Featured Blogs

Latest

A Confession About The ICANN WHOIS Data Reminder Policy

With all the recent attention to WHOIS, it's time for a confession: I'm somewhat guilty for the infamous WHOIS Data Reminder Policy. With hindsight, it's a bad policy, and it needs to die. The year was 2002. ICANN's DNSO (soon to be renamed as the GNSO) had a WHOIS Task Force, and was trying to extract policy choices from an ill-conceived and worse-executed survey of assorted self-selected stakeholders. more

US Telcos Withdrawing from DSL and Telephony Markets - A Case of Lobbying Power and Poor Regulation

During the last few months the US's main DSL providers AT&T and Verizon have begun retracting from the DSL and landline market in many rural and less commercially viable areas while concentrating on their wireless LTE ambitions. DSL and voice telephony provide relatively low returns, which can be whittled away through network maintenance costs, while LTE promises to deliver proportionately higher profits, based on exorbitant charges by data volume.  more

J.D. Falk Award

This morning M3AAWG announced the creation of the J.D. Falk award to recognize and honor people like J.D. who work to make the Internet safer for all users... J.D. was a legend in the abuse prevention world when I first started learning about spam and abuse prevention back in the late 90's. more

Silly Bing

Bing is Microsoft's newish search engine, whose name I am reliably informed stands for Bing Is Not Google. A couple of months ago, as an experiment, I put up a one page link farm at wild.web.sp.am. As should be apparent after about three seconds of clicking on the links there, each page has links to 12 other pages, with the page's host name made of three names, like http://aaron.louise.celia.web.sp.am. The pages are generated by a small perl script and a database of a thousand first names. more

Regulation as Innovation

The European Telecommunications Network Operators' Association (ETNO) has issued a press release in which its Executive Board Chair and the ITU's Secretary-General "reiterated the importance of the WCIT to lay the framework that will facilitate the further growth of an innovative, and sustainable future for the telecom and information and communication technology sector (including the Internet)". more

Google’s Secret Strategy With the Kansas City Fiber Project

I have long been perplexed at how Google plans to make a profit with their Kansas City Fiber project. Originally the project was touted as an altruistic move by Google to really understand the underlying costs of deploying fiber in a large municipality. But as anyone who has been in the trenches can tell you, it is not the technology that determines the cost of a fiber deployment, but the tyranny of the take-up. more

How Failure To Maintain IPv6 Is Hindering Law Enforcement

Recently, the FBI, DEA and even the Canadian Mounted Police have suggested that the switch to IPv6 is making it more difficult to track criminals online, those who would traffic in things such as drugs or child pornography, in addition to hackers, botnets, kidnappers and terrorists. Under IPv4, it wasn't very difficult to find offenders online via their IP addresses. The American Registry of Internet Numbers (ARIN) would hand out the address and internet providers would log them into the public WHOIS database. more

IP Addresses and Privacy Sensitive Data - A Level Playing Field Needed

Reading Peter Olthoorn's book on Google (a link is found here), I ran into a passage on IP addresses. Where Google states that it does not see an IP address as privacy sensitive. An IP address could be used by more than one person, it claims. The Article 29 Working Party, the EU privacy commissioners, states that it is privacy sensitive as a unique identifier of a private person. It got me wondering whether it is this simple. Here is a blog post meant to give some food for thought and debate. I invite you to think about the question 'how private is an IP address'? more

ICANN Shows Safe Decisions Aren’t Always the Right Decisions

When ICANN selected Deloitte and IBM to provide technical database administration services for a key part of its new gTLD program, it became quickly clear that the choice was not made on whose proposals scored highest, but rather it was based on which partner presented the least perceived business risk but at a much higher than necessary cost. I know this because I wrote a response to the original RFP and as a result am pretty familiar with what the original specification required. more

Carriage vs. Content

Does anyone remember the Internet before Google? And no, using Google to ask about the pre-Google Internet is not going to work all that well! For those of you who can recall the Internet of around 2000, do you also recall what debates were raging at the time? Let me give you a hand in answering that question. One big debate at the time was all about the relationship between the carriage service operators and the content providers, and, as usual, it was all about money. The debate was about who owed who money, and how much. Ten years later and it seems that nothing much has changed. more

Some of the World’s Largest Investors Are Investing in FttH

While some governments are still struggling with the concept of FttH - some of the world's largest investors such as the Dutch superannuation funds (ABP, PGGM and Pensioenfonds Vervoer (PfV)), have been investing in FttH in the Netherlands since 2010. This is happening in a country with a broadband cable network that covers 95% of the country and nationwide access to ADSL2+ networks. more

Update on Assigning 32-bit ASNs

As mentioned in Assigning 32-bit ASNs published one year ago, 16-bit Autonomous System Numbers (ASNs) are becoming a scarce resource just like 32-bit IP addresses. In 2007, the Internet Engineering Task Force (IETF) addressed this scarcity by developing a new format: 32-bit AS Numbers (RFC 4893), which increased the supply of ASNs to four billion. more

Cyber Criminals Infiltrate Even Small Businesses

I read an interesting article in the Wall Street Journal today entitled Cyber Criminals Sniff out Vulnerable Firms. It's a story of a small business owner in New York whose company was broken into by cyber criminals and stole $1.2 million from its bank accounts, although the owner was able to later recover about $800,000 of that. The moral of the story is that small businesses feel like they are not a major target for online thefts like these. more

The GAC Strikes Back

Last week in Prague, the GAC (Government Advisory Committee) relentlessly hammered ICANN over a range of issues relating to the new gTLD program. And while their criticisms were legitimate, one has to wonder to what extent governments were punishing ICANN for past offenses. At the same time, the ICANN board and management seem to have finally - much belatedly - figured out how important it is to maintain a constructive and positive relationship with governments. more

ICANN’s New TLDs: Of Course There Will Be an Auction - Part 2

A few days ago I opined that if several people want the same Top-Level Domain (TLD) and can't come to terms otherwise, they should arrange a private auction. It would be an odd sort of auction, since the buyers and sellers are the same people, so unlike normal auctions, the goal is not to maximize the selling price. How might it work? more

Topics

Domain Names

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days