Featured Blogs

Latest

One We’ve Been Waiting For: Google Switches TLD Registrar to .Google Domain Name

If you've read my posts before you'll be well aware that as a strong advocate for .brands and the power they have to revolutionise digital marketing effectiveness, I am always eager to share some love with organisations that have taken the leap and launched their .brand TLDs. In recent months we've seen diverse and exciting examples from BMW, the Australian Football League and CERN - just to name a notable few. I have the privilege of advising some of the world's largest companies on their .brand strategy, but one recurring question I hear is "When will we see .google and how will they use it?" more

Virtualizing the Gateway - How CSPs Are Revolutionizing the Network Edge

Software-defined networking (SDN) itself represents a deconstructed view of current switching and routing architectures providing the abstractions of control from dataplane. With this newfound control, the industry is leveraging multiple virtualization strategies to build out public, private, and hybrid cloud architectures, delivering multiple new application services to the market. more

Electricity Utilities and IoT

More and more connected devices will require more and better electricity solutions. In many developing economies more people have ready access to a smartphone and the internet than they have access to electricity. For that reason we have seen mobile telecoms operators starting to include power solutions (mainly through distributed energy systems, using solar panels) in order to sell more phones and telecom services. This shows how important access to electricity is. more

Running the Gamut: Commentary, Criticism, Tarnishment, Disparagement, and Defamation

The two bookends of speaking one's mind are commentary and criticism, which is indisputably acceptable as protected speech, and (in order of abuse) tarnishment and disparagement. Defamation, which is a stage beyond disparagement, is not actionable under the UDRP, although tarnishment and disparagement may be. In ICANN's lexicon, tarnishment is limited in meaning to "acts done with intent to commercially gain" (Second Staff Report, October 24, 2009, footnote 2). more

The Start of a New Beginning: The Internet Governance Forum on Its Road to 2025

Next week in Geneva will take place the first meeting of the Internet Governance Forum (IGF) Open Consultations and MAG meetings since the mandate of the this forum was renewed for a ten-year period. Chaired by Lynn St. Amour, this meeting will mark the start of a new beginning. Last December, the 70th UN General Assembly extended the IGF mandate until 2025. With a clear perspective for the next ten years, the IGF has now the unique opportunity to take courageous steps forward. more

Why Overseas Registries Shouldn’t Worry About China’s New Domain Name Regulation

On March 25th, 2016, the Ministry of Industry and Information Technology (MIIT) officially posted its revisions to the "Chinese Measures for the Administration of Domain Names" (2016 edition) for public comment. A decade has gone by since the latest administration measures were introduced in 2004 (2004 edition). Registries and registrars have been longing to see this update for a while, and it is therefore no surprise that the new edition has drawn substantial attention at home and abroad. more

Government-Industry Collaboration Is Better than Developing a Surveillance State

President Obama, in March 2016, again stressed the need for better collaboration between the tech industry and the government. He referred to his own White House initiative - this has resulted in the newly-formed US Digital Service, which is trying to recruit the tech industry to work with and for government. One of the key reasons it is so difficult to establish trustworthy, good working relationships is the extreme lack of tech understanding among most politicians and government bureaucrats. more

China’s MIIT Clarifies New Domain Name Regulations, Allays Concerns Over Government Interference

A recent clarification to draft domain name regulations by China's Ministry of Industry and Information Technology (MIIT) indicates greater engagement and openness with the domain name market, not a contraction as some had feared. Following the MIIT's announcement on March 25th 2016, the same Ministry issued a clarification on Wednesday March 30th stating that its new draft regulations will not affect any foreign enterprises or foreign websites from resolving in China. more

Is Your Data Being Maximized?

Data generation is all the rage these days. But are you utilizing it to maximize your outcomes? You know that data is indispensable for your business to keep up and outpace the competition. And most leading corporations agree, since statistically, the speed that companies are producing and collecting data is only increasing with 40 zettabytes expected to be created by 2020. The majority of these organizations are then tossing all of this data into data lakes without any real structured methods of extracting some value from it. more

Let Me Make Yeti-DNS Perfectly Clear

The following rather alarming text caught my eye today... Had the text appeared under a less august letterhead, or signed by less qualified authors, there would be no cause for alarm. However, the letterhead was World Economic Forum and the authors were William J. Drake, Vinton G. Cerf, and Wolfgang Kleinwächter. As one of three coordinators for the Yeti-DNS project, this feels a bit like I'm in big trouble now. So, let's discuss the matter. more

Enough About Apple and Encryption: Let’s Talk System Security

This week, the RightsCon Silicon Valley 2016 conference is taking place in San Francisco. Since the use of encryption in general and the Apple/FBI case in particular are likely to be debated, I want to share a perspective on system security. My phone as a system The Apple/FBI case resolves around a phone. Think of your own phone now. When I look at my own phone I have rather sensitive information on it. more

An Open Response to “Stop Obama’s Internet Giveaway”

It seems necessary to publicly address the arguments posed in "Stop Obama's Internet Giveaway" by L. Gordon Crovitz of the Wall Street Journal. If, as Crovitz suggested, the President were truly "giving away the Internet," there would be mass outrage. After all, the Internet has become a primary driver of global commerce. Internet users, businesses, civil society members and Internet operators have come together to approve a set of proposals to make the Internet stronger and more open. more

Why Understanding Bandwidth is Essential for Improving Subscriber QoE

Measuring and managing subscriber bandwidth can be an easy and cost-efficient way to improve subscriber quality of experience (QoE). In a HFC cable network, bandwidth is shared among users in the same fiber-node. Even though improvements in DOCSIS technology has allowed a substantial increase of bandwidth availability per fiber-node, a few heavy users - as well as new 4K video content - can quickly kill recently-made network investments and leave subscribers with an impression that they are not receiving the quality they deserve. more

The FBI and the iPhone: Important Unanswered Questions

As you probably know, the FBI has gotten into Syed Farook's iPhone. Many people have asked the obvious questions: how did the FBI do it, will they tell Apple, did they find anything useful, etc.? I think there are deeper questions that really get to the full import of the break. How expensive is the attack? Security - and by extension, insecurity - are not absolutes. Rather, they're only meaningful concepts if they include some notion of the cost of an attack. more

The Path Toward Increasing the Security of DNSSEC with Elliptic Curve Cryptography

How do we make DNSSEC even more secure through the use of elliptic curve cryptography? What are the advantages of algorithms based on elliptic curves? And what steps need to happen to make this a reality? What challenges lie in the way? Over the past few months we've been discussing these questions within the community of people implementing DNSSEC, with an aim of increasing both the security and performance of DNSSEC. more

Topics

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

Threat Intelligence

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days