/ Recently Commented

Why the Republican Policy Brief on Copyright Should Have Been Withdrawn

On November 16, the Republican Study Committee, a caucus of conservative Republican members of the U.S. House of Representatives, inadvertently released a policy brief entitled "Three Myths About Copyright Law" which was quickly withdrawn. Of course, as a work of the U.S. government, this document does not itself enjoy copyright protection, so it is widely available on the internet through groups like The Internet Archive project. more

First Insights from the GAC Early Warnings on New Top-Level Domains

Today, the national governments that constitute ICANN's Governmental Advisory Committee (GAC) for the first time publicly voiced their concerns over specific new Top-Level Domain (TLD) applications in the form of Early Warnings. More than 240 individual GAC Early Warnings were issued in relation to 200 new TLD applications which account for 162 unique strings. By far the most prolific government to issue GAC Early Warnings was the Australian government with 129. more

A Navigation Aid or a Brand TLD? (Part 2 of 2)

So what are the characteristics of a "Brand TLD"? Please note that by "Brand TLD", I do not mean gTLDs applied for by brands. I mean TLDs whose registrants tend to use them as their primary site and identity. They have either created themselves as, or have become a brand in the eyes of their registrants. These TLDs tend to be in the minority. more

Why Vint Cerf is Wrong

At the Internet Governance Forum in Baku, I made an intervention on behalf of NL IGF, reporting on the recommendations given by the participants of Workshop 87... I concluded that more regulatory and law enforcement bodies need to become part of the IGF discussions, as they are an integral part of governing the Internet from a safety and security perspective. Mr. Cerf responded with a one-liner: "I can't help observing, if we keep the regulatories confused, maybe they will leave us alone". more

The Only Winning Game at the WCIT

With Russia flipping its far reaching Internet takeover proposals into the WCIT pile this morning, it became apparent to WCITeers heading to Dubai in a couple of weeks that the entire show was on a fast trajectory into the wild blue yonder. Indeed, the event may provide an opportunity for Hollywood to film a sequel to One Flew Over the Cuckoo's Nest. Unfortunately, the Russian proposals are only one of many wake-up indicators that this event may not be the exercise in rational, intelligent discourse that some in the preparatory process apparently believed. more

The “ICANN Africa Strategy” Is Not the Same as the ‘African Agenda’

The ICANN-45 International meeting of the ICANN Global Community in Toronto, Canada provided an opportunity for the unveiling of the initial draft of the ICANN Africa Strategy, an episode that will always be remembered as a landmark moment which signaled the official commencement of ICANN's new approach to Africa. Indeed, a new chapter has started regarding how ICANN will relate henceforth to Africa. more

Report Reveals Planned DNSSEC Adoption of 2010 by Key Industries Still in Limbo

A recent progress report on DNSSEC adoption reveals the extent to which organizations in a number of industries are falling short of their own objectives for making Domain Name Server (DNS) infrastructure more secure. The progress report, conducted by Secure64 Software Corporation, is a follow-up to a 2010 study by Forrester Research titled, "DNSSEC Ready for Prime Time," which reported on organizations' plans to implement DNSSEC in order to shore up vulnerabilities in DNS. more

Making Multi-Language Mail Work (Part 1)

Mail software consists of a large number of cooperating pieces, described in RFC 5598. A user composes a message with a Mail User Agent (MUA), which passes it to a Mail Submission Agent (MSA), which in turn usually passes it to a sequence of Mail Transfer Agents (MTAs), which eventually hand it to a Mail Delivery Agent (MDA) to place it in the user's mail store. If the recipient user doesn't read mail on the same computer with the mail store (as is usually the case these days) POP or IMAP transfers the mail to the recipient's MUA. more

Now That Kurt Pritz Has Resigned over Conflict of Interest, Will a Transparent Investigation Follow?

Yesterday ICANN announced that its new CEO Fadi Chehade accepted ICANN Chief Strategy Officer Kurt Pritz's resignation over conflict of Interests -- will a transparent investigation follow? Otherwise, what else and what next? In a statement on its ICANN website, Fadi Chehade states: "Kurt has submitted his resignation because of a recently identified conflict of interest". more

How Far Will U.S. Regulators Bend to AT&T and Verizon?

Recent events relating to the network plans of AT&T and Verizon are extraordinary: it appears that the commercial and lobbying clout of two major telcos is determining the telecom services which their customers can receive, the technology they will receive them with, and whether they will receive them at all. Already a large number of states have agreed to dismantle Carrier of Last Resort (COLR) obligations on them, while the FCC itself is being advised to change the rules to suit the business interest of the telcos. more

ICANN Clarifying Questions - Question 50 Focus (Part 3 of 3)

If the timeline for turn-around of clarifying questions (CQs) remains two-weeks, the long pole in your CQ tent is likely to be revising your Q50 letter of credit or escrow agreement to meet the ICANN requirements. Based upon ICANN comments, it appears that many applicants are having trouble meeting the specific letter of credit (LOC) or escrow agreement language. To remedy this ICANN should consider publishing what it considers acceptable language for an LOC or escrow agreement. more

Applicant Auction for Top-Level-Domains:? Resolving Contention Fairly, Efficiently & Transparently

The quest for new top-level domains took an important step last spring with 1,930 applications to ICANN. 755 of these applications, from 145 different parties, are under contention. ICANN has encouraged these applicants to resolve the contention among them, and has established a last-resort auction in the event agreements among applicants cannot be reached. Here I describe a private auction model, the Applicant Auction, which is an efficient, fair and transparent approach to resolve contentions. more

FISMA Failings: Could EPA’s IT Defense Deficiencies Silence the Agency?

The possibility of unauthorized access to EPA information raises an array of concerns since EPA-held data includes various types of Confidential Business Information, scientific research data, environmental databases, agency plans for responding to "incidents of national significance" and other security-related matters, and environmental monitoring data used in regulatory enforcement actions. more

The Great ITU Internet Heist

There was a meeting in Geneva a few weeks ago dealing with Internet names and addresses. Known as the Second Informal Expert Group Meeting of the Fifth World Telecommunication / Information and Communication Technologies Policy Forum, it was yet another of the endless blathering bodies on this subject that have met for the past fourteen years. more

Clueless About Cloud Computing

The European Union's cloud computing strategy couldn't come at a better time as the region lags behind the rest of the world when it comes to cloud computing usage. The EU announced its cloud computing strategy last month and is optimistic it will create new jobs and help boost a struggling economy. An information campaign is necessary if the EU is to overturn the misunderstanding and general lack of knowledge about the cloud. more