Featured Blogs

Latest

Making Multi-Language Mail Work (Part 3)

In the previous installments we looked at software changes in mail servers, and in the software that lets user mail programs pick up mail. What has to change in the user mail programs? ... The first and most obvious is that users have to be able to enter the addresses. more

Exploits, Curdled Milk and Nukes (Oh my!)

Throughout the second half of 2012 many security folks have been asking "how much is a zero-day vulnerability worth?" and it's often been hard to believe the numbers that have been (and continue to be) thrown around. For the sake of clarity though, I do believe that it's the wrong question... the correct question should be "how much do people pay for working exploits against zero-day vulnerabilities?" more

To Flat or To Cap?

I don't think it's a surprise to anyone, but it's the Christmas season again and doubtless a large number of television sets will be sold as part of the annual retail festivities. But these days the devices for sale in the shops are not just televisions: today's television is perhaps better described as a media computer with a very large display. Sure, the device can tune in to radio transmissions and display them... but the device also is equipped with either a WiFi or an Ethernet jack, or both. This alone sounds like a relatively innocuous addition to the television, but it's providing to be a highly disruptive change in the traditional Internet market space. more

The Christmas Goat and IPv6 (Year 3)

As Christmas were getting closer, the third time of load balancing the streaming pictures of the famous Christmas goat in the city of Gävle, Sweden, was on the agenda. My goal with this activity is the same as before, to track the use of IPv6 and DNSSEC validation. The results from the last two years are published on CircleID. more

Registering for the Registrar Rodeo: A Note to the New gTLDs

Thank goodness for Monday's new gTLD draw!!! To date the process has been more of an intellectual exercise in marketing, technology, and strategic game thinking - it was getting a little boring. A business needs to see regular 'wins' to keep momentum and stay motivated. The presumptive lineup of new gTLDs has now been established which has given most applicants (save those poor souls looking at 2015 as their launch year) a clear view of the starting gate. more

After Saying No in Dubai: What Next

What occurred in Dubai on 14 December was unprecedented in the history of the ITU. It was unprecedented in the history of international telecommunication law. Most of the major nations of the telecommunication world rejected a profoundly broken treaty instrument that had no reason to even exist. A large number of "minor" networking nations accepted the obligations of the treaty instrument, although almost all of them entered significant reservations. In the long history of telecommunication law and intergovernmental organizations since 1850, this has never occurred. more

Mitigating Harm Caused by the ICANN “Draw”

The gTLD Prioritization "Draw" was a mistake. But its negative impact can still be mitigated. The best course of action follows directly from information that can be gleaned from available data. Let us start with the latest piece of intelligence: who "played" in the "Draw"? 1766 of 1917 applications had a lottery ticket. This is much worse than expected. Very few abstained. Even the purely defensive applicants saw no other choice but to "play". more

The Results of the ICANN Bingo Are In!

A few early technical hiccups with the system streaming it live did not prevent ICANN's prioritization draw from running smoothly yesterday, December 17, 2012. All 1917 remaining applications (out of initial 1930 announced last June) were processed in one of the meeting rooms at the Los Angeles Airport Hilton, starting at 13:00 local time. Shortly before midnight, or more than 10 hours later, Google's Dot MBA was the last application to be pulled out of the box. more

Wine Applications: Results of the New gTLD Prioritization Draw

There are 4 applications related to the wine business in the new gTLD program. Yesterday the new gTLD prioritization draw took place where each application was assigned a randomly-drawn priority number. These priority numbers are used to determine the order in which initial evaluation results are released. In the 1917 applications, 4 applications are related to wine. more

Looking Back on 2012: What’s in our Rearview Mirror?

Well, 2012 is almost over, and we can now reflect on the major events that hit our industry this year. If I had to choose the top three trends from the past 12 months, they would have to be: 1. Over-the-top (OTT) services; 2. IPv6 deployments (finally!); 3. TR-069 adoption. Let's examine each of these in more detail. more

4 Key Dates on the gTLD Timeline

The new "dot-anything" domain extensions or "gTLDs" have been a major point of debate in the domain community for years now -- ever since they were just a glimmer in ICANN's eye -- and it's all come down to a few very important dates over the next six to nine months. more

WCIT and Internet Governance: Harmless Resolution or Trojan Horse?

The Resolution No. 3 called "To Foster an Enabling Environment for the Greater Growth of the Internet" became the subject of a rather substantial controversy during the recent World Conference on International Telecommunication (WCIT) which ended last week in Dubai. Some people have argued that they did not understand the noise around the short text... However a second reading of the ten paragraphs makes you sensitive that this "harmless resolution" could become also a "Trojan Horse". more

WCIT Denouement

It is midnight in Dubai and I am listening to the final readings of the International Telecommunication Regulations (ITR). This instrument is the final output of two weeks of negotiations at the World Conference on International Telecommunication (WCIT), a gathering of the world's nations to update the the ITRs. The Chair goes through the document article by article, section by section, and with each passing "thank you", this Conference draws to a close. Many in the room are elated. more

How to Donate Safely to Charity

Please share this post. After a tragedy, many of us want to donate to funds and charities to show our support for a community. However, scam charities immediately pop up, looking to steal your well intentioned donations. There are at least 30 newly-registered domains over the past 48 hours related to the tragic shootings at the Sandy Hook elementary school in Connecticut: Most, if not all are scams and rip-offs. How then, to donate so that your funds make it to the deserving victims? more

WCIT-12 Disappoints, More Work to Be Done

In the end it was a disappointment that the treaty on International Telecommunications regulations (ITRs) that had been under negotiation for two weeks at WCIT-12 was not acceptable to 55 countries, and that, as a consequence, these countries did not sign the final version of the international treaty (89 did sign). After two weeks of sometimes fractious negotiation - 1,275 proposals were discussed in all - the contentious issues were significantly watered down. However the dissenting countries felt that the key issue - anything in relation to the internet - should not be included at all and, quite correctly, did not compromise on that. more

Topics

Threat Intelligence

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days