Featured Blogs

Latest

Running the Gamut: Commentary, Criticism, Tarnishment, Disparagement, and Defamation

The two bookends of speaking one's mind are commentary and criticism, which is indisputably acceptable as protected speech, and (in order of abuse) tarnishment and disparagement. Defamation, which is a stage beyond disparagement, is not actionable under the UDRP, although tarnishment and disparagement may be. In ICANN's lexicon, tarnishment is limited in meaning to "acts done with intent to commercially gain" (Second Staff Report, October 24, 2009, footnote 2). more

The Start of a New Beginning: The Internet Governance Forum on Its Road to 2025

Next week in Geneva will take place the first meeting of the Internet Governance Forum (IGF) Open Consultations and MAG meetings since the mandate of the this forum was renewed for a ten-year period. Chaired by Lynn St. Amour, this meeting will mark the start of a new beginning. Last December, the 70th UN General Assembly extended the IGF mandate until 2025. With a clear perspective for the next ten years, the IGF has now the unique opportunity to take courageous steps forward. more

Why Overseas Registries Shouldn’t Worry About China’s New Domain Name Regulation

On March 25th, 2016, the Ministry of Industry and Information Technology (MIIT) officially posted its revisions to the "Chinese Measures for the Administration of Domain Names" (2016 edition) for public comment. A decade has gone by since the latest administration measures were introduced in 2004 (2004 edition). Registries and registrars have been longing to see this update for a while, and it is therefore no surprise that the new edition has drawn substantial attention at home and abroad. more

Government-Industry Collaboration Is Better than Developing a Surveillance State

President Obama, in March 2016, again stressed the need for better collaboration between the tech industry and the government. He referred to his own White House initiative - this has resulted in the newly-formed US Digital Service, which is trying to recruit the tech industry to work with and for government. One of the key reasons it is so difficult to establish trustworthy, good working relationships is the extreme lack of tech understanding among most politicians and government bureaucrats. more

China’s MIIT Clarifies New Domain Name Regulations, Allays Concerns Over Government Interference

A recent clarification to draft domain name regulations by China's Ministry of Industry and Information Technology (MIIT) indicates greater engagement and openness with the domain name market, not a contraction as some had feared. Following the MIIT's announcement on March 25th 2016, the same Ministry issued a clarification on Wednesday March 30th stating that its new draft regulations will not affect any foreign enterprises or foreign websites from resolving in China. more

Is Your Data Being Maximized?

Data generation is all the rage these days. But are you utilizing it to maximize your outcomes? You know that data is indispensable for your business to keep up and outpace the competition. And most leading corporations agree, since statistically, the speed that companies are producing and collecting data is only increasing with 40 zettabytes expected to be created by 2020. The majority of these organizations are then tossing all of this data into data lakes without any real structured methods of extracting some value from it. more

Let Me Make Yeti-DNS Perfectly Clear

The following rather alarming text caught my eye today... Had the text appeared under a less august letterhead, or signed by less qualified authors, there would be no cause for alarm. However, the letterhead was World Economic Forum and the authors were William J. Drake, Vinton G. Cerf, and Wolfgang Kleinwächter. As one of three coordinators for the Yeti-DNS project, this feels a bit like I'm in big trouble now. So, let's discuss the matter. more

Enough About Apple and Encryption: Let’s Talk System Security

This week, the RightsCon Silicon Valley 2016 conference is taking place in San Francisco. Since the use of encryption in general and the Apple/FBI case in particular are likely to be debated, I want to share a perspective on system security. My phone as a system The Apple/FBI case resolves around a phone. Think of your own phone now. When I look at my own phone I have rather sensitive information on it. more

An Open Response to “Stop Obama’s Internet Giveaway”

It seems necessary to publicly address the arguments posed in "Stop Obama's Internet Giveaway" by L. Gordon Crovitz of the Wall Street Journal. If, as Crovitz suggested, the President were truly "giving away the Internet," there would be mass outrage. After all, the Internet has become a primary driver of global commerce. Internet users, businesses, civil society members and Internet operators have come together to approve a set of proposals to make the Internet stronger and more open. more

Why Understanding Bandwidth is Essential for Improving Subscriber QoE

Measuring and managing subscriber bandwidth can be an easy and cost-efficient way to improve subscriber quality of experience (QoE). In a HFC cable network, bandwidth is shared among users in the same fiber-node. Even though improvements in DOCSIS technology has allowed a substantial increase of bandwidth availability per fiber-node, a few heavy users - as well as new 4K video content - can quickly kill recently-made network investments and leave subscribers with an impression that they are not receiving the quality they deserve. more

The FBI and the iPhone: Important Unanswered Questions

As you probably know, the FBI has gotten into Syed Farook's iPhone. Many people have asked the obvious questions: how did the FBI do it, will they tell Apple, did they find anything useful, etc.? I think there are deeper questions that really get to the full import of the break. How expensive is the attack? Security - and by extension, insecurity - are not absolutes. Rather, they're only meaningful concepts if they include some notion of the cost of an attack. more

The Path Toward Increasing the Security of DNSSEC with Elliptic Curve Cryptography

How do we make DNSSEC even more secure through the use of elliptic curve cryptography? What are the advantages of algorithms based on elliptic curves? And what steps need to happen to make this a reality? What challenges lie in the way? Over the past few months we've been discussing these questions within the community of people implementing DNSSEC, with an aim of increasing both the security and performance of DNSSEC. more

Transfers of Domain Names Contemporaneous with Complaint: Cyberflight?

Cyberflight (defined as strategically transferring accused domain names to another registrar or registrant upon receipt of a complaint) was a sufficient irritant by 2013 for the ICANN to adopt recommendations to amend the Rules of the Uniform Domain Name Dispute Resolution Policy (UDRP). Effective July 1, 2015 the Rules now include a requirement for locking the domain as well as a change in the timing of transmitting the complaint to respondents. Before the amendment there had been no uniform approach to locking. more

The Second Machine Age Calls for Vision and Leadership

This post I've been pondering on for a long time, but never found the right angle and perhaps I still haven't. Basically I have these observations, thoughts, ideas and a truckload of questions. Where to start? With the future prospects of us all. Thomas Picketty showed us the rise of inequality. He was recently joined by Robert J. Gordon who not only joins Picketty, but adds that we live in a period of stagnation, for decades already. "All great inventions lie over 40 years and more behind us", he points out. more

GAC Empowerment in Post-Transition ICANN

On March 20th, Wall Street Journal (WSJ) Op-ed writer L. Gordon Crovitz published an article titled "Stop Obama's Internet Giveaway". In his opinion piece Mr. Crovitz opposed any near-term transition of the IANA functions... In the course of his article Mr. Crovitz also stated, "Icann already has been kowtowing to authoritarian regimes," alluding to former CEO Fadi Chehade's December 2015 decision to become a Co-Chair of the Advisory Committee to China's World Internet Conference... more

Topics

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Threat Intelligence

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days