Featured Blogs

Latest

Panel on Global Internet Cooperation and Governance Mechanisms

The Internet is at a crossroads. And while high-profile events like the introduction of new gTLDs and revelations about governments and online surveillance may be a catalyst for recent Internet governance reform initiatives, their necessity isn't exactly new. After all, the current structures and processes in place were set up a decade and a half ago, an eternity in Internet years. A key step in reviewing and renewing these structures is the Panel on the Future of Global Internet Cooperation, announced at the recent ICANN meeting in Buenos Aires. more

100 Years of Monopoly Phone Service

Today is the 100th anniversary of the Kingsbury Commitment which effectively established AT&T, a.k.a. The Bell System, as a government sanctioned monopoly. It was on December 19, 1913 that AT&T agreed to an out-of-court settlement of a US Government's anti-trust challenge. In return for the government agreeing not to pursue its case, AT&T agreed to sell its controlling interest in Western Union telegraph company... more

Contention for Three More gTLDs Resolved in Fourth Applicant Auction

The Fourth Applicant Auction has concluded, resolving contention for three more strings. Donuts Inc. came away from the auction as the winner of all three strings: .LIFE, .CHURCH, and .LOANS. Life Covenant Church, Inc. will be compensated for withdrawing their application for .CHURCH, and Radix will be compensated for their withdrawal from .LOANS, while Xiamen 35.com Technology Co.,Ltd and CompassRose will be compensated for their withdrawal from .LIFE. more

Identify DDoS Attacks with External Performance Monitoring (Part 2 of 3)

In Part One of this series, we examined internal server, network and infrastructure monitoring applications. Now let's take a look at another way to capture DDoS information: external performance monitoring... Unlike network/infrastructure tools - which are usually installed inside a customer's network - external performance monitoring solutions are typically provided by a third party and leverage monitoring locations from around the world. more

Name Collisions II - A Call for Research

This post is a heads up to all uber-geeks about a terrific research initiative to try to figure out causes and mitigation of name-collision risk. There's a $50,000 prize for the first-place paper, a $25,000 prize for the second place paper and up to five $10,000 prizes for third-place papers. That kind of money could buy a lot of toys, my peepul. And the presentation of those papers will be in London -- my favorite town for curry this side of India. Interested? Read on. more

Rewiring Internet Governance: U.S. Government Will Likely Be Forced to Jettison ICANN (Part 3)

The survival thesis mentioned in Part 2 goes like this. ICANN's imaginary mandate is global. But the mind set is provincial. The latter is defensive; focused on keeping power and therefore control over internet policy. But the evidence points to policy actions that contradict policy rhetoric. Discrepancies disclose the delusion. Here's ICANN "core value" from Article 1, Section 2, Paragraph 6 (amended April, 2013): "Introducing and promoting competition in the registration of domain names where practicable and beneficial in the public interest." more

The Mosque and the Bazaar: Islam, ICANN, and the New gTLD Program

The launch of the new gTLD program in January, 2012 was undoubtedly one of the finest moments for ICANN; and rightly so. The launch was a culmination of thousands of hours of hard work by thousands of people from various countries, interests, and walks of life. In the end, a 338-page Applicant Guidebook with details about how the new gTLD program was to be implemented was produced. Thus was set the stage for the greatest cyberland rush in history. more

2013 Domain Name Year in Review

Well folks, it's that time of year again. It's time for our countdown of the top 10 biggest domain stories for 2013. And while my predictions from last year were accurate, in that we did see a record number of registry and registrar breaches, I had no idea that this year's biggest story would even appear on the list. So with that said, let's get started. more

Are We Ready to Switch Off IPv4?

At the RIPE 67 meeting in Athens, Greece, the RIPE IPv6 Working Group ran a little experiment to test the feasibility of an IPv6-only network and to identify challenges in user experience. While the results were highly encouraging, they indicated that there is still work to be done before IPv4 can be switched off once and for all. As IPv6 is slowly but surely deployed around the world, we've entered a phase where it's necessary for your devices to be able to communicate using either of the two IP protocols currently in use. more

First Geographic NewgTLD, .RUHR, Now Delegated

Each week ICANN has been delegating more new generic top-level domains (newgTLDs) and it's been somewhat entertaining to watch the list of delegated strings to see what new TLDs will enter the domain name space starting sometime in early 2014 when they become generally available for people to register new domains under. more

ICANN 48 in Buenos Aires: What Happened and What’s Next?

Last month, some of my colleagues at MarkMonitor and I traveled to Buenos Aires, Argentina for ICANN 48. With the recent delegation and launch of the first new gTLDs, the atmosphere had an air of both excitement and anxiety. In my opinion, there is much to be done before brand owners should begin to feel comfortable in the post-new gTLD Internet environment, which brings a host of new challenges, as companies attempt to scale monitoring and enforcement to the new (huge) domain name space. more

Identify DDoS Attacks with Monitoring of Internal Applications (Part 1 of 3)

Most cloud DDoS mitigation services are offered on demand meaning that customers can enable the service when they are the victim of a DDoS attack. But how can a company find out -- quickly -- that it is under attack? Sometimes it is difficult to know. In this three part series, we will examine multiple monitoring tools companies can use to capture DDoS, which can help determine whether you are under a DDoS attack. more

How to .DOWNLOAD Banging Tunes, Sick Movies and Nasty Apps

TeenSpeak is being rivalled by GeekSpeak: most Internet Geeks know what "the cloud" is. They know because they are "Internet Geeks", most Internet users don't profess to the same level of 'Geekdom'. Now while I don't claim to be an Internet Geek, I do like to think of myself as an educated Internet user; and the way I think of "the Cloud" is of a computer, plugged in somewhere, and holding lots of "computer things" for the use of anyone, anywhere. You may have heard the expression: "it is hosted in the cloud". more

Brand TLDs Become Official

It seems that pigs can, after all, fly. From the start of its new gTLD program, ICANN ignored what was obvious to pretty much everyone else: corporations might wish to apply for their brands and run them as closed ecosystem TLDs servicing only the brands in question. No longer. By releasing a proposed addendum to its registry contract, called Specification 13, ICANN has done two things it has always said it would never do: acknowledged that "brand TLDs" should be considered in the new gTLD program, and created a new category of TLD for this specific class of application. more

Rewiring Internet Governance: Choice and Control (Part 2)

It is tempting to write off ICANN as a U.S. foreign policy lackey and that's all there is to say about ICANN. However, if the mantra for rewiring governance means "lets get ICANN" we risk missing forest for trees. ICANN is merely the symptom of a dysfunctional governance predicament that somehow (despite best efforts) skews oversight. Shapiro, for example, regards oversight as a "game" (1994). His "delegation dilemma" or "agency problem" stems from two options, neither of which are attractive vis-á-vis governance. more

Topics

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Threat Intelligence

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days