ICANN's last new gTLD application closed in 2012 with more than 600 brands applying for their dot brand. Dot brand domains associate a keyword or keyphrase and a brand name in a complete domain name... To understand better how the evolution of the dotBrand has been throughout these years, number of websites launched, redirects, registries etc, Dot Brand Observatory prepared a few visual graphics. more
A recent article in the New York Times Dealbook column reported on phone number hijacking, in which a bad guy fraudulently takes over someone's mobile phone number and used it to reset credentials and drain the victim's account. It happens a lot, even to the chief technologist of the FTC. This reminds us that security is hard, and understanding two-factor authentication is harder than it seems. more
Recently, California farmer Craig Thompson got a pretty nifty upgrade for his irrigation: a broadband-connected Hydrawise control system that would automatically manage and monitor the irrigation of his olive and grape fields and collect data to alert him if there was a problem. He woke up the next morning to fields he could have assumed were appropriately hydrated, but the Hydrawise system quickly proved its worth when he looked at the data coming out of it. more
Have you ever purchased a new electronic device, taken it home, excitedly unwrapped it and switched it on, only to discover that something is wrong and you need to phone customer support? This scenario is all-too-common in the broadband services industry, and unfortunately, it's usually the service provider who takes the blame. New customers will often purchase gateways from third parties or redistributors without knowing that the device's firmware is out of date. more
SpaceX and OneWeb are formidable, experienced competitors in a race to become global Internet service providers using satellite constellations -- routers in space. I posted a status report on SpaceX last week, now let's look at OneWeb. OneWeb founder and executive chairman Greg Wyler has extensive experience with networking in developing nations. In 2003 his company, Terracom, signed a contract to connect Rwandan schools, government institutions, and homes. more
Despite the launch of more than 1,200 new generic top-level domains (gTLDs) in recent years, .com remains - far and away - the top-level domain that appears most frequently in decisions under the Uniform Domain Name Dispute Resolution Policy (UDRP). But, some new gTLDs are attracting more disputes, including .site, which has become the new gTLD that, so far this year, has appeared in the most UDRP decisions. The rise of .site represents a change from last year, when .xyz was the most-often disputed new gTLD. more
There were only 1.8 million registered .com names when I joined the NSI (Network Solutions) Marketing Team in the summer of 1998. ICANN was formed just a few months later. By the time we were acquired by Verisign in June of 2000 there were roughly 14 million names in the .com database. I recall predictions that one day there would be 100 million registered .com names. Some thought that was a craaaazy number and wanted to know what we were smoking. more
Building IoT ventures from scratch by prototyping hardware devices and their backend systems as well as working for a large company that tries to sell IoT devices itself, we learned a lot about the pitfalls and problems concerning security in the IoT. Nearly every connected device out there proved to be vulnerable to attacks. Researchers showed that it's possible to remotely take control over autonomous vehicles, implanted medical devices were manipulated, voting machines compromised and of course all sorts of other "smart" devices... more
Failing to block a stealthy malicious host from making connections to your network could cost your company millions of dollars, a damaged reputation, and severe losses in sensitive private data. Threat intel teams have faced on-going problems: Expensive feeds that are slow to catch new threats; Chasing false positives in alerts wastes time and money; and Vendors selling a new appliance for every ill. Would 100% of your users Spot the Bot? more
Deep Blue Cable is planning a Caribbean cable - phase one, the solid line shown on the map, bypasses Cuba but phase two shows two Cuban landing points. The phase two cities are not shown, but one appears to be near Havana and the other near Playa GirĂ³n. The phase one route survey is underway. Cable installation will begin in September 2018, and it is scheduled to be ready for service in December 2019. more
After its first edition in Valencia, Brands and Domains will travel this time to the Netherlands where the second conference will take place from the 2nd to 3rd of October 2017. This time, Dot Stories, the main organizer, chose the Hotel Amrath Kurhaus for the event. Nowadays, more than 600 applicants hold already the right to start their own dot brand, but there are not so many who have been brave enough to use it. more
How much visibility do you have over service activation processes? For many service providers, the answer to that question is bleak. The sad truth is that visibility over service activation processes, including errors and misconfigurations, is lacking in many Tier 3, Tier 2, and even Tier 1 organizations. Today's operators often turn to multiple siloed systems when attempting to ensure that services are activated accurately, on time, and are working as promised. more
At their best, UDRP panelists are educators. They inform us about the ways in which parties win or lose on their claims and defenses. What to do and not do. In addressing this issue, I'm referring to less than 10% of cybersquatting disputes. For 90% or more of filed complaints, respondents have no defensible answer and generally don't even bother to respond. But within the 10%, there are serious disputes of contested rights (contested even where respondent has defaulted). more
Back in the early 2000s, several notable Internet researchers were predicting the death of the Internet. Based on the narrative, the Internet infrastructure had not been designed for the scale that was being projected at the time, supposedly leading to fatal security and scalability issues. Yet somehow the Internet industry has always found a way to dodge the bullet at the very last minute. more
I believe Mobile Information and Communications Technologies (ICTs) are and very well remain powerful and best-suited technologies that will help provide connectivity and digital access in a much faster and cheaper way for developing countries of the globe. Thus, they are to be leveraged within their most strategic and profitable functional or usage contexts. Mobile access technologies along with relevant innovations have formed a powerful springboard for the Internet to be significantly accelerated in terms of access, usage and penetration. more
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byIPv4.Global
Sponsored byWhoisXML API
Sponsored byCSC
Sponsored byRadix
Sponsored byVerisign