Policy & Regulation

Policy & Regulation / Most Viewed

What Became of the ARCOS Undersea Cable Connection to Cuba?

Cuba's primary connection to the global Internet is through the ALBA-1 undersea cable linking landing points on the south-east shore of the island to Venezuela and Jamaica; however, the bulk of Cuban traffic originates in Havana which is on the north-west coast. Traffic from Havana and other cities in the west travels over a backbone to reach the cable landing points. A landing point near Havana would reduce the load on the backbone... more

DNS WHOIS: Barking Up the Wrong Tree

As the Internet has grown and matured, it has become obvious to everyone involved that the DNS Whois system, as it currently exists, is not a sustainable way to share contact information for resolving network problems. ICANN, in an attempt to save DNS Whois, has plunged head long into the process of developing new policies aimed at fixing it. While I respect all of the hard work that has gone into this process, the results thus far have only made it clearer that this system faces intractable problems. more

ICANN Fails Consumers (Again)

In its bid to be free of U.S. government oversight ICANN is leaning on the global multistakeholder community as proof positive that its policy-making comes from the ground up. ICANN's recent response to three U.S. senators invokes the input of "end users from all over the world" as a way of explaining how the organization is driven. Regardless of the invocation of the end user (and it must be instinct) ICANN cannot seem to help reaching back and slapping that end user across the face. more

Has the FCC Created a Stone Too Heavy for It to Lift?

After five years of bickering, the FCC passed an Open Internet Report & Order on a partisan 3-2 vote this week. The order is meant to guarantee that the Internet of the future will be just as free and open as the Internet of the past. Its success depends on how fast the Commission can transform itself from an old school telecom regulator wired to resist change into an innovation stimulator embracing opportunity. One thing we can be sure about is that the order hasn't tamped down the hyperbole that's fueled the fight to control the Internet's constituent parts for all these years. more

Verisign’s Attempt to Increase its Fees Still Unjustified Despite Diversionary Tactic

Shortly after the National Telecommunications and Information Administration (NTIA)'s recent announcement allowing Verisign to pursue increased .com registry fees, Verisign published a blog post questioning the business practices of registrars and domain name investors. The ICA, on behalf of its registrar and domain name investor members, had previously spoken out against a .com fee increase, as did others in the domain industry. more

700 MHz Auction Winners: Why Block C Matters

Today the FCC announced the winners of the 700 MHz auction -- and you can see from pp. 62-63 of this document that Verizon won Block C. (Block C was set up in two nationwide paired blocks of 11 MHz each, which were auctioned off in very large geographic areas -- 12 licenses, each covering a "Regional Economic Area Grouping". Verizon won seven of the twelve licenses, covering all of the US except Alaska, Puerto Rico, American Samoa, Guam, and the Northern Mariana Islands.) Why does this matter? more

Internet Governance Outlook 2015: Two Processes, Many Venues, Four Baskets

2015 has just started, but the calendar of events related to Internet Governance is already fully packed until the end of the year. The list of issues under discussion gets longer and longer and more and more people expect concrete results from the numerous meetings. Whether we will see the next stumbling step forward on the long march through the Internet Governance Ecosystem will depend to a high degree from the outcomes of two different, but interrelated processes which will overshadow the Internet discussion in 2015. more

Does Online Privacy ‘Really’ Matter? ‘No’ According to Consumers

In introducing yet another online privacy bill, Sen. Ernest Hollings (D-S.C.) claimed that "privacy fears are stifling the development and expansion of the Internet as an engine of economic growth." Certainly, surveys consistently show that consumers express concern about Internet privacy. But what do these surveys really prove? If consumers are really concerned about their online privacy, their behavior doesn't show it. Here's why... more

gTLDs: Why Are Your Overarching Issues Not Relevant In IDN ccTLDs?

"If I would have a voting right, I would vote like this" said Janis Karklins, chair of the Government Advisory Committee (GAC) as he empathically raised two arms in the air. He was showing his, and the GAC's, overwhelming support for the ICANN Board unanimously (barring one abstention) passing the resolution that ratified the IDN ccTLD Fast Track process, propelling it toward an imminent release. A standing ovation was given from a grateful and exuberant audience and everyone seemed pleased with this momentous decision. more

Why the Lawsuit Against .XXX Maybe the Best Sales Tool Ever For New gTLD Applicants

"There is a serious danger that ICM will establish and monopolize such a distinct market. As consumers seeking adult content become more aware of the .XXX TLD, registering and displaying websites in other generic TLDs may not easily be substituted for registration in the .XXX TLD." No that statement is not from the ICM Registry's sales material. more

DPI is Not a Four-Letter Word!

As founder and CTO of Ellacoya Networks, a pioneer in Deep Packet Inspection (DPI), and now having spent the last year at Arbor Networks, a pioneer in network-based security, I have witnessed first hand the evolution of DPI. It has evolved from a niche traffic management technology to an integrated service delivery platform. Once relegated to the dark corners of the central office, DPI has become the network element that enables subscriber opt-in for new services, transparency of traffic usage and quotas, fairness during peak busy hours and protection from denial of service attacks, all the while protecting and maintaining the privacy of broadband users. Yet, DPI still gets a bad rap... more

Hotmail Running Its Own SMTP Variation

Companies sensible to effective delivery of email to all free email services may have noticed problems with deliveries to Hotmail addresses. Despite the SMTP dialog ending with a successful "250" return code, recipients don't see the message. In their Guidelines, MSN require thorough compliance with IETF standards. However, it seems they have their own interpretation about provisions for Delivery Status Notifications, a.k.a. bounces, that servers must send after they have accepted responsibility for delivering the message... more

ICANN and Its Responsibilities to the Global Public Interest

In 1998, the United States government might have taken a different path in asserting its control over the technical administration of the DNS. It might have asserted full U.S. governmental control, or it might have turned over the functions to an international body such as the International Telecommunications Union. Instead, it created a "private-public partnership", incorporated as a California "nonprofit public benefit corporation", with a charter giving the company a dual mission of quasi-governmental functions combined with responsibility for operational stability of the Internet. more

Reduce the Risk of URL Shorteners to Your Brand With Your Own TLD

A very real and potentially dangerous issue for brands is the continual reliance on obscure country code domains for URL shortening services. Recent reports have emerged that the country code domain .ly will no longer allow domains with 4 or less characters to be registered by users outside of Libya. What exactly does that mean for marketers that are using popular URL shorteners like bit.ly and ow.ly today? It means more risk. As a brand owner who is spending thousands or even millions of dollars on your social media campaigns, the solution is very simple - get your own top-level domain, and control your own destiny. more

The Cybersecurity Act of 2009

Four senators (Rockefeller, Bayh, Nelson, and Snowe) have recently introduced S.773, the Cybersecurity Act of 2009. While there are some good parts to the bill, many of the substantive provisions are poorly thought out at best. The bill attempts to solve non-problems, and to assume that research results can be commanded into being by virtue of an act of Congress. Beyond that, there are parts of the bill whose purpose is mysterious, or whose content bears no relation to its title. more