Featured Blogs

Latest

Open Systems Lead to ‘Economies of Scope’

The 'economies of scope' is an appealing concept implying that if we share knowledge in an open way we can create new, healthy economies that do not just depend on 'scale'. As we have seen, over the last decade in particular, some of the companies that are trying to achieve exponential growth can endanger the economy and society in general - the global financial crisis surrounding the large financial institutions, the scandals around News Corp, the political lobbying (bullying) by the super rich and the destruction of the environment by some developers. more

Leveraging DNS for Subscriber Loyalty

There has been a lot of talk about how the DNS can provide network-based security, and how DNS is in the best position to detect malware traffic before it does any harm. But what does this mean for end users? How does it make their online lives easier and more secure? DNS servers that are aware of sites that host malware, perform phishing activities (harvesting bank details, for instance) and other nefarious misbehaviors, can prevent end users from ever going to those sites. more

UN Moves on Internet Governance: Latest Dispatch

Some unsettling plans declared themselves at the International Telecommunication Union (ITU) this week as countries prepared for the up-coming treaty-making jamboree called the World Conference on International Telecommunications (WCIT). This community will now have to decide what it does about them. ... It was significant to the CircleID community that the ITU's top dog -- the Secretary General - appeared in person before the assembled countries with a reassurance: the broad and unusual WCIT treaty negotiation, though it may treat many issues, would not take up Internet governance. more

Sprint Fights for Mobile Market Relevance: First Quarter Earnings Positive

Sprint's vision along with determined action says everything. They are fighting for mobile market relevance, thumbing their noses at detractors, moving beyond being relegated to a distant 3rd ranked carrier in a fast growing market. It's acquisition of the iPhone and agreement to spend $15.5 Billion over four years for the privilege has investors squawking bankruptcy sooner rather than later. First quarter earnings reveal that Dan Hesse's decision to purchase iPhones back in October 2011 is paying off in solid contracts. more

Internet Governance: Coin of the New Realm

The Aspen Institute released the IDEA Common Statement and Principles as a do no harm Hippocratic Oath for Internet governance. The Aspen report describes the present moment as an inflection point for "the most robust medium of information exchange in history". Reed Hundt outlined the risks associated with Internet governance changes favored by China and a group of developing nations through the ITU. more

Africa Infrastructure Growth Supporting ccTLDs and New gTLD Growth

This month, France Telecom's Lower Indian Ocean Network 2 "LION2" fiber optic cable has been put in service, bringing the total number of cables in East Africa to four. In South Africa it is expecting West Africa Cable System to go live next month. This huge growth in fiber optic cables connecting Africa means that bandwidth costs can go further down but there are many questions for internet service providers, regulators and policy makers... more

New TLDs: Disruptive Marketing 21st Century Style

Traditionally, top-level domains (TLDs) have been almost exclusively marketed by registries through their registrar channel. In a never-ending cycle of driving and sustaining sales, registries often resort to discounting and "promotional pricing." The competition for prime shelf space for a TLD is fierce, with sales and distribution largely controlled by the channel... In this chaotic and cluttered channel, it's not surprising that TLDs have traditionally been less than successful in defining their brand and delivering a unique value story for their product. more

Getting On Board With DNSSEC - A Personal Recount

I first became familiar with DNSSEC around 2002 when it was a feature of the Bind9 server, which I was using to setup a new authoritative DNS platform for customers of the ISP I was working for. I looked at it briefly, decided it was too complex and not worth investigating. A couple of years later a domain of a customer got poisoned in another ISPs network. And while the DNS service we provided was working properly, the customers impression was we hadn't protected them. more

ICANN - Time to Act!

At the start of the TAS outage, I said ICANN had a great opportunity to get its crisis management right by communicating properly. Now, nearly two weeks after the application window was supposed to close, ICANN has clearly done just that... But clearly, communication isn't the only parameter in crisis management. At some point, you also need to act. more

A Quick Primer on Internet Peering and Settlements

The business world today features many complex global service activities which involve multiple interconnected service providers. Customers normally expect to execute a single paid transaction with one service provider, but many service providers may assist in the delivery of the service. These contributory service providers seek compensation for their efforts from the initial provider. However, within a system of interdependent providers a service provider may undertake both roles of primary and contributory provider, depending on the context of each individual customer transaction. more

Driving DNSSEC: The Need for Integration of All the Functions Needed

DNSSEC continues to gain momentum as network operators and domain owners watch and learn from early adopters. The learning process is made easier by efforts such as the ongoing work conducted by researchers at Sandia labs to methodically identify and categorize the kinds of problems that are occurring. more

Counter-eCrime Operations Summit (APWG) In Prague Next Week

The sixth annual Counter-eCrime Operations Summit (CeCOS VI) will engage questions of operational challenges and the development of common resources for the first responders and forensic professionals who protect consumers and enterprises from the ecrime threat every day. This year's meeting will focus on the shifting nature of cybercrime and the attendant challenges of managing that dynamic threatscape. more

Matching Apps to Network Access - A Postage and Packaging Problem

A number of conversations have recently converged on a single problem: how to match applications to network access. Let's unpeel this issue... When I was Chief Analyst at Telco 2.0, we proposed there was a significant untapped market opportunity for network operators to bundle together access with content, applications or services. The revenue opportunity is to charge the providers of those services for delivering fit-for-purpose data at bulk wholesale prices. This is the "postage problem"... more

What Ever Happened to the Closed Local Internet Registries?

Since the establishment of the RIPE NCC, 5,000 Local Internet Registries (LIRs) have closed. We wanted to find out why. Many of them were probably victims of the burst of the dotcom bubble. But how many? And which countries were mostly affected? How many closures were the results of mergers? We've got answers. more

DNS Resolution, Browsers & Hope For The Future

DNS is not something that most people think about when using the Internet. Neither should they have to: the DNS is just part of the infrastructure in the same way that IP addresses are. The only time a user ought to notice the DNS is when it breaks (and it should never break). If that's true, then we ought to expect any Internet client - including web browsers - to use the very same infrastructure as everything else and for the DNS resolution mechanisms to be the ones offered by the operating system. What makes browsers different? more

Topics

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Threat Intelligence

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days