to a World Telecommunication Standardization Assembly (WTSA). more
With ICANN's announcement that the application window for new TLDs will be opening in January 2012 there has been an influx of media coverage directed at our bid for .ECO, as well as the bids of many other organizations the world over. To date, many articles related to our bid have drawn immediate reference to the involvement of Mikhail Gorbachev and Al Gore. more
I've said many times that winning a domain name dispute under the Uniform Rapid Suspension System (URS) is much more challenging than under the Uniform Domain Name Dispute Resolution Policy (UDRP). But, that doesn't mean trademark owners should take the UDRP for granted. One complainant learned that lesson an especially hard way -- first by losing a URS determination and then by losing a UDRP decision on the same domain name. more
Shadow IT -- the use of unsanctioned software and services by employees -- is a problem. It's a big one. According to Forbes, 72 percent of executives don't know how many "shadow" apps are being used on their network. Beyond overloading network resources and impacting data compliance, there is also the real threat of security breaches from unapproved apps. Managing IT you can't see is no easy task, but fortunately it's not impossible. Here are five tips to help bring light to the shadows. more
Edward Mc Nair, executive director of the North American Network Operators Group (NANOG), delivered the keynote at the seventeenth regional meeting of the Caribbean Network Operators Group (CaribNOG), held from April 10 to 12 at the Hilton in Bridgetown, Barbados. McNair's keynote focused on the important role that network operator groups, or NOGs, play in building an Internet that serves the specific needs of the people in the region. more
Last week during the ICANN meeting in Barcelona I attended a short presentation from the Internet Watch Foundation (IWF). Their mission is pretty simple: ...eliminate child sexual abuse imagery online. Fortunately, the presentation I was at did not include any of the actual material (which would have been illegal anyway) but even without seeing any of it the topic is one that I think most people find deeply disturbing. more
Once you've determined that you can trust the signer of a message, as we discussed in part 3, it's easy to extrapolate that various portions of the message are equally trustworthy. For example, when there's a valid DKIM signature, we might assume that the From: header isn't spoofed. But in reality, DKIM only tells us two basic things... more
Are you concerned about the recent reports about government surveillance programs? Are you concerned about security and privacy online? If so, you may want to attend (in person or remotely) the INET Washington DC event happening on Wednesday, July 24, from 2:00 - 6:00 pm US Eastern time at George Washington University. Sponsored by the Internet Society and GWU's Cyber Security Policy and Research Institute, the event is free and open to the public and will also be streamed live on the Internet for those who cannot attend in person. more
I think every client who is considering building a fiber network asks me how long the fiber will last. Their fear is having to spend the money at some future point to rebuild the network. Recently, my response has been that fiber is a hundred-year investment -- and let me explain why I say that. We're now seeing fiber built in the 1980s becoming opaque or developing enough microscopic cracks that impede the flow of light. more
This post I've been pondering on for a long time, but never found the right angle and perhaps I still haven't. Basically I have these observations, thoughts, ideas and a truckload of questions. Where to start? With the future prospects of us all. Thomas Picketty showed us the rise of inequality. He was recently joined by Robert J. Gordon who not only joins Picketty, but adds that we live in a period of stagnation, for decades already. "All great inventions lie over 40 years and more behind us", he points out. more
Google launched today a new effort to track the progress of encryption efforts - both at Google and on other popular websites. Google hopes the project will hold the company and others accountable to encrypt so as to enhance web safety and security. more
The Wi-Fi Alliance has officially certified devices supporting Wi-Fi 7, the highly anticipated next generation of wireless home internet. Starting in 2024, phones, laptops, and routers equipped with this standard are expected to deliver significant speed and efficiency gains compared to Wi-Fi 6E. more