The 2015 infographic reflects some of the intriguing highlights of the new gTLD industry... Revenues are based on the average retail price over four registrars (101domain, eNom, GoDaddy and United Domains) at the end of December 2015. In the case where a TLD was unavailable at all four registrars, one or more alternative registrars were used for the average price. Top five TLDs launched in 2015 are based on TLDs entering into General Availability after January 1st and based on volume, not revenues. more
In the debate over government "exceptional access" to encrypted communications, opponents with a technical bent (and that includes me) have said that it won't work: that such a scheme would inevitably lead to security problems. The response -- from the policy side, not from technical folk - has been to assert that perhaps more effort would suffice. FBI Director James Comey has said, "But my reaction to that is: I'm not sure they've really tried." Hillary Clinton wants a "Manhattan-like project, something that would bring the government and the tech communities together". More effort won't solve the problem - but the misunderstanding lies at the heart of why exceptional access is so hard. more
The Domain Name System is now over 25 years old. Since the publication of RFCs 1034 and 1035 in 1987, there have been over 100 RFC documents published that extend and clarify the original DNS specs. Although the basic design of the DNS hasn't changed, its definition is now extremely complex, enough so that it's a challenging task to tell whether a DNS package correctly implements the specs. more
The threat level has never been higher for organizations charged with protecting valuable data. In fact, as recent headlines will attest, no company or agency is completely immune to targeted attacks by persistent, skilled adversaries. The unprecedented success of these attacks against large and well-equipped organizations around the world has led many security executives to question the efficacy of traditional layered defenses as their primary protection against targeted attacks. more
When I last year failed to take a picture of the Christmas goat before it was taken down, I decided this year to take a pic every minute, just to be on the safe side. A shortened movie based on these pics of the 2015 Christmas Goat can be find on YouTube. The clip on YouTube also shows that in the early morning of December the 27th the goat was set on fire and burned down in minutes. more
I believe in the Internet As an ideal. As a web of human minds. As a wonder of the world, not built through totalitarian control but rather through fierce coopetition. As a technological pillar held up by a newer, better, governance structure. As the facilitator of knowledge sharing and communication on a level so advanced that it would appear supernatural to folks living just a century ago, or less. I worry for the Internet While it has been a major disruptive force, it is also susceptible to the existing paradigm. more
Recently, BII-Global SDN Certified Testing Center (SDNCTC EN | CH) issued the Performance Test White Paper for SDN Controller (hereinafter Whitepaper) at China Future Network and Development Innovation Forum, which truly fills the vacuum in SDN controller performance testing at home. It, by means of elaborate results from the open-source controller tests, provides reliable analysis report to all corners within the industry, which has been highly thought of and widely supported by experts both at home and broad. more
After two and a half years of technical analysis and discussions, six months of deliberations among all stakeholders, and intense negotiations at the United Nations, at three o'clock in the morning on December 12, 2015, the talented co-facilitators from the United Arab Emirates and Latvia dropped the gavel on the outcome document for the ten-year review of the World Summit on the Information Society (WSIS). That consensus document presents international principles that will guide the UN's work on Information and Communications Technology (ICT)-related issues. more
In the debate about "exceptional access" to encrypted conversations, law enforcement says they need such access to prevent and solve crimes; cryptographers, on the other hand, keep saying it's too complicated to do safely. That claim is sometimes met with skepticism: what's so hard about encryption? After all, you learn someone's key and just start encrypting, right? I wish it were that simple - but it's not. more
Last week I published a blog looking back on the year that was 2015 and reflecting on some of the challenges and achievements for new TLDs. Turning our gaze forward, I think 2016 is shaping up to be the biggest and best year that we've enjoyed to date and will surpass many expectations as we continue the push towards mainstream adoption of these wonderful, innovative digital assets. more
What's the difference between .local and .here? Or between .onion and .apple? All four of these labels are capable of being represented in the Internet's Domain Name System as a generic Top Level Domains (gTLDs), but only two of these are in fact delegated names. The other two, .local and .onion not only don't exist in the delegated name space, but by virtue of a registration in the IANA's Special Use Domain Name registry, these names cannot exist in the conventional delegated domain name space. more
Much of the domain industry has seen a huge surge in sales of 2, 3 & 4 character sales. More specifically numeric domain sales are ever increasing mostly driven by Chinese buyers. As such domain marketplaces are utilizing and developing stronger connections in China to foster this growth even further while creating awareness for why this is occurring. When talk turns to economic and trade growth, China is never left out of the conversation. This talk extends to the domain market as well. more
In the last six weeks we could follow three world conferences on Internet issues. In November 2015 the 10th Internet Governance Forum (IGF) attracted nearly 5000 offline and online participants in the Brazilian Sea-Resort Joao Pessoa. In mid-December 2015, the governments of the 193 UN member states, together with a crowd of non-governmental stakeholders, finalized the review of the 2005 UN World Summit on the Information Society (WSIS) and adopted the WSIS 10+ outcome document. And nearly 2000 people from more than 100 countries did meet on December, 16 – 18, 2015 in the Chinese Water-Town of Wuzhen at the 2nd World Internet Conference (WIC). more
The December 21 deadline for submission of public comments on the latest CCWG-Accountability draft proposal is quickly approaching. In this second draft of the proposal, great strides have been made toward addressing the accountability issues that members of the community have raised (notably, Lawrence Strickling's recent remarks). As I have previously emphasized, any plan to ensure the accountability of the ICANN Board of Directors must be closely scrutinized before ICANN pursues its implementation. more
Domain name registration is a hot industry. Registrars represent a growing multi-billion dollar industry with the keys to the Internet for any organization hoping to have a web presence. Further, because of their role as one of the gatekeepers to the Internet, registrars have the unique ability and are often asked to take action against illegal activity online. This fact was highlighted in the report released this week by the Office of the U.S. Trade Representative, the 2015 Out-of-Cycle Notorious Markets List. more
Sponsored byDNIB.com
Sponsored byIPv4.Global
Sponsored byCSC
Sponsored byWhoisXML API
Sponsored byRadix
Sponsored byVerisign
Sponsored byVerisign