Loic Damilaville writes to report: Today AFNIC is publishing its new issue paper on the secondary market in domain names. The paper -- written to inform individuals as well as businesses -- gives a detailed account of the concept of "secondary market", the valuation mechanisms used, and the main players involved. The secondary market covers over-the-counter sales of already registered domain names, as well as the market in "second-hand domain names" and the ecosystem made up of the various players involved in these matters. more
A few weeks back I asked Where is China's IDN? ICANN not only answered my question about China, but also about a host of additional countries (and territory) that had applied for fast-track IDNs. Here are the most recent IDN (string evaluation) approvals... more
Joly MacFie writes: Last October the NYC Department of Information Technology & Telecommunications (DoITT) issued a request for proposals for "services to obtain, manage, administer, maintain and market the geographic Top Domain name .nyc.". At ICANN's recent 37th meeting in Nairobi, consensus was reached on the "overarching" issue of intellectual property protection. This leaves only the issue of the final (4th) draft of the Applicants Guidebook, expected before the 38th meeting in Brussels in June 2010... more
In my recent blog on utilities and the NBN I mentioned that the ultimate prize would be a combination of the ONT (Optical network terminal: the network interface device used in fibre-to-the-home applications, which operates as a demarcation point between the local loop of the carrier and the wiring in the user premises) and intelligent gateway the electricity company need for their smart meters and home energy networks. Perhaps I should expand on this a little... more
With advancements in hardware and software, sophisticated filtering technologies are increasingly being applied to restrict access to the Internet. This happens at the level of both governments and corporations. .. given the open nature of the trust-based Internet, one country's restrictions, if not handled very carefully, can easily foul the global Internet nest we all live in. This blog is about one such story of Internet restrictions in China becoming visible (seemingly at random) from other parts of the world and going undetected for 3 weeks. more
Mid March a special plenary session of the Canadian standard committee isacc was convened in Ottawa to review the final report of the Canadian IPv6 Task Group. It was unanimously approved and the essence of its 66 pages are seven recommendations for Government, Industry, Service and Content providers, and the regulator, CRTC to proceed with diligence, even some sense of urgency. One paragraph provides an interesting new twist... more
In January we presented the glorious history of the MIT spam conference, today we present the schedule for the first day. Opening session will be from this author, Garth Buren with a topic entitled The Internet Doomsday Book, with details be released the same day as the presentation. Followed by Dr. Robert Bruen with a review of activities since the last MIT spam conference... more
In a landmark judgment issued this past Tuesday, the European Court of Justice (ECJ) ruled that Google is not liable for trademark infringement when an advertiser purchases a keyword based on a competitor's trademark to trigger a search ad, so long as it removes infringing ads promptly when notified by brand owners. However, and this is critical, individual advertisers could be held liable if ads triggered by a keyword involving a competitor's trademark are found to confuse consumers. So, what qualifies as consumer confusion? more
There is an old saying that "bad news comes in threes." Domain name service providers have witnessed two unsettling developments in the past few weeks. The third, still winding its way through the U.S. Congress, could have enormous ramifications. Registries and registrars, in particular, need to speak up or resign themselves to the consequences. more
I'm interested in CircleID community's take on NeuStar's recent announcement of Cache Defender. While only effective for domains the company is authoritative for, that does cover a large number of big Internet brands and financial institutions. Why wouldn't an ISP deploy this now, while waiting for all the myriad issues involved in DNSSEC to be resolved? more
Last week at the ICANN meeting in Nairobi, a plan was announced by ICANN staff to create a "CERT" for DNS. That's a Community Emergency Response Team (CERT) for the global Domain Name System (DNS). There are all kinds of CERTs in the world today, both inside and outside the Internet industry. There isn't one for DNS, and that's basically my fault, and so I have been following the developments in Nairobi this week very closely. more
For those closely following the ICANN Meeting in Nairobi this week, the EOI (Expression of Interest) model seemed like a foregone conclusion. In fact, ICANN had scheduled a webinar on March 18th to explain the process despite the complaints of the community and large-scale disagreement amongst proponents of the EOI. more
This article on cloud appeared in the Economist.com on April 12th 2001 titled "The Beast of Complexities" Stuart Feldman of IBM, mentions these examples. Quote 'Picture yourself as the product manager of a new hand-held computer whose design team has just sent him the electronic blueprint for the device. You go to your personalized web portal and order the components, book manufacturing capacity and arrange for distribution. With the click of a mouse, you create an instant supply chain that, once the job is done, will dissolve again." unquote. ...In the same article he also lamented that so far, nobody has found a silver bullet to kill the Beast of Complexity. more
Mobile operators are counting on Long Term Evolution (LTE) technology to handle surging demand for mobile data access. But LTE developers made some poor choices, cutting spectral efficiency and thus driving up operator costs. LTE was envisioned as an all IP system, but the RF allocations follow the voice-centric approach of earlier generations. While LTE standards allow for either Frequency Division Duplexing (FDD) or Time Division Duplexing (TDD), all initial LTE equipment uses FDD. FDD requires two separate blocks of spectrum... more
Today is the morning of the most revered Thursday in the ICANN meetings calendar -- The public forum. It is tradition personified. It is the day when the show and the showcasing really begin. It is the stage and the choreography of the open microphone that can help influence ICANN decisions one way or another and make the supposed bottom up model appear at its best. more