Unsubscribing from mailing lists is hard. How many times have you seen a message "please remove me from this list," followed by two or three more pointing out that the instructions are in the footer of every message, followed by three or four more asking people to not send their replies to the whole list (all sent to the whole list, of course,) perhaps with a final message by the list manager saying she's dealt with it? more
The Internet Commerce Association has just sent a letter to senior members of the House Judiciary Committee regarding the likely unintended but potentially devastating impact of H.R. 3261 ("SOPA") as introduced upon ICANN-accredited registrars and other participants in the broad domain name industry, as well as upon the domain registrants who use those services. more
ICANN's travelling circus is meeting in San Juan, Puerto Rico this week. One of the main subjects of discussion has been the introduction of new generic Top-Level Domains (gTLDs), after a GNSO Report [PDF] proposed 19 "Recommendations" for criteria these new domain strings should meet -- including morality tests and "infringement" oppositions. ...It's important to keep ICANN from being a censor, or from straying beyond its narrow technical mandate. The thick process described in the GNSO report would be expensive, open to "hecklers' vetos," and deeply political... ICANN should aim for a "stupid core"... more
It has now been about eight months since I joined the Internet Society as the Director of Deployment & Operationalization and I still get asked on a fairly regular basis "what do you do?" Well, with ISOC's Chief Internet Technology Officer Leslie Daigle's recent departure, and with my time here having exceeded both my first 120 days and my first 6 months, this seems like the right moment to reflect on my brief tenure here so far and perhaps pontificate a bit on where we're going - and why. more
Craig Moffett sees this as I do: "If LTE networks are going to be usage-capped, then the last pretense that LTE can be positioned as a substitute for terrestrial broadband would seem to be gone." The heart of the U.S. broadband plan is to release more spectrum - enough for 10-20 networks like Verizon's LTE now building - and pray that will be enough competition in five to seven years to check price increases. more
New pioneering ideas are not always welcomed or requested by consumers... Henry Ford didn't wait until people wanted a mass-market car. Citibank didn't wait until they wanted ATMs, and Jeff Bezos didn't wait until they decided to shop on their computers. But the three innovators did more than follow a vision. Before they made their respective leaps, they pondered what people did want. They asked themselves some hard questions. more
Recently Google Labs added the Ookla Speedtest data set to their wonderful Public Data Explorer so I just had to try it out. These are not bogus statistics. These graphs show the average of all the millions of actual speedtests run in the respective countries over the past 4 months. more
Many years ago on my first trip to London, I encountered for the first time signs that warned pedestrians that vehicles might be approaching in a different direction than they were accustomed to in their home countries, given the left-versus-right-side driving patterns around the world. (I wrote a while back about one notable change from left-to-right, the Swedish "H Day," as a comment on the IPv6 transition.) more
Empirical studies on cyber- and typosquatting (for example, Moore and Edelman's "Measuring the Perpetrators and Funds of Typosquatting") may inadvertently encourage bad behavior. People tend to do what most other people are doing, even when the given act is presented to them as something wrong. more
Complainants have standing to proceed with a claim of cybersquatting under the Uniform Domain Name Dispute Resolution Policy (UDRP) if the accused "domain name is identical or confusingly similar to a trademark or service mark in which the complainant has rights" (4(a)(i) of the Policy). Quickly within the first full year of the Policy's implementation (2000) Panels construed "rights" to include unregistered as well as registered marks, a construction swiftly adopted by consensus. more
Efforts to combat cybersquatting began in earnest in 1998 when the World Intellectual Property Organization (WIPO) (at the request of the United States Government supported by all member states) began an extensive process of international consultations "to address cross-border trademark-abusive domain name registrations." ... The extensive process concluded in the Spring of 1999 with WIPO publishing a detailed report... more
Where has DNSSEC been successful? What are some current statistics about DNSSEC deployment? What are examples of innovations that are happening with DNSSEC and DANE? All of these questions will be discussed at the DNSSEC Workshop at ICANN 53 in Buenos Aires happening on Wednesday, June 24, 2015, from 09:00 – 15:15 Argentina time (UTC-3). You can watch and listen to the session live. more
There's a new sheriff in town and he's riding the horse of "predictive policing". Back in July the Santa Cruz Police Department began deploying police officers to places where crime is likely to occur in the future -- making use of new predictive modeling programs that are designed to provide daily forecasts of crime hotspots -- thereby allowing the Department to preempt more serious crimes before they occurred. In essence, this is another physical-world application of machine learning and clustering technologies -- applied to preempting a criminal problem. In the cyber-world we've been applying these techniques for a number of years with great success. more
London-based Com Laude, owned by PX3 Partners, will acquire Markmonitor from Newfold Digital for $450 million, merging two long-established firms in the corporate domain management sector. more
Just in case you've been out of the country for the last 12 months, a new scourge is hitting the Internet and the world of email and it's called phishing. The Anti-Phishing Working Group defines phishing as identity theft "attacks using 'spoofed' e-mails and fraudulent Websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords..." According to various experts, the incidents of phishing are rising at an alarming rate: there were 13,000 unique phishing attacks in January alone - that's a 42 percent surge over the previous month. The real problem is that phishing works. more