If you've read my posts before you'll be well aware that as a strong advocate for .brands and the power they have to revolutionise digital marketing effectiveness, I am always eager to share some love with organisations that have taken the leap and launched their .brand TLDs. In recent months we've seen diverse and exciting examples from BMW, the Australian Football League and CERN - just to name a notable few. I have the privilege of advising some of the world's largest companies on their .brand strategy, but one recurring question I hear is "When will we see .google and how will they use it?" more
Software-defined networking (SDN) itself represents a deconstructed view of current switching and routing architectures providing the abstractions of control from dataplane. With this newfound control, the industry is leveraging multiple virtualization strategies to build out public, private, and hybrid cloud architectures, delivering multiple new application services to the market. more
More and more connected devices will require more and better electricity solutions. In many developing economies more people have ready access to a smartphone and the internet than they have access to electricity. For that reason we have seen mobile telecoms operators starting to include power solutions (mainly through distributed energy systems, using solar panels) in order to sell more phones and telecom services. This shows how important access to electricity is. more
The two bookends of speaking one's mind are commentary and criticism, which is indisputably acceptable as protected speech, and (in order of abuse) tarnishment and disparagement. Defamation, which is a stage beyond disparagement, is not actionable under the UDRP, although tarnishment and disparagement may be. In ICANN's lexicon, tarnishment is limited in meaning to "acts done with intent to commercially gain" (Second Staff Report, October 24, 2009, footnote 2). more
Next week in Geneva will take place the first meeting of the Internet Governance Forum (IGF) Open Consultations and MAG meetings since the mandate of the this forum was renewed for a ten-year period. Chaired by Lynn St. Amour, this meeting will mark the start of a new beginning. Last December, the 70th UN General Assembly extended the IGF mandate until 2025. With a clear perspective for the next ten years, the IGF has now the unique opportunity to take courageous steps forward. more
On March 25th, 2016, the Ministry of Industry and Information Technology (MIIT) officially posted its revisions to the "Chinese Measures for the Administration of Domain Names" (2016 edition) for public comment. A decade has gone by since the latest administration measures were introduced in 2004 (2004 edition). Registries and registrars have been longing to see this update for a while, and it is therefore no surprise that the new edition has drawn substantial attention at home and abroad. more
President Obama, in March 2016, again stressed the need for better collaboration between the tech industry and the government. He referred to his own White House initiative - this has resulted in the newly-formed US Digital Service, which is trying to recruit the tech industry to work with and for government. One of the key reasons it is so difficult to establish trustworthy, good working relationships is the extreme lack of tech understanding among most politicians and government bureaucrats. more
A recent clarification to draft domain name regulations by China's Ministry of Industry and Information Technology (MIIT) indicates greater engagement and openness with the domain name market, not a contraction as some had feared. Following the MIIT's announcement on March 25th 2016, the same Ministry issued a clarification on Wednesday March 30th stating that its new draft regulations will not affect any foreign enterprises or foreign websites from resolving in China. more
Data generation is all the rage these days. But are you utilizing it to maximize your outcomes? You know that data is indispensable for your business to keep up and outpace the competition. And most leading corporations agree, since statistically, the speed that companies are producing and collecting data is only increasing with 40 zettabytes expected to be created by 2020. The majority of these organizations are then tossing all of this data into data lakes without any real structured methods of extracting some value from it. more
The following rather alarming text caught my eye today... Had the text appeared under a less august letterhead, or signed by less qualified authors, there would be no cause for alarm. However, the letterhead was World Economic Forum and the authors were William J. Drake, Vinton G. Cerf, and Wolfgang Kleinwächter. As one of three coordinators for the Yeti-DNS project, this feels a bit like I'm in big trouble now. So, let's discuss the matter. more
This week, the RightsCon Silicon Valley 2016 conference is taking place in San Francisco. Since the use of encryption in general and the Apple/FBI case in particular are likely to be debated, I want to share a perspective on system security. My phone as a system The Apple/FBI case resolves around a phone. Think of your own phone now. When I look at my own phone I have rather sensitive information on it. more
It seems necessary to publicly address the arguments posed in "Stop Obama's Internet Giveaway" by L. Gordon Crovitz of the Wall Street Journal. If, as Crovitz suggested, the President were truly "giving away the Internet," there would be mass outrage. After all, the Internet has become a primary driver of global commerce. Internet users, businesses, civil society members and Internet operators have come together to approve a set of proposals to make the Internet stronger and more open. more
Measuring and managing subscriber bandwidth can be an easy and cost-efficient way to improve subscriber quality of experience (QoE). In a HFC cable network, bandwidth is shared among users in the same fiber-node. Even though improvements in DOCSIS technology has allowed a substantial increase of bandwidth availability per fiber-node, a few heavy users - as well as new 4K video content - can quickly kill recently-made network investments and leave subscribers with an impression that they are not receiving the quality they deserve. more
As you probably know, the FBI has gotten into Syed Farook's iPhone. Many people have asked the obvious questions: how did the FBI do it, will they tell Apple, did they find anything useful, etc.? I think there are deeper questions that really get to the full import of the break. How expensive is the attack? Security - and by extension, insecurity - are not absolutes. Rather, they're only meaningful concepts if they include some notion of the cost of an attack. more
How do we make DNSSEC even more secure through the use of elliptic curve cryptography? What are the advantages of algorithms based on elliptic curves? And what steps need to happen to make this a reality? What challenges lie in the way? Over the past few months we've been discussing these questions within the community of people implementing DNSSEC, with an aim of increasing both the security and performance of DNSSEC. more
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byWhoisXML API
Sponsored byRadix
Sponsored byCSC
Sponsored byVerisign