Featured Blogs

Latest

The Trademark Clearinghouse: Secure, Reliable, Usable - Pick Any Two

Earlier this week, technical and legal experts from ICANN, Deloitte and IBM met in Brussels with their counterparts from registrars and registry service providers representing as much as 90% of prospective gTLD registries, to discuss the technical implementation of the Trademark Clearinghouse, the database of rights holder information that will support the mandatory rights holder protection mechanisms for new gTLDs. more

Internet Challenges Need Win-Win Solutions

The current internet versus telcos debate that is going to be played out at the WCIT conference in Dubai later this year is still following the old confrontational pattern. The telco industry, for all the right reasons, started off as a monopolistic one. With the limited technology and knowledge of that time this system has been able to deliver telephone networks to all the countries in the world, and the industry can be proud of that achievement... However technology and knowledge have progressed... more

Problems With Defining Jurisdiction on the Internet

The term "jurisdiction" has various definitions in law, but for our purposes here we can say it is the power of some legal body to exercise its authority over a person or subject matter or territory. In the Internet today, it is territory that gives rise to many major issues. As in real estate, what matters in jurisdiction is "location, location, location". When the Internet and trademark rights began to intersect, it quickly became apparent that traditional concepts of the jurisdiction of courts and legislatures would be seriously strained by situations where a registrant in one country could use a registrar in a second country to register a domain name in yet a third country. more

Metrics of Major Standards Bodies

In a recent CircleID posting related to the ITU-T, the demise of that body over the years and the underlying causes were described. Among other questions, it raises the question of where has the industry technical collaborative activity gone. The short answer is just about everywhere else. This was exemplified by a recently compiled spreadsheet of some 200 different cloud forums prepared by the ITU-T's own cloud coordination group. more

The Mailbox That Saved DNSSEC

A very long time ago, back in the ancient time of year 2006, the registry for .se domains, also called .SE, opened up for signing .se zones with DNSSEC. In those days .SE did not have a registrar/registry model and my own company Interlan was then an agent for .SE. One day I suddenly got a mail from .SE regarding secure DNS -- DNSSEC. ...I almost immediately saw the benefits that such a solution could give to a better and more secure Internet. more

Why Passwords Have Never Been Weaker and Crackers Have Never Been Stronger

The past few weeks, I've been on this security kick particularly when it comes to encryption. I'm developing my own app in my spare time. So I'm trying a whole bunch of things, no doubt making plenty of mistakes in the process. Luckily, the data I am protecting is only quasi-valuable so I can afford to take a hit due to my own conscious incompetence. Anyhow, I ran across this article on Ars Technica yesterday entitled "Why Passwords have never been weaker - and crackers have never been stronger." It's a long article and it will take you a while to read it, but here is my summary. more

Do Agencies Already Have the Authority to Issue Critical Infrastructure Protection Regulations?

The President and Congress are deliberating how best to ensure appropriate cybersecurity protection for private sector critical infrastructure. Legislative action and Executive Order are both under consideration. It is possible, however, that the White House Office of Management and Budget (OMB) already has sufficient statutory authority to enact new cybersecurity regulations through the normal notice-and-comment rulemaking process. more

It’s Time to Put a Bow on the URS: Our Work is Almost Done

For years our community has struggled with the rules of the URS - the Uniform Rapid Suspension - aimed at taking down the "worst of the worst" domain name registrations in a manner faster and cheaper than its predecessor, the Uniform Domain Name Dispute Resolution Policy - the UDRP. On June 27, in Prague, a diverse group met to discuss the fate of the URS. To my surprise, it was a rare "kumbaya" moment, and that makes it worthy of comment. more

Privatizing the ITU-T: Back to the Future

The awkwardly named International Telecommunication Union Telecommunication Standardization Sector (ITU-T) by any measure is a highly unusual body. It is the only global intergovernmental organization where Nation States produce detailed technical standards for telecommunications. Even more amazing is that it produces these standards for a field that is so dynamic and globally competitive as telecommunications. What is not well known is that the ITU-T was once a private standards body... more

4 Items for Applicants to Consider in Planning, Even As You Wait

With the effective deregulation of the domain name industry through the imminent launch of up to 1,000 new gTLD's, the competitive landscape is going to get a whole lot hotter over the next 24 months. We will likely see some financially and commercially successful ventures. It is likely that we will see many unsuccessful ones as well. The gap between success and failure will be slim. more

The Federal Cybersecurity Regulation Already in Place

While Congress and the White House deliberate possible actions on FISMA reform and increased oversight of critical infrastructure, relatively little attention is being given to the government-wide cybersecurity regulation already in place, the Data Quality Act (DQA). Unlike FISMA, which primarily governs the government's internal cybersecurity processes, and contemplated legislation and/or Executive Order(s), which would likely also include a focus on critical infrastructure protection, the DQA contains a unique mandate. more

The ITRs and Cybersecurity

Cybersecurity is a top-of-mind issue with calls for individual vigilance, national legislation, and international treaties to address gaps that are exploited causing significant harm and financial loss on a daily basis. The vast majority of these calls are well-intentioned though even among the best-intentioned, some are poorly directed. Such is the case with all of the proposals that would introduce security into the International Telecommunication Regulations (ITRs) of the International Telecommunication Union (ITU). more

Similarity of gTLD Applications: Required Reading for Evaluators

ICANN's evaluators should look at data published on "gTLD application similarity analysis". This sort of data helps dramatically reduce time and expense for the evaluation of new gTLD applications while increasing quality. The principle is simple: find the similarities between the 1930 applications. It is a proof-of-concept project by Arnoldo Mueller-Molina, a young Costa Rican researcher with a doctorate in computational analytics. more

Tracking Outages

The idea of tracking data outages spawned from an early discussion on the outages forum including feedback from an outages survey about having a status page for (un)planned outages as a central resource. The purpose of such effort is to have a wider focus that one could view as opposed to having to check dozens of provider status pages. There were many ideas put forth but nothing really panned out and things kinda fell on the back burner. more

IPv6: The Summer It Finally Happened

A decade old guessing game finally came to an end during these 2012 summer months. America was supposed to be hopelessly behind while Europe had not much to show after a decade of spending lavishly EU money on IPv6 related projects. China and Japan were thought to be light years ahead of everybody else. But in the end, it was the might of the American Content Industry that tipped the scales. more

Topics

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days