Content inspection is a poor way to recognise spam, and the proliferation of image spam recently drums this home. However if one must use these unreliable techniques, one should bring mathematical rigour to the procedure. Tools like SpamAssassin combine content inspection results, with other tests, in order to tune rule-sets to give acceptable rates of false positives (mistaking genuine emails for spam), and thus end up assigning suitable weights to different content rules. If one is going to use these approaches to filtering spam, and some see it as inevitable, one better know one's statistics... more
Today is Holocaust Remembrance Day. Today we remember that the Nazis rounded up Jews, Roma, political dissidents, and other "undesirables" using the best data and technology of the day and sent them off to concentration camps. We don't normally deal with this type of political reality in ICANN, but now is the time to do so. In 1995, the recently formed European Union passed the EU Data Protection Directive. more
On August 27, 2014, the world became a bit more connected as the Internet welcomed more than 400 million Hindi language speakers in their own language. .???? (.Bharat), which means India in the Hindi language, was inaugurated on August 27 in New Delhi by Mr. Ravi Shankar Prasad, India's Minister of Law & Justice and Communications & Information Technology. more
Our recent cooperation with the OECD on IPv6 deployment inspired us to provide more IPv6 deployment statistics to a wider audience - from network operators to national governments. The result is an infographic that shows the percentage of networks or Autonomous Systems that announce one or more IPv6 prefixes in the global routing table. This metric shows how many networks have actually deployed IPv6 in a country or group of countries. more
In CSC's recent insight paper, we address the trend that many business leaders today don't realize the extent to which their modern enterprise -- and its millions of digital assets -- rely on. It's a vast domain ecosystem that needs to be protected from online threats. Often, to better understand this need for domain security, we need to understand how critical and interconnected domains are within a business. more
Oakley, Inc. ("Oakley"), the maker of some very popular and trendy sunglasses, has also become a trend-setter in the area of UDRP law where it has been involved in two important decisions in the last few weeks. First, Oakley lost a UDRP decision last month for the domain name www.myfakeoakleysunglasses.com. In that case, the panelist Mr. Houston Putnam Lowry denied Oakley's Complaint on the basis that the domain was not confusingly similar to the OAKLEY mark. more
Post-Thanksgiving is a time of reflection where we are thankful for technological improvements that allow us to succeed. Every-so-often, technology comes along that not only improves our business but can also help the world. Cloud computing is such a technology. Transitioning to the cloud is a good choice for just about any business, for several reasons. Cloud applications offer scalability, performance, cost-effectiveness and easy mobile access. more
npt its recent meeting in San Francisco, ICANN approved a new draft timeline for the launch of its new generic top-level domains (gTLDs) program that will let its Board of Directors approve the final Applicant Guidebook in June 2011, enabling companies to apply for gTLDs before the end of the year. more
The National Cybersecurity Center of Excellence (NCCoE) has invited comments on a draft practice guide to help organizations improve email security and defend against phishing, man-in-the-middle, and other types of email-based attacks. more
A month ago, ICANN announced that it had a large set of proposed changes to its "Guidelines for the Implementation of Internationalized Domain Names". The original guidelines are fairly confusing and not widely deployed by the ccTLDs, so one would think that the proposed revisions would be clearer and more useful. No such luck. Instead of describing what the problems with the old guidelines were, the committee that put together the new proposal simply added a whole bunch more rules. more
For those who don't know, there are typically 3 methods of resolving contention sets in the new gTLD world... Given that Google is a portfolio applicant of over 100 gTLDs why did it elect to go for an ICANN Auction and make all details of the auction public? Disclosure of the winning bid by Google certainly makes a statement, it's very newsworthy, but does it serve Google's purposes, since it is in other contention sets for some popular strings and a bar has been set? more
Last year, I gave a short talk at the Commonwealth Telecommunications Organisation (CTO) Forum in (Abuja, Nigeria) on this topic and I thought I'd offer more details here. Let's say an African government has realised that IPv4 address exhaustion imposes limits its country's ICT development. Initial investigations indicate that deploying IPv6 is the only sustainable solution. Governments are however not very skilled in the bottom-up approach that is popular in the Internet world. more
I bet that nobody believed in 1992 that thirty years later, we'd still be discussing the state of the transition to IPv6! In 1992 we were discussing what to do about the forthcoming address crunch in IPv4, and having come to terms with the inevitable prospect that the silicon industry was going to outpace the capacity of the IPv4 address pool in a couple of years, we needed to do something quickly more
Okay, so spending my Monday morning printing out and reviewing 348 pages of the "New gTLD Discussion Draft" is not exactly what I had mind when I woke up today, but kudos to ICANN for keeping to the timeline that they had released last month. Since, most of you do not have the time or the patience (and probably have real work to do), I've taken it upon myself to highlight the most important changes in this version. more
Ten years ago, I wrote an article that looked back on the developments within the Internet over the period from 1998 to 2008. Well, another ten years have gone by, and it's a good opportunity to take a little time once more to muse over what's new, what's old and what's been forgotten in another decade of the Internet's evolution... The evolutionary path of any technology can often take strange and unanticipated turns and twists. more