In 2007, Johna Till Johnson, president of Nemertes Research, published a paper that hyped a so-called "Exaflood" - a kooky Discovery Institute idea about how the Internet would drown in its own data. The Nemertes press release on the paper was widely reported in newspapers. It described itself as a "... landmark study ... groundbreaking analysis ... evidence the exaflood is coming... It said: "The findings indicate that by 2010 ... users could increasingly encounter Internet "brownouts" or interruptions to the applications they've become accustomed to using on the internet." more
Ryan Naraine reporting at Threatpost: "Head of Google's anti-malvertising team Eric Davis wants Internet Service Providers (ISPs) to look beyond profits and take a more proactive approach to dealing with malware-infested computers on their networks. During a keynote presentation at the Virus Bulletin conference here, Davis said competitors in the ISP space must look beyond profits and partner on new initiatives to deal with the "parasites" that have taken control of the Internet landscape." more
The surest way to screw up future innovative applications would be for ISPs to make constraining assumptions about the future based on existing applications' performance. Discussing P2P behavior as if it were some monolithic, unchanging entity is simply wrong. What is P2P? BitTorrent? Skype? CNN live video feed fan-outs? And what of changes to these existing apps? What of future apps? more
The much-anticipated New gTLD Draft Application Guidebook is out! ICANN has released Version 3. Lots of changes, some minor, some large. All worth reading if you're a potential applicant or just interested in the promise of new Top-Level Domains (TLDs). The public comment period clock started October 4, and runs until November 22 of this year. more
Kicking off the sixth annual National Cybersecurity Awareness Month this October, the Department of Homeland Security (DHS) has urged computer users to practice good "cyber hygiene". The campaign was given a boost Wednesday when the Senate passed resolution 285 to support its goal to make U.S. citizens more aware of how to secure the internet. DHS has also announced that is has been given new authority to recruit and hire up to 1,000 cybersecurity professionals across the department to fill roles such as: cyber risk and strategic analysis; cyber incident response; vulnerability detection and assessment; intelligence and investigation; and network and systems engineering. more
The imminent expiration date (September 30) of the joint project agreement between ICANN and the US government, establishing the US as unilateral supervisor over Internet's addressing and Domain Name System (DNS) operations, has rejuvenated the call for an internationalization of Internet oversight. The average Internet user, however, is unlikely to benefit from a change in the current status quo as both alternatives, full privatization and intergovernmental oversight, are bound to affect both the Internet's innovative power and the personal liberties enjoyed by its users. more
"Surprise, surprise, surprise!" is how Gomer Pyle would react to the news that the US government has allowed the JPA to expire, thus completing the transition of DNS management to ICANN. Plenty of skeptics doubted the US would let it happen, but today really is ICANN's independence day. more
The Internet Corporation for Assigned Names and Numbers (ICANN) has reached a major milestone today with a new agreement in place with the U.S. Department of Commerce allowing the organization greater independence and giving more countries oversight of the organization. more
Sixty-one businesses, organizations, and individuals, including many of the domain industry's major players, yesterday sent a letter to ICANN, detailing the reasons why new top-level domains are required without delay. If you're interested in top-level domains, or if you just want to understand why they are important to the Internet, this letter lays out the reasons clearly and succinctly, with a minimum of jargon. more
According to reports today, the Australian federal government made a drastic change to a bill that could potentially allow ISPs to police online traffic. Karen Dearne of the Australian IT reports: "Electronic Frontiers Australia spokesman Geordie Guy said it was unclear if the draft Telecommunications (Interception and Access) Amendment Bill was an "attempt to sneak through" a wholesale expansion of intercepts of private emails and file-sharing or merely a badly drafted bill." more
At the outset I should say that here I would like to restrict my view to the transition from the IPv4 Internet to the IPv6 Internet, and, in particular, to examine the topic of the appropriate market structure that lies behind the dual stack transition strategy, and the manner in which the Internet can transition from the universal use of IPv4 as the underlying datagram protocol to the universal use of IPv6. more
The Internet Corporation for Assigned Names and Numbers (ICANN) went before a Congressional panel this week to defend its plan to create an unlimited number of new Internet domains (like .web, .food, etc.) I was a witness at the hearing, which made one thing clear: the "consensus" on new Internet domains is not as strong as ICANN would have us think. more
Financial Times has an article called The broadband numbers racket, by former FCC chief economist Thomas Hazlett, now a professor of law and economics at George Mason University. Hazlett points out that too many people use superficial selection of statistics to bolster questionable policy positions. more
At the end of this month, September 30th, the Joint Project Agreement (JPA) between the Internet Corporation for Assigned Names and Numbers (ICANN) and the U.S. Department of Commerce (DoC) will come to an end. While ICANN has affirmed its commitment in maintaining a long-term, formal relationship with the United States, talks of new changes and a more independent ICANN is intensifying as the expiration date is quickly approaching. For the next upcoming days, this page will be frequently updated with related news and updates. more
Few Internet technologies have horked cyberlaw as much as keyword metatags. Back in the 1990s, some search engines indexed keyword metatags, which encouraged some websites to stuff their keyword metatags as a way of gaming the rankings. Judges took a dim view of this practice, largely because the surreptitious nature of keyword metatags seemed inherently sinister, regardless of their efficacy. In the interim, search engines wizened up. more