Featured Blogs

Latest

The Dubai Debacle: Does It Matter?

The second phase of the Dubai Debacle is now well underway. The first of the ITU-T bodies, the World Telecommunication Standardization Assembly (WTSA) finished its ten day meeting. The second body, the World Conference on International Communication (WCIT) completed its second day. WTSA shapes the ITU T organization and detailed agenda, while the WCIT gives it a treaty-based construct with regulatory mandates. WTSAs occur every four years; WCITs every twenty-five - although there is a proposal to hold them more frequently. more

Sovereignty and the Geography of Cyberspace

The cross-border nature of the Internet challenges an international system based on separate national jurisdictions. Unfortunately, discussions among governments on this growing tension easily spiral into ideological infighting about the application of sovereignty. Early November however, 1600 participants from 100 countries gathered for the 7th annual Internet Governance Forum (IGF)... Several sessions showed that it is possible to address the relations between the Internet and sovereignty in a responsible manner. more

WCIT Off to a Flying Start

This is the report on Day One of the World Conference on International Telecommunications (WCIT), directly from Dubai. The conference started off in a positive way that did not reflect the sometimes bitter debate that has taken place in the press in recent months - although, of course, there was a great deal of discussion about the comments made in the press over that period. All comments were welcomed, as an indication of the importance of the internet and telecommunications; nevertheless the Secretary-General, Hamadoun Touré, was clearly critical of some of the deliberate misinformation that has been spread before the conference. more

gTLD Contention Set Auctions: Private Auction Alternatives

Open ascending price or English auctions are the oldest and most common auction form. Derived from the Latin words augere and auctus, "Auction" means to 'augment' via 'increasing'. While there are many theoretical types of auctions (ascending, descending, sealed-bid, second-highest bid, etc.) in this post we will focus on the two main types of auctions provided by Right of the Dot and Cramton. more

The Future of Home Networking: A Problem Statement

I'm a network engineer, and like many engineers I often gravitate to the big projects; large networks with problems of scale and complexity in my case. However, I also consider myself a student of Occam's razor and often quote Antoine de Saint-Exupéry: "perfection is reached not when there is nothing left to add, but when there is nothing left to take away." In this spirit of "less is more" I have recently become intrigued by the problems appearing in home networking. more

Report on the Eve of WCIT

Hello, from Dubai where the WCIT (World Conference on International Telecommunications) - under the auspices of the United Nations agency, the International Telecommunications Union (ITU) - is set to get underway... There is a great deal of jockeying for position taking place, and it is interesting to walk through the corridors and listen to what is going on. more

Superstorm Sandy and the Global Internet

The Internet has managed to collect its fair share of mythology, and one of the more persistent myths is that from its genesis in a cold war US think tank in the 1960's the Internet was designed with remarkable ability to "route around damage." Whether the story of this cold war think tank is true or not, the adoption of a stateless forwarding architecture, coupled with a dynamic routing system, does allow the network to "self-heal" under certain circumstances. Can we see this self-healing in today's network? more

Raspberries! Botnet Spam Just Got a Whole Lot More Dangerous

Many have heard of botnets, but for those that aren't certain what they are: Botnets are armies of hacked zombie computers that have malware on them, and send spam email at the command of operators anywhere in the world. They can also be told to deploy denial of service attacks, by all hitting the homepage of a given company, or attacking the DNS server or a service or country. more

Verisign Dodges a Bullet, Gets to Keep .COM Pricing

According to a filing with the SEC, the Department of Commerce renewed the .COM agreement for six more years. The renewal was held up until the last minute (the old agreement expired yesterday) due to antitrust concerns, specifically about pricing. The main change in the new agreement is that Verisign is no longer allowed to increase the price above the existing $7.85... more

Top 10 Biggest Domain Stories of 2012 and Predictions for 2013

So my prediction from last year that "ICANN will open the new gTLD application period without any glitches" could not have been more wrong. And yes - I actually used the word 'glitches'... Regardless of my crystal-ball gazing skills, it's been another incredibly eventful year, and below are the Top 10 Domain Stories from 2012. more

New gTLDs, Last-Minute End-Arounds, and Fundamental Fairness

The ICANN community is ever closer to realization of its goal to bring long-overdue consumer choice and competition to Internet naming. Regrettably, but perhaps predictably, reliance on the Final Applicant Guidebook (AGB) is being challenged at the last minute by recent proposals from the Business and Intellectual Property Constituencies (BC/IPC), which demand "improvements" to the already extensive trademark protections that will be part of the new gTLD landscape. more

Syria Disconnects From The Internet

This morning brought word that all Internet connections into Syria had been severed. Internet monitoring firm Renesys was among the first to report the news in a blog post that they have continued to update. That news was subsequently confirmed by other sites and services... Multiple reports indicate that all Internet, cell phone and landline connections to all or most of the country have been severed. more

Making Multi-Language Mail Work (Part 2)

In the previous instalment we looked at the software changes needed for mail servers to handle internationalized mail, generally abbreviated as EAI. When a message arrives, whether ASCII or EAI, mail servers generally drop it into a mailbox and let the user pick it up. The usual ways for mail programs to pick up mail are POP3 and IMAP4. more

IPv6: A 2012 Report Card

The Gogonet Live conference in San Jose witnessed outstanding presentations by several federal administrations including Veteran Affairs, NASA and SPAWAR, sharing their experience and progress towards IPv6 adoption. Furthermore, the NIST compliance report leaves no agency any place to hide. The report card is there for everybody to see. In spite of regular jabs and criticisms, the US Federal Government has done a remarkable job. more

Why the Republican Policy Brief on Copyright Should Have Been Withdrawn

On November 16, the Republican Study Committee, a caucus of conservative Republican members of the U.S. House of Representatives, inadvertently released a policy brief entitled "Three Myths About Copyright Law" which was quickly withdrawn. Of course, as a work of the U.S. government, this document does not itself enjoy copyright protection, so it is widely available on the internet through groups like The Internet Archive project. more

Topics

Domain Names

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days