Featured Blogs

Latest

Is racing.com a Half-Million Dollar Mistake for Racing Victoria?

What's a domain name? What business function do they serve? Can a domain name generate ROI? I imagine these were the questions the Board of Racing Victoria asked before signing off on the purchase of racing.com to support a Victorian racing industry joint initiative to establish a digital media and content platform similar to that of the AFL. more

Net Neutrality Undermining Spreads to Developing Countries

After the USA set the bad example of allowing telcos to start charging different rates for content delivery services, other incumbent telcos elsewhere are only too happy to jump on the bandwagon and use the American example as a reason and an excuse to end net neutrality (NN) in their countries also. As did their American counterparts they too see this as another way to grab some extra monopolistic income. more

Sailing Backwards: WSIS 10+ Avoids Entering Uncharted Territory

Early August 2014 the UN General Assembly agreed on the procedures how to review the results of the UN World Summit on the Information Society (WSIS) from 2005. According to the draft resolution, the WSIS 10+ event will be a high level intergovernmental meeting in New York in December 2015. This meeting will adopt an "intergovernmental agreed outcome document"... The outcome document will be negotiated by governments in an "intergovernmental negotiation process". Non-governmental stakeholders from the private sector, civil society and technical community will be invited for "informal interactive consultation" in a parallel process. Wait a minute? What are "informal interactive consultations" in a parallel process? more

Where is Metadata Anyway?

I can't help but think that the situation in this rather old joke applies very precisely to the current Australian efforts to compel network operators, through some contemplated regulatory instrument, to record and retain network-collected data about their customers' online activities. What I'd like to examine here the emerging picture that while networks, and network operators, make convenient targets for such surveillance efforts, the reality of today's IP network's are far more complex, and Internet networks are increasingly ignorant about what their customers do. more

Return of the WCIT

The title looks like a horror show advertisement; or, maybe a recurrent plague. It is actually a combination of both, and last inflicted itself on the world two years ago in Dubai. It could be visiting us again in the years to come... The World Conference on International Telecommunications (WCIT) and formerly known as Administrative Conferences have been around for the past 150 years. There have been 31 of them held under the aegis of a U.N. agency known as the International Telecommunication Union (ITU) and its precursors. more

Call for ICANN to Educate and Not Mislead GAC

I read with interest the recent blog written by Theresa Swinehart a Sr. Advisor to the President on Strategy. She wrote: "The most critical element of this [ICANN Transition] process is trust and alignment. To ensure success on this accountability track, we must as a community work closely together to make sure that the final process is meaningful. There is plenty of work to be done in an ambitious period of time." more

The .nyc Landrush Auctions: Adding Injury To Insult

New York City is in the midst of a two part Landrush for its .nyc domain names. First is a 60 day application period (August 4 – October 3) during which anyone with nexus -- basically city residents -- can purchase an available .nyc domain name... It doesn't even matter if a name has a NYS Trademark or d/b/a registration, those names too are fair game... There are significant problems with this process. more

Website Usage Analysis in the New gTLDs

A recent study, by EURid and the Leuven Statistics Research Centre, set out to better understand the most common usage of websites that are linked to domains, and we thought it would be an interesting exercise to extend similar analysis to the new gTLD market. So, we analyzed all second-level domains registered in new gTLDs according to published zone files on June 29, 2014.  more

The Next New Media: Typewriters and Handwritten Letters

Who would have thought that typewriters and handwritten letters would ever be back in fashion? But back in 2013 it was reported that Russia was buying large quantities of typewriters. When this was further investigated the country denied that this was for security reasons. Since the Snowden revelations there has been a further rush on typewriters, both by government officials and by a range of, mainly corporate, businesses. more

Google Domains: Give Me More

The Buzz seems to be about Google Domains at the moment: Google is launching as a Registrar and will soon offer plenty of fantastic things to do with domain names. But... is there anything new with Google Domains? I checked the features but... I found nothing that other Registrars do not already offer and I admit I expected to be a little more impressed. more

Verisign Mitigates 300 Gbps DDoS Attack and Other Q2 2014 DDoS Trends

It has been another busy quarter for the team that works on our DDoS Protection Services here at Verisign. As detailed in the recent release of our Q2 2014 DDoS Trends Report, from April to June of this year, we not only saw a jump in frequency and size of attacks against our customers, we witnessed the largest DDoS attack we've ever observed and mitigated -- an attack over 300 Gbps against one of our Media and Entertainment customers. more

What is Metadata, and Why Should I Care?

August 2014 is proving yet again to be an amusing month in the Australian political scene, and in this case the source of the amusement was watching a number of Australian politicians fumble around the topic of digital surveillance and proposed legislation relating to data retention measures. The politicians assured us that the proposed data retention measures were nothing untoward, and all that was being called for was the retention of "metadata" by Australian ISPs for a period of two years. more

Constituencies Coalesce on IANA Transition and Enhanced ICANN Accountability Principles

It is now being broadly acknowledged that, as expressed unanimously by all GNSO constituencies at the recent ICANN London meeting, "as part of the IANA transition, the multi-stakeholder community has the opportunity and responsibility to propose meaningful accountability structures that go beyond just the IANA-specific accountability issues". In a July 22nd Keynote Address at the American Enterprise Institute, NTIA head Lawrence Strickling - whose agency must approve any IANA transition plan developed by Internet stakeholders - made this linkage an explicit element of U.S. government policy... more

Video Interviews of IANA Stewardship Transition Coordination Group (ICG) Members

Want to know more about what is going on with the IANA Stewardship Transition Coordination Group (ICG)? ICANN recently published a set of video interviews with members of the ICG. Here, for instance is the interview with Alissa Cooper who represents the IETF on the ICG... While this is certainly not the complete list of ICG members, it is a good sampling of the variety of people involved with the ICG and does provide a range of different viewpoints into what is going on within the ICG process. more

Call for Nominations: M3AAWG J. D. Falk Award Seeks Stewards of a Better Online World

Anyone seeking to honor a groundbreaking contribution toward a better online world should submit a nomination for the 2014 M3AAWG J. D. Falk Award. Presented to people whose work on specific projects made the Internet a safer, more collaborative, more inclusive place, the J. D. Falk Award has recognized leaders and pioneers who saw elements of the online experience that needed improvement and took action to fix them.  more

Topics

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

Threat Intelligence

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days