Featured Blogs

Latest

Business Model Canvas for Cloud Providers

Cloud Computing is not so much about technology but more about the new business models that this technology enables. The question then is, how do these business models look? One of the most inspiring ways of looking at business models is through the so-called "Business Model Canvas". This article explores the basics of cloud computing business models as drawn out on such a canvas. more

Nominations For Board of Public Interest Registry (Operator of .ORG) Close Nov 24

Would you be interested in helping guide the future of the Public Interest Registry (PIR), the non-profit operator of the .ORG domain? If so, the Internet Society is seeking nominations for three positions on the PIR Board of Directors. The nominations deadline is Monday, November 24, 2014. More information, qualification requirements and the submission form can be found here. more

Measuring the Pulse of Our Networked Society

Ericsson has released its latest Mobility Report, providing a wealth of analysis and insights into current communications traffic and market trends. As one of the leading mobile infrastructure providers, Ericsson has performed in-depth data traffic measurements since the earliest days of mobile broadband, leveraging its large base of live networks in all regions of the world. more

Cable & Wireless US$3B Deal to Acquire Columbus Exposes Vulnerabilities in Caribbean Telecom Sector

When Cable & Wireless Communications (CWC) announced an agreement to acquire Columbus International, news of the deal sparked widespread concerns about the impact of reduced competition on consumer pricing, infrastructure investment and wider economic development in the Caribbean. If approved, the deal will make CWC the Caribbean's largest wholesale and retail broadband service provider. At the same time, it will return several Caribbean territories into monopoly or near-monopoly markets... more

Content - The Next Regulatory War Zone

At the 2014 TelSoc Charles Todd Oration the former Chair of the ACCC, Graeme Samuel, warned against the looming content monopoly... "There is a constant risk that the exclusive tie-up of rights to content for new and emerging markets will allow the right holders to shut out competition across a wide range of services delivered over new networks." He didn't think that the current telcos have the right expertise to enter the content market... more

Anti-Cybersquatting Lessons from IP Strategy

The post reconsiders a cooperative solution to cybersquatting that I proposed in 2007. I also draw on examples of success and failure of legal actions to protect intellectual property (IP) licensing. Cybersquatting has gone unabated with the new gTLDs despite the introduction of new protection instruments such as the Trademark Cleaning House (TMCH) database and the availability of Uniform Rapid Suspension (URS) services, as well as declarations by registries of their intentions to block unauthorized registrations. more

Government of Quebec Ends Its Participation in .Quebec TLD Days Before Launch

According to ici.radio-canada.ca, the Government of Quebec has decided to end its participation in the new gTLD .Quebec, just days before .Quebec launches. According to the story the Government has decided not to change Government websites to .Quebec and will instead retain all of its Website to end in .gouv.qc.ca... "The news will no doubt be received as a cold shower by PointQuébec organization, which is the company that is operating .Quebec registry. more

New .WINE and .VIN Are Now Political Tools

The more I follow the .WINE & .VIN opera, the more I start to believe that the idea is either to kill both new gTLD applications to free space in Round 2 of the ICANN new gTLD program or make this subject a political tool "only" to increase Europe's presence in ICANN decisions. If there still is a wish from the European Commission to help .WINE and .VIN to become the strongest identity European wines could ever have on Internet, I would like to understand why the situation is still blocked... more

Combating Counterfeit and Substandard ICT Devices

Counterfeiting is a negative activity that is affecting almost all areas of economies, incidentally it has become a menace in the Internet world. Apart from selling of fake products online, the production and sale of imitated or counterfeit products create huge market for products that hurt the producers of the genuine goods and also create a menancing health risk to the users. more

Why We Don’t “Stick to Our Knitting”: auDA’s Role in the Internet Governance Landscape

Last Friday, following three weeks of dazzling diplomacy, the International Telecommunication Union's (ITU) 2014 Plenipotentiary Conference came to a conclusion in Busan, South Korea. For those unfamiliar with the event, the "Plenipot" is the ITU's most significant gathering... At the Plenipot, ITU members elect new office-bearers, set general policies and determine the Union's strategic plans and activities for the next four years. It is this last part that is of most interest to stakeholders in the Internet community... more

Does the Internet Need “Governance”?

It's remarkable to me that there are now two powerful agencies fighting to "govern" the Internet -- the ITU and the FCC. On any given day, it's hard to tell whether they are on the same side or different sides. The ITU process apparently began in earnest with the World Summit for the Information Society (WSIS) meetings, where the concept of "Internet Governance" became an urgent goal. The FCC process began when incumbent Internet Access Providers (IAPs) argued that "Net Neutrality" was a stalking horse for government control... more

ccTLDs Might Be Property

The long-running saga of victims who are pursuing 'state sponsors of terrorism' via ICANN has taken yet another turn. Some time back the Plaintiffs in Rubin & ors -v- Islamic Republic of Iran & ors managed to obtain Writs of Attachment in the Federal court district in Washington (D.C.) courts ordering that the ccTLDs of those respective countries be seized in part-payment of the damages they are owed. ICANN, fairly predictably, became involved at this point. more

The EFF and Hanlon’s Razor

The EFF has just posted a shallower than usual deeplink alleging an "email encryption downgrade attack" by ISPs intent on eavesdropping on their customers. They, along with VPN provider Golden Frog, have additionally complained to the FCC reporting this. Here, they've just noticed something that's common across several hotel / airport wifi networks... more

Domain Name Abuse Is a 4 Letter Word

There has been a lot of back and forth recently in the ICANN world on what constitutes domain abuse; how it should be identified and reported AND how it should be addressed. On one side of the camp, we have people advocating for taking down a domain that has any hint of misbehaviour about it, and on the other side we have those that still feel Registries and Registrars have no responsibility towards a clean domain space. (Although that side of the camp is in steady decline and moving toward the middle ground). more

If It Doesn’t Exist, It Can’t Be Abused

A number of outlets have reported that the U.S. Post Service was hacked, apparently by the Chinese government. The big question, of course, is why. It probably isn't for ordinary criminal reasons: The intrusion was carried out by "a sophisticated actor that appears not to be interested in identity theft or credit card fraud," USPS spokesman David Partenheimer said. ... But no customer credit card information from post offices or online purchases at usps.com was breached, they said. more

Topics

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

Threat Intelligence

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days