Featured Blogs

Latest

Thoughts on the Open Internet - Part 1: What Is “Open Internet”

I'm sure we've all heard about "the Open Internet." The expression builds upon a rich pedigree of term "open" in various contexts. For example, "open government" is the governing doctrine which holds that citizens have the right to access the documents and proceedings of the government to allow for effective public oversight, a concept that appears to be able to trace its antecedents back to the age of enlightenment in 17th century Europe. more

.WINE New gTLD is Here, Thanks to Politicians

It is no news that the .WINE and .VIN new gTLDs are to be announced soon by Donuts and if the month of November is the very month everybody has been waiting for, at the beginning of the Sunrise Periods, many questions arise regarding the protection of wine geographical indications... There is a lot to say regarding the length of time it took to launch .wine and .vin new gTLDs and, most of all, how difficult it has been to protect its wine Geographical Indications (also called "wine GIs"). more

Correcting Federal Databases: A Procedural Guide

Federal databases, such as those being compiled by the Consumer Financial Protection Bureau and the Federal Trade Commission, contain data about many people and businesses. Although some of this data may be protected personal information (PPI), there is also extensive information in federal databases that is publicly disseminated via the internet. If the information is wrong, it has the potential to be a vector of tortious mischief. more

The Social Responsibility Imperative - TLDs Leading the Charge

Last month at CIRA's annual general meeting, I had the pleasure of meeting Tracy Axelsson, the executive director of the Vancouver Community Network. Her organization is working to connect street-involved citizens in downtown Vancouver with critical life-saving information via SMS messages. Chatting about her program was a vivid reminder for me of what many technology companies around the world have recognized, that the benefits of our wares can have a profound impact on our economies, culture and social fabric of our countries. more

Verisign iDefense Analysis of XcodeGhost

At Verisign we take our Internet stewardship mission very seriously, so when details emerged over the past week concerning the XcodeGhost infection, researchers at Verisign iDefense wanted to help advance community research efforts related to the XcodeGhost issue, and leveraging our unique capabilities, offer a level of public service to help readers determine their current and historical level of exposure to the infection. more

Congress Must Approve Transfer of IANA Function to ICANN

Earlier this year, the Obama Administration announced its plans to turn over the very heart of the Internet to the control of ICANN. On Monday, Republican leaders of the House and Senate Judiciary Committees sent a letter asking the Government Accountability Office to study whether a Congressional vote on the transfer is required under the Constitution's Property Clause because administration of the root zone file is a government asset, created under government contract. Some will no doubt dismiss the letter as Republican obstructionism. more

Watch Live Oct 1 - Dyn’s Techtoberfest: Internet Trends, Security, Net Neutrality and More

On Thursday, Oct 1, 2015, from 9:30am-4:30pm US EDT (UTC-4), Dyn will be holding their "TechToberFest" event in Manchester, NH, and also streaming the video live for anyone interested. There are a great set of speakers and a solid agenda. As I wrote on the Internet Society blog, I'll be part of the security panel from 3-4pm US EDT... and we who are on the panel are excited to participate just for the conversation that we are going to have! It should be fun! more

Thinking Ahead on Privacy in the Domain Name System

Earlier this year, I wrote about a recent enhancement to privacy in the Domain Name System (DNS) called qname-minimization. Following the principle of minimum disclosure, this enhancement reduces the information content of a DNS query to the minimum necessary to get either an authoritative response from a name server, or a referral to another name server. more

Decoding the WSIS Message - ISOC Releases Matrix of Countries’ WSIS+10 Positions

Over the next few months, major discussions at the United Nations will shape the future of Internet governance. In order to prepare with our community for the ten-year Review of the World Summit on the Information Society (WSIS+10), in New York, USA, on 15 to 16 December 2015, we are publishing today a matrix of the countries' positions on WSIS+10. The matrix draws from their written contributions to the UN this summer, and is designed to help all stakeholders better understand the key issues at the the heart of the negotiations. more

Why We Need Gigabit Networks

There is currently a great deal of debate regarding the need for gigabit networks. There are still a lot of voices, often led by conservative political and media people, who argue that hardly anyone needs such networks. Unfortunately for them, however, their arguments are totally flawed. And who are they, anyway, to set the tone for such new infrastructure. Isn't necessity the mother of invention? more

More Than Just Forwarding: How .brands Like Apple Can Use Defensive Registrations

The domain industry media was abuzz last week with speculation that tech giant Apple may be gearing up to launch its .apple brand TLD. Rumours began when it was discovered that Apple registered 29 .com domain names that to the untrained eye, appear to be strangely worded. These include the likes of imovieapple.com, macbookproapple.com and ipadapple.com, providing hope to many industry pundits that they could potentially be defensive registrations designed to protect Apple from losing traffic when it begins to utilise its .apple TLD. more

Revisiting Internet Governance

You might recall that I played an advisory role to the World Conference on International Telecommunications (WCIT) in 2012 in Dubai. In the run-up to that event -- as well as during and after it -- I gave my opinion on the role of internet governance, plus an analysis of what was happening. At that time I held a more conciliatory position on the issue, but you may have noticed that, in the wake of the Snowden revelations and the illegal NSA activities, as well as many other similar activities from ASIO in Australia and no doubt the Russian, Israeli and Chinese authorities, my position has shifted significantly. more

ICANN Accountability: Beware the Bridge Too Far

Yesterday I had the privilege of delivering the keynote address at the inaugural Internet Society (Canada) Symposium. In my remarks, I took the opportunity to talk about my thoughts on the current status of the IANA stewardship transition and enhancing ICANN accountability processes. Fact is I'm getting increasingly concerned. As we head into what will be a critical meeting of the CCWG-Accountability in Los Angeles today, I fear that the Internet governance community is headed for a showdown, the consequences of which could prove detrimental. more

NTIA Directs Smoke Signals Toward LA

On September 25th-26th the Cross Community Working Group developing enhanced accountability measures to accompany the IANA functions transition, and replace the "backstop" role played by the U.S., will meet in Los Angeles to review the 90 comments filed on their second draft Proposal and consider responsive modifications... As NTIA will be the primary evaluator of whether the transition & accountability package that is eventually forwarded by ICANN meets the criteria it set when it announced the transition in March 2014, CCWG participants in LA will be carefully reading the tea leaves of this latest NTIA statement. more

The ICANN Accountability End Game

It was predictable, and inevitable, I suppose, that the end game of a search for a more accountable ICANN would devolve to a lawyer's contest. When there is money on the table, and when global politics are invoked to one degree or another, it is the lawyers who are tasked to translate lofty goals into precise words on paper that will survive the inspection of judges and courts. And ambitious politicians as well. more

Topics

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days