Not matter how much robustness and redundancy you build around your multi-tiered infrastructure you are bound to suffer outage(s). I'm not implying the failure of a single server, but a complex outage that's usually external to the operation of the infrastructure. What matters is how you communicate outage notification when things do go awry. I think the words that I'm searching for are transparency and openness. more
The U.S. Federal Communications Commission (FCC) on Monday announced it is allowing full commercial use of 3.5 GHz band for broadband connectivity and 5G. more
As I write this, it is World Holocaust Day, 27th January 2021, a memorial of the atrocious events that shocked and outraged the conscience of humanity and gave birth to the Universal Declaration of Human Rights in 1948, the year that Holocaust victims majority of whom were Jews re-established the nation of Israel. Most of us can never begin to imagine the extent of the atrocities but relive the experiences through movies or documentaries, including but not limited to Spielberg's 1993 Schindler's List... more
Ukraine's representative to ICANN's Governmental Advisory Committee (GAC) has sent a letter to the Internet Corporation for Assigned Names and Numbers (ICANN) to remove Russian-administered top level domains (.RU, .SU and .рф) from the DNS root zone. In a separate letter, Ukraine's representative also asked RIPE NCC to withdraw the right to use all IPv4 and IPv6 addresses by all Russian members of the regional IP registry for the European region. more
Here are my opening remarks at F2C: Freedom to Connect yesterday: "I am honored to be among so many remarkable people. We have to be remarkable people, because we have a hell of a job to do. The Internet has been given to us. It is a miraculous gift, and a boon to our lives... at least in part because it accidentally matured outside the purview of profit and loss. Now the money has arrived. If you want to see what happens when the money arrives, look at Nigeria or Venezuela or Russia or Iraq..." more
Last week, the Federal Communications Commission (FCC) announced new privacy rules that govern how Internet service providers can share information about consumers with third parties. One focus of this rulemaking has been on the use and sharing of so-called "Consumer Proprietary Network Information (CPNI)" - information about subscribers - for advertising. The Center for Information Technology Policy and the Center for Democracy and Technology jointly hosted a panel exploring this topic last May... more
In opening up for the .BRAND top level domain, ICANN has artificially created a scarce resource of great commercial value. Indeed, the values of the .BRAND TLDs may be astronomical due to the investments made by the companies that own the trademarks represented in the .BRAND TLD. While the above is interesting in its own right, I will here focus specifically on how we deal with situations where more than one company has a legitimate trademark interest in a particular .BRAND TLD. more
As mentioned in previous analyses, the way that the Government has approached its battle with the digital giants has been flawed from the beginning. True, its tough stand had made Google pay media companies well above what these companies would have been able to negotiate individually with Google, but the fundamentals of why these battles are taking place are still unchanged. more
The EB-5 Investor Visa Program was created by Congress in 1990 to "stimulate the U.S. economy through job creation and capital investment by foreign investors." The program, administered by the Department of Homeland Security's U.S. Citizenship and Immigration Services (USCIS), provides that entrepreneurs (and their spouses and unmarried children under 21) are eligible to apply for a green card (permanent residence) if they make the necessary investment in a commercial enterprise in the United States; and plan to create or preserve 10 permanent full-time jobs. more
2015 has already started to make its own land marks in the internet of things world. A major thing that has definitely hit the headlines is cyber security issue, which gives an indication that organizations will probably have to make generous budgetary allocations to answer to these anticipated breaches. Internet governance is perhaps going to remain in the headlines for the rest of 2015. more
Even those who care about net neutrality might not have heard of the aptly-called Shadow Regulations. These back-room agreements among companies regulate Internet content for a number of legitimate issues, including curbing hate speech, terrorism, and protecting intellectual property and the safety of children. While in name they may be noble, in actuality there are very serious concerns that Shadow Regulations are implemented without the transparency, accountability, and inclusion of stakeholders necessary to protect free speech on the Internet. more
Canadian Prime Minister Justin Trudeau on Wednesday told reporters that President Donald Trump's plan to roll back net neutrality protections for the internet "does not make sense". more
Previously, this series tackled the terribly awful Amendment 35 to the NTIA-Verisign cooperative agreement and also made the case that the tainted presumptive renewal currently included in registry agreements is inherently anti-competitive. But renewing legitimacy and integrity of Internet governance requires accurately understanding the unique and significant role retained by the U.S. government following the IANA transition. more
As we reported in our Post-GDPR Compliance Rate retrospective in January 2020, registrar compliance rates in response to verified requests for redacted registrant information using the Appdetex WHOIS Requestor System was 25 percent. Our most recent report shows the compliance rate has increased to 27 percent, based upon a total of 243 requests for redacted WHOIS information sent to 68 registrars over the period starting January 1, 2020, through February 24, 2020. more
Domain Name System (DNS) Operators (Registries and Registrars) receive notices asking them to take action on a wide range of alleged technical and content-related abuses. However, there is a fundamental question of when it is appropriate to act at the DNS level and the evaluation of whether the alleged abuse meets a sufficient threshold for action at the DNS level. Additionally, given the volume of abuses occurring on the internet, existing resources, mechanisms, and protocols available in-house to Operators are in many cases insufficient to address abuses in a timely fashion. more