/ Most Viewed

Should “Fake” Oakley Websites Be Insulated From UDRP Law?

Oakley, Inc. ("Oakley"), the maker of some very popular and trendy sunglasses, has also become a trend-setter in the area of UDRP law where it has been involved in two important decisions in the last few weeks. First, Oakley lost a UDRP decision last month for the domain name www.myfakeoakleysunglasses.com. In that case, the panelist Mr. Houston Putnam Lowry denied Oakley's Complaint on the basis that the domain was not confusingly similar to the OAKLEY mark. more

Trend Towards Liberalization Of Country Domain Names: Enters .CN

On Monday 17 March, domain name registrations under the new Chinese Internet address, .cn, were available for the first time to registrants both inside and outside of China. As China's equivalent of .uk, or .us, the .cn domain space will be the Internet address of choice for Chinese consumers and for corporations interested in operating in one of the largest Internet markets. more

AT&T’s Randall & Stankey: Wireless Data Growth Half The FCC Prediction

40%, not 92%-120%. "Data consumption right now is growing 40% a year," John Stankey of AT&T told investors and his CEO Randall Stephenson confirmed on the investor call. That's far less than the 92% predicted by Cisco's VNI model or the FCC's 120% to 2012 and 90% to 2013 figure in the "spectrum crunch" analysis. AT&T is easily a third of the U.S. mobile Internet and growing market share; there's no reason to think the result will be very different when we have data from others. more

The Future of Data Storage

One of the consequences of our increased use of broadband is a big increase in the amount the data that we store outside our homes and businesses. The numbers are becoming staggering. There are currently about 3.7 billion people using the Internet, and together we generate 2.5 quintillion bytes of online data every day. The trends are that by 2025 we'll be storing 160 zettabytes of data per year - a zettabyte is one trillion gigabytes. I store a lot more data online than I used to. I now store things in the cloud all day long. more

Server-Side Mobile Web Detection Used by 82% of Alexa Top 100 Sites

About 82% of the Alexa 100 top sites use some form of server-side mobile device detection to serve content on their main website entry point. As you descend from the top 10 to the top 25 and top 100 sites the percentage of sites using server-side detection falls from 100% to 96% to 82%. This is an interesting fact given that all the recent discussion in the blogosphere is of responsive design using client-side techniques such as media queries. more

When Did We Give Away the Internet?

I've been following the recent news on the World Summit on the Information Society, and it's getting really bizarre. The Wired article is one example of out of the out-of-this-world coverage on the World Summit; I heard a similar spin yesterday on a radio show that often shares material with the BBC. What king or dictator or bureaucrat has signed the document giving power over the Internet to one organization or another? Did I miss the ceremony? One laughable aspect of news reportage is that the founders and leaders of ICANN always avowed, with the utmost unction, that they were not trying to make policy decisions and were simply tinkering with technical functions on the Internet.  more

New gTLD Fees Threaten the Diversity of the Name Space

The great promise of the new gTLD programme is not that it will spawn dozens of .COM clones, but rather that it will lead to the creation of a global constellation of unique names embraced by specific interest groups. As an ICANN community, our challenge now is to ensure that the policy framework we've created to manage new gTLDs advances that vision by not penalising the very sorts of domains that the programme was designed to encourage. more

Chinese Alternate Root as a New Beginning and Real Internet Governance

I suppose not many have been listening to Paul Vixie or surfing from China, I have done both. The Chinese "alternate root" has been going on for a while. China is creating an alternate root, which it can control while using the Chinese language. I doubt I need to tell any of you about ICANN, VeriSign, Internet Governance, alternate roots or the history of these issues. Everyone else will. Unlike most of my colleagues, I hold a different opinion on the subject and have for some time. China launches an alternate root? It's about time they do, too! more

Hackers Hijack DNS Server for Cyrptocurrency Wallet BlackWallet, Over $400K Stolen From Users

Unknown hackers (or hacker) have hijacked the DNS server for BlackWallet.co, a web-based wallet application for the Stellar Lumen cryptocurrency (XLM). more

Another Try at Proof-of-Work e-Postage Email

Another paper from the Fifth Workshop on the Economics of Information Security, (WEIS 2006) is Proof of Work can Work by Debin Liu and L, Jean Camp of Indiana University. Proof of work (p-o-w) systems are a variation on e-postage that uses computation rather than money. A mail sender solves a lengthy computational problem and presents the result with the message. The problem takes long enough that the sender can only do a modest number per time period, and so cannot send a lot of messages, thereby preventing spamming. But on a net full of zombies, proof of work doesn't work. more

Received a Questionable Email From NABP? It May Be Illegal Spoofing

Has your organization recently received an email claiming to be from NABP's Internet Drug Outlet Identification Program (IDOI)? If so, it is possible that someone is trying to trick you. The NABP IDOI team's email account has recently been illegally "spoofed" by unaffiliated persons or organizations. Email spoofing involves the forgery of an email header so that the email appears to have originated from someone other than the actual source. more

African Peering and Interconnection Forum (AfPIF) Streaming Live This Week From Dakar, Senegal

The 5th African Peering and Interconnection Forum (AfPIF) gets underway today, August 26, 2014, in Dakar, Senegal, with a packed agenda full of sessions focused on the future of peering and interconnection in Africa. There are sessions targeted at Internet Service Providers (ISPs), Internet Exchange Points (IXPs), infrastructure providers, content creators and policy makers and regulators. The event goes through Thursday, August 28, 2014. more

Worm Propagation Strategies in an Ipv6 Internet

A recent paper called "Worm Propagation Strategies in an IPv6 Internet", written by Steven M. Bellovin, Angelos Keromytis, and Bill Cheswick, examines whether or not the deployment of IPv6 will in fact provide a substantial level of barrier against worms. Shared below are the introductory paragraphs from this paper. "In recent years, the internet has been plagued by a number of worms. One popular mechanism that worms use to detect vulnerable targets is random IP address-space probing..." more

Demystifying Premium Domain Names

For the purpose of this article it is not necessary to concentrate too much on defining what a Premium domain name is and what it is useful for: all that we need to know is simple, a premium domain name is often a memorable generic name, short or medium in length and highly valuable due to its relevance in search. However, when it comes to finding out how to register a premium domain name then it becomes much more difficult because you won't necessarily know where to go. more

Email, Privacy, and Engagement

After they finished the tenth installment of their enormous multi-volume history, The Story of Civilization, Will and Ariel Durant wrote a set of thirteen essays entitled The Lessons of History. I happened to pick up this volume yesterday; it's both slim and sweeping. The Durants loved history, and wanted to show their readership what waves and tensions and trends they perceived. It's not a great book, but it's an undeniably forceful one. One essay discusses the essential moral characteristics of individuals, listing six traits and providing "positive" and "negative" descriptions of ways in which people act. more