Featured Blogs

Latest

It’s Not Paranoia if They Are Really After You!

In the latest development from the World Conference on International Telecommunications, a new "compromise proposal" has been leaked to wcitleaks.org. This proposal is certainly no compromise, as it not only is a bald faced power grab by the sponsors (Russia, UAE, China, Saudi Arabia, Algeria, Sudan at this point), but shows a stunning lack of comprehension of how the Internet works and how it is currently governed. It also shows that the coalition of Civil Society groups and private sector organisations that have focused on WCIT have been correct all along.  more

Lost in Translation? Bridging the Gap between Technology and Governance

It is reassuring that, with the WCIT underway, there is increasing awareness of the threats to the Internet posed by a number of the amendments, significantly in many cases supported by authoritarian governments. There is less awareness of the serious economic implications of some of the proposed ITR amendments. While it is highly unlikely a doomsday scenario will unfold at the WCIT itself, it is clear that substantial changes to Internet governance are possible over the next several years. more

WCIT - So Far So Good - Recap of Week One

So far the world has survived WCIT-12 and the internet has not been taken over by anybody. So, in the end, what was all the fuss about? Those who have followed my reporting on these issues from the very beginning more than a year ago - long before the media frenzy on this topic started - will have seen that we never took the sensational approach. We fully understood the issues that were emerging, but at the same time we could also place them in the right context, to explore how they should be addressed. more

2012 Global Phishing Trends: Uptime Down, Numbers Up

Despite security advances over the past year, including the increased deployment of DNSSEC, pirates continue to wreak havoc on the Internet. But before you decide that Internet security innovations are futile, consider this: online criminals are just like burglars in the physical world; they don't take new ways of blocking their best efforts lying down. They come up with new and, in some cases, stronger plans of attack. more

WCIT’s Security Issues

Another contentious issue at the WCIT in Dubai is 'security'. There has been a dramatic increase in nervousness regarding a whole range of security issues, especially in relation to the internet. They include: SPAM, denial-of-service-attacks, identity theft, cybercrime, cyberwarfare, and privacy issues on social media. From the list above it is clear that some of these issues are related to content, while some can be classified as national security and others as criminal offences. In other words, there is no clear-cut issue on what constitutes security. more

The Case for Hot Swappable Nameservers

Earlier this week we announced our "Proactive Nameservers", which is just marketing speak for what it really is: hot swappable nameservers or nameserver fail over. What is it? ... It's basically what every webmaster, IT department and CTO wishes they had set up before... more

How Can WCIT Assist in Connecting the Rest of the World?

A key element of the World Conference on International Telecommunications (WCIT) is to connect the people around the world who are not yet connected. These are people in developing economies, but also people in rural areas within developed economies, as well as the 650 million people with disabilities. The question is whether the International Telecommunications Regulations (ITRs) that are being discussed at WCIT can assist in this. If we go back to 1988, when the current ITRs were first established, the focus was on access and interoperability. more

Saying No to the ITRs

The afternoon of 13 December in Dubai is notable for one important deadline -- "declaration" if a Nation State is willing to accept the obligations of the resulting treaty instrument and if so, subject to what conditions. It is worth emphasizing that multilateral treaty instruments are serious constraints on a Sovereign's powers, and most nations even if they do sign, make general declarations that provide escape routes to the obligations. more

Industry Structure at the Core of WCIT Problems

At the WCIT in Dubai it is interesting to follow the debates surrounding the many issues being addressed at this world congress. There are the issues of internet governance in the broadest sense of the word - these have received widespread attention. But if we look at the core issues that an organisation such as the ITU can address then the scope widens - to topics such as the rules for the International Telecommunications Regulations (ITRs), and particularly those in relation to the rules for rates and charges. more

Making the Most of the Draw: The Applicant Auction Conference

Yes, it is a bit odd that applicants for top-level domains need to attend the Prioritization Draw in person on December 17. Jetting to LAX to observe a raffle may seem like a waste of time and money. But here is how to make the most of it. Attend the Applicant Auction Conference at the Marriott Santa Monica on December 18. more

The Dubai Debacle: Does It Matter?

The second phase of the Dubai Debacle is now well underway. The first of the ITU-T bodies, the World Telecommunication Standardization Assembly (WTSA) finished its ten day meeting. The second body, the World Conference on International Communication (WCIT) completed its second day. WTSA shapes the ITU T organization and detailed agenda, while the WCIT gives it a treaty-based construct with regulatory mandates. WTSAs occur every four years; WCITs every twenty-five - although there is a proposal to hold them more frequently. more

Sovereignty and the Geography of Cyberspace

The cross-border nature of the Internet challenges an international system based on separate national jurisdictions. Unfortunately, discussions among governments on this growing tension easily spiral into ideological infighting about the application of sovereignty. Early November however, 1600 participants from 100 countries gathered for the 7th annual Internet Governance Forum (IGF)... Several sessions showed that it is possible to address the relations between the Internet and sovereignty in a responsible manner. more

WCIT Off to a Flying Start

This is the report on Day One of the World Conference on International Telecommunications (WCIT), directly from Dubai. The conference started off in a positive way that did not reflect the sometimes bitter debate that has taken place in the press in recent months - although, of course, there was a great deal of discussion about the comments made in the press over that period. All comments were welcomed, as an indication of the importance of the internet and telecommunications; nevertheless the Secretary-General, Hamadoun Touré, was clearly critical of some of the deliberate misinformation that has been spread before the conference. more

gTLD Contention Set Auctions: Private Auction Alternatives

Open ascending price or English auctions are the oldest and most common auction form. Derived from the Latin words augere and auctus, "Auction" means to 'augment' via 'increasing'. While there are many theoretical types of auctions (ascending, descending, sealed-bid, second-highest bid, etc.) in this post we will focus on the two main types of auctions provided by Right of the Dot and Cramton. more

The Future of Home Networking: A Problem Statement

I'm a network engineer, and like many engineers I often gravitate to the big projects; large networks with problems of scale and complexity in my case. However, I also consider myself a student of Occam's razor and often quote Antoine de Saint-Exupéry: "perfection is reached not when there is nothing left to add, but when there is nothing left to take away." In this spirit of "less is more" I have recently become intrigued by the problems appearing in home networking. more

Topics

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

Threat Intelligence

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days