Featured Blogs

Latest

Losing a UDRP Case: Questionable Decision or Questionable Submission?

Complainants naturally want to prevail on their claims of alleged infringing conduct and respondents (when they appear) naturally do their best to resist having their domain names taken from them in proceedings under the Uniform Domain Name Dispute Resolution Policy (UDRP), but their success depends on their submitting the right constituents of fact and proof. In a forum that has adjudicated over 60,000 cases, it would be surprising if there were no questionable or badly reasoned decisions. more

Will Low-Earth Orbit Satellite Internet Service Providers Succeed?

In 1990, Teledesic was formed to deliver satellite-based Internet service. Cellular pioneer Craig McCaw, Microsoft co-founder Bill Gates and Saudi Prince Alwaleed bin Talal were early investors and Boeing was both an investor and the prime contractor. Teledesic hoped to offer global Internet connectivity using a constellation of 840 satellites in low-Earth orbit (LEO) at an altitude of 700 km... Teledesic failed. Twenty seven years later three companies SpaceX, OneWeb and Boeing are trying to do what Teledesic could not do. Will they succeed? more

Legal Controls on Extreme End-to-End Encryption (ee2ee)

One of the most profoundly disruptive developments occurring in the cyber security arena today is the headlong rush by a set of parties to ubiquitously implement extreme End-to-End (e2e) encryption for communication networks using essentially unbreakable encryption technology. A notable example is a new version of Transport Layer Security (TLS) known as version 1.3. The activity ensues largely in a single venue... more

Brands and Domains Conference Recap

The best and most knowledgeable experts of dot Brand met in the Brands and Domains conference, on October 2 and 3 in the Hague, Netherlands. Brand and project owners were also present, coming from all around the world -- from Australia or Japan to the USA and Canada. The keynote by Georges-Edouard Dias, CEO of Quantstreams and founder of the concept of brand hospitality, explained how customers are not anymore the targets of brands. more

ICANN to Reconsider the .Amazon Domain Applications

Amazon filed applications for the .AMAZON top-level domains in several scripts in 2012. Five years later, ICANN will re-examine the applications after an Independent Review Process (IRP) proceeding. The IRP Panel found that ICANN's Board failed to demonstrate the existence of public policy reasons for denying the applications. more

The Hack Back Bill in Congress is Better Than You’d Expect

Rep's Graves and Sinema recently introduced H.R. 4036, the catchily named Active Cyber Defense Certainty Act or ACDC act which creates some exceptions to criminal parts of computer crime laws. Lots of reports have decried "hack back" but if you read the bill, it's surprisingly well targeted. The first change is to what they call Attributional Technology, and says it's OK to put bait on your computer for an intruder intended to identify the intruder. more

Independence is New gTLD Compatible

Independence must be a fashion of the moment. Cataluña, a place where I've lived, is fighting hard to be independent and, even if I don't believe a second that this will ever happen, it is a common example of a community which fought hard, very early and by all means, to operate a new gTLD to clearly identify its culture (and Nation) on the Internet: the .CAT Top-Level domain. Note that this TLD has nothing to do with the .DOG nor .PET new gTLDs (joke). more

The Great Inevitable: From Broadband Internet to Cloud Application Access

Some inevitable changes are hard to see in prospect, yet are 'obvious' in retrospect. The next communications revolution is 'made for cloud' access. A colleague pointed me to a Forbes article "For Today's Telecoms Companies, Customer Experience Is Just As Important As Download Speeds". It was written by Huawei's global president of assurance and managed services. Well, I told you so! more

How Governments Can Be Smart About Artificial Intelligence

The French MP and Fields medal award winner, Cédric Villani, officially auditioned Constance Bommelaer de Leusse, the Internet Society's Senior Director, Global Internet Policy, last Monday on national strategies for the future of artificial intelligence (AI). In addition, the Internet Society was asked to send written comments, which are reprinted here. more

Equifax Breach: 9 Fraud Prevention Steps Everyone Should Take

The U.S. Internet Revenue Service now says that criminals already had most of the information that credit bureau Equifax lost in a breach that revealed personal information about nearly 150 million people. The incident at Equifax and the IRS' mid-October admission of how much-stolen data was already in criminal hands may force changes in how the world handles personal information. more

Network Design: If You Haven’t Found the Tradeoff…

This week, I ran into an interesting article over at Free Code Camp about design tradeoffs... If you think you've found a design with no tradeoffs, well... Guess what? You've not looked hard enough. This is something I say often enough, of course, so what's the point? The point is this: We still don't really think about this in network design. This shows up in many different places; it's worth taking a look at just a few. more

Popular ccTLDs for Domain Name Disputes

As I've written before, the registry operators for many country-code top-level domains (ccTLDs) have adopted the Uniform Domain Name Dispute Resolution Policy (UDRP) or a variation of it, while other ccTLDs have crafted their own dispute policies, or none at all. Although no ccTLD appears as frequently as .com in domain name disputes, it's interesting to see which ccTLDs are subject to dispute the most often. more

A Look Back at How the Internet of Iraq Came to be Dependent on Telecoms Based in Kurdistan

On the 25th of September, the northern autonomous region of Iraq known as Kurdistan voted to become an independent country. This vote has led to a current standoff between the central Iraqi government and the Kurdish Regional Government (KRG), with the Kurds threatening to cut off internet service into Iraq in retaliation for any punitive measures inflicted by Baghdad on the KRG. The following analysis was written by Doug Madory of Oracle Dyn after ISIS took control of Mosul, Iraq in 2014. It describes how the internet of Iraq came to be dependent on international connections through telecoms based in Kurdistan. more

Cuba’s (Hopefully Limited) ADSL Expansion

In 2015, ETECSA announced/leaked a plan to make ADSL service available in 50% of Cuban homes by 2020. I was skeptical. Doing so would mean investing a lot of money for obsolete technology between 2015 and 2020. They have recently announced the availability of ADSL connectivity at homes in portions of seven cities and, by December, they say some home connectivity will be available in every province. more

Internet Week Guyana Advances Caribbean Tech Development Agenda

Around the world, the growing sophistication of cyber criminals is challenging the capacity of governments, businesses and individuals to defend themselves. In the Caribbean, governments are forging strategic partnerships with regional actors like the Caribbean Telecommunications Union (CTU) and the Caribbean Network Operators Group (CaribNOG), the region's largest volunteer-based community of network engineers, computer security experts and tech aficionados. more

Topics

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days