Featured Blogs

Latest

What to Know About an ICANN Compliance Audit, and How to Handle One if You Are Selected?

Now that new gTLD registries have been operating for more than a year, a few registries have already experienced going through an audit and a few more are now receiving notifications that they are next in line. For all, the process of going through an ICANN audit is a first. Once you receive the Request for Information (RFI), you will have 15 days to respond, or seek an extension of time. Extensions may be available on a case by case basis. more

com.google April Fools’ Is No Laughing Matter: What .google Could Mean for Other .brands

When April Fools' Day rolls around each year, Google is generally one of the front runners for jokes -- often making headlines for its quirky gimmicks. This year was no exception. On April 1st, Google launched its first domain name under the recently delegated .google Top-Level Domain (TLD), a massive milestone for all .brand TLD owners. Google is encouraging millions of people around the world to visit: www.com.google. more

Premium Generics, the Domain Industry’s Luxury Goods

Categories. The mere mention of the word risks eliciting groans from any domain industry specialist. In the run up to the new gTLD program, this concept was oft discussed. It seemed obvious to most that TLDs were not a homogenous ensemble but instead, could exist in many different shapes and sizes. Except to ICANN staff. They systematically refused to entertain the notion of categories. Even when ICANN Board members suggested some kind of recognition for different TLD types should be hardwired into the program! more

Active and Passive Internet of Things

"The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it." -Mark Weiser ...The Internet of Things is a step in this very direction. And like all things new and mysterious, it has its fair share of utopian and dystopian soothsayers; with an almost certain probability that neither of their deterministic predictions will completely come to fruition in the future. more

Driving Force Behind Mobile Connect Initiative

Increased pressure is being exerted in different parts of the industry to create a more secure and a more private environment for a range of mobile activities. Whether it is women in developing economies who need to be certain that their communication is kept private, especially in relation to their husband and male relatives, or the 100 million users, mainly in developing economies, which rely heavily on mobile payments; there are now 16 countries that have more citizens with mobile bank accounts than the traditional ones. more

Freedom of Expression Chilled by ICANN’s Addition of Speech Restrictions in DNS

Freedom of expression on the Internet is at risk from ICANN's recent decision to prohibit anyone but one specific type of doctor from using the word within the .doctor new gTLD space. Last month, ICANN's New GTLD Program Committee decided that only "medical practitioners" would be allowed to register a domain in the .doctor name space. ICANN's decision to exclude numerous lawful users of the word, including a broad range of individuals who are in fact doctors, comes at a time when the world is watching ICANN to see if it can adequately protect Internet users' rights in the absence of US Government supervision. more

ISPs to Enforce Copyright Law

A group of major ISPs and major content providers have agreed on a a mechanism to enforce copyright laws in the network. While full details have not yet been released, the basic scheme involves using previously designed IP flags to denote public domain content. That is, given general copyright principles, it is on average a shorter code path and hence more efficient to set the flag on exempt material. more

Simplifying Legalese

I attended a conference last week on Data Protection and one of the prime issues that cropped was that on the immanent complexity of legalese that prevents users from understanding the Terms & Conditions for which they're signing up when they join a social network, use an app or visit a website. This led to the Users being disinterested in understanding the T&Cs. This had a huge impact on Data Protection Policies since Users were ignorant about how their data was being used... more

Low Cost Economy Depends on Ubiquitous Affordable High Speed Broadband

Around the world there are ongoing developments to reform and transform industries and whole sectors with the assistance of new information & communications technologies (ICTs). There is a clear understanding that reforms are essential in order to provide the level of services and the quality be it in business or elsewhere. Lifestyle issues are under threat in relation to the quality and the affordability of healthcare, social services, education, energy and the environment... more

The 4 Major Drivers for Investment in NFV

Communication Service Providers (CSPs) have been driving the industry to develop agile solutions that abstract physical hardware from their solution platforms. With this technology, they hope to commoditize service functions to increase service agility and reduce the capital required to achieve better and more efficient service. Over the years, we have seen solutions from TMForum and CableLabs that help standardize certain aspects of the CSP plant and similar initiatives in the CPE world with Reference Design Kit (RDK)... more

Consumers Are the Serfs of the Feudal Internet Companies

In one of the email conversations with my expert colleagues from around the globe, an interesting article was discussed written by Bruce Scheier in Wired: When it comes to security, we're back to feudalism. An interesting aspect of the discussion was the conclusion that Google's and Facebook's consumers are not their customers. The distinction is important, because consumers are the product being sold to their actual customers who are their advertisers. more

IPv6 Security Myth #10: Deploying IPv6 is Too Risky

After a quick break to catch our breath (and read all those IPv6 Security Resources), it's now time to look at our tenth and final IPv6 Security Myth. In many ways this myth is the most important myth to bust. Let's take a look at why... Myth: Deploying IPv6 Makes My Network Less Secure... I can hear you asking "But what about all those security challenges we identified in the other myths?" more

Internet Governance Survey: What You Told Us

What do people perceive to be the top issues facing the Internet today? How can stakeholders work more effectively together to strengthen the governance mechanisms meant to address these issues? And when it comes to the Internet Society, what should our role be and where should we focus our attention? To help inform our work in Internet governance, we posed these and other questions to our community in February. We had an overwhelming response with over 800 people taking a few minutes of their time to answer our survey. more

Join Live On Sunday - 2nd Registration Operations Workshop (ROW) In Dallas

This Sunday, March 22, 2015, the second Registration Operations Workshop (ROW) will be taking place at the Fairmont Dallas hotel from 12:30 -- 4:30 pm CDT. Discussion will include extensions to EPP, new encryption initiatives and also suggestions for ways to further automate DNS interactions between registries, registrars and DNS operators, including a need to do this for DNSSEC. more

M-Government Requires Mobile ID

More and more governments are now looking at electronic ways to deliver services to their citizens. With the enormous growth in mobile penetration this infrastructure is now becoming a viable alternative in the delivery of services. But personal authentication is required to make this happen. This is recognised throughout the industry for a range of services and the GSMA has launched a project 'Mobile Contact' aimed at developing a standardised mobile ID. more

Topics

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

Threat Intelligence

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days