Featured Blogs

Latest

A Simpler Approach to an Email Deliverability Metric

The term Email Deliverability is used to describe how well a mail flow can reach its intended recipients. This has become a cornerstone concept when discussing quality metrics in the email industry and as such, it is important to understand how to measure it. Email Deliverability is considered to be affected by a mythical metric, the reputation of the sender, which is a measure of that sender behavior over time -- and the reactions of the recipients to his messages. more

What’s Next for gTLD Applicants?

Applicants will have some considerable work to do over the next several months as the Evaluation Panels consider application comments and pose clarifying questions, the Governmental Advisory Committee (GAC) concludes its review for Early Warnings, and Objections are filed. In addition, Applicants have an opportunity to help ICANN with their timelines by settling string contention as soon as practical. more

The Proposed “Cloud Computing Act of 2012,” and How Internet Regulation Can Go Awry

Sen. Amy Klobuchar has introduced a new bill, the "Cloud Computing Act of 2012" (S.3569), that purports to "improve the enforcement of criminal and civil law with respect to cloud computing." Given its introduction so close to the election, it's doubtful this bill will go anywhere. Still, it provides an excellent case study of how even well-meaning legislators can botch Internet regulation. more

A Perspective on Verisign’s Patent Application on Domain Name Transfers

As the battle rages over threats to the Internet architecture, a recent publication over the Patent Application for Domain Name Transfers by Verisign is disturbing for those who advocate an open and free Internet. The Application is based on an immediate and direct threat towards an open and free Internet. Just in case people are tempted to think that this was a prank given that they filed it on the 1 April 2011, searches at the United States Patents and Trademark Office (USPTO) reveals that this is a legitimate application . more

The Pros and Cons of BYOD (Bring Your Own Device)

At the Virus Bulletin conference this past September in Dallas, Righard Zwienenberg from ESET gave a presentation entitled BYOD. BYOD stands for Bring Your Own Device, but he reframed the acronym to "Bring Your Own Destruction", that is, he alluded to the security implications of bringing your own device. BYOD is the latest trend sweeping business and schools. more

The ‘Domain Rights Dozen’ - ICA’s RPM Revision Review Principles

As the fall of 2012 begins the implementation of rights protection mechanisms (RPMs) for new gTLDs is reaching a critical stage... Given the half year interval between the upcoming Toronto ICANN meeting and the following Beijing meeting in April 2013, it is highly desirable, and perhaps essential, that community discussion in Toronto result in a clear consensus on how RPM implementation should proceed if new gTLDs are to launch without further delay and if potential registrants are to perceive them as acceptable platforms for speech and commerce. more

The Internet and the Legitimacy of Governments

In two recent debate events I participated in, on iFreedom and privacy in the online world, mistrust of government and government's intentions and motivations on and towards the Internet were abundantly present with more than just a few people in the audiences. The emotions were not new to me, no, it was the rationality that surprised and sometimes almost shocked me. Why? Well, should these sentiments get the support of the majority of people, it would undermine all legitimacy of a government to govern. Let's try and take a closer look. more

Multi-Stakeholderism Revisited: ICANN, We, Can Do Better

ICANN, the private, non-profit, US-based organization is a key player in the global Internet governance ecosystem because it coordinates the Internet's unique identifiers and domain name system. In addition, ICANN develops policies that govern the DNS and addressing system of the Internet. For this reason, and the very model on which the organization's work is based, many countries take participation in ICANN very seriously... To hear ICANN tell it, their work is based on a "bottom-up, consensus-driven, multi-stakeholder model." more

ICANN Africa Strategy: A New Approach to Africa - Welcome, But Not Inclusive

There is a new attempt to refocus on Africa. A recent announcement titled "A New Approach to Africa" was greeted with excitement but deliberations that transpired in a Global mailing list have projected a whole new dimension and caused a certain amount of dissatisfaction in some quarters. Africa had a good opportunity in the current ICANN new gTLD programme to submit applications for at least 17 gTLDs. more

A Copycat Canadian Privacy Suit Against Gmail

In July, several people filed attempted class action suits against Google, on the peculiar theory that Gmail was spying on its own users' mail. One of the suits was in Federal court, the other two in California state court, but the complaints were nearly identical so we assume that they're coordinated.Now we have a similar suit filed in provincial court in British Columbia, Canada. more

Trust - The Key to Cloud Computing Growth in Europe

The European Commission is optimistic about the future of cloud computing in the region and predicts it will not only save on data storage costs, but create new jobs and boost GDP. The European Union's cloud computing strategy was finally unveiled last week and is expected to boost GDP by around AUD$200 million (about 1 per cent) and create almost four million jobs in just under a decade. This is the first concerted effort by the EU to increase the popularity of cloud computing among businesses. more

Measuring the Cost of Cybercrime

Last week at Virus Bulletin in 2012, Tyler Moore of Southern Methodist University (SMU) gave a talk entitled "Measuring the cost of cyber crime." It was a study done in collaboration with multiple individuals in multiple countries. The study sought to answer this question - How much does cyber crime cost? Up until this point, nobody really knew. more

The Evolution of the ITU’s Views on Internet Governance (2006-2012)

Someone was talking the other day about the ITU and what they think about the issue of Internet Governance. I know what the ITU Secretariat wrote in a paper some years ago (Bulgaria was one of the governments heavily criticizing the errors and flaws in the ITU paper), but also decided it might be interesting to show how this question has evolved in the words of the ITU Secretary-General Hamadoun Toure, by finding out how his positions on that issue, and on the role of the ITU have changed through the years. more

Dot UK, A No-Brainer!

British registry Nominet has launched a consultation on whether .UK should be opened up at the top level under a scheme called direct.uk. Currently, registrations are only allowed at the second level, .CO.UK being Britain's main Internet suffix. The question really isn't should this be done. The question is: why has it taken so long to get here? more

A Short History of ITU Network Security Activity

Since the inception of ITU precursors in 1850, its various bodies have treated the subject of telecommunication network security as both an obligation of signatories to the treaty instruments as well as an ongoing collaborative activity. However, what it actually did in those activities was constrained by its jurisdiction and participant competency -- which encompassed international public telecommunication services provided primarily by designated government agency service providers known as PTTs. more

Topics

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

Threat Intelligence

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days