Featured Blogs

Latest

2012: The Year of the New gTLD Program and the Year to Support ICANN - Part II

As we go into 2012, I am encouraged that there are many, including top officials and leaders in Washington DC, who believe in ICANN's leadership of the multi-stakeholder model, and that the organization should be allowed to successfully midwife the new gTLD program. The Honorable Senator John 'Jay' Rockefeller for example was reported in the ICANN Blog as giving his full support: "I think we have to get used to dot-hotels. I think we have to get used to dot-auto." more

2012: The Year of the New gTLD Program and the Year to Support ICANN - Part I

The ICANN new gTLD program began today, 12th January 2012, with the application round now open and this important activity will make 2012 a very memorable year. It is expected that a minimum of 500 fresh applications for new generic Top Level Domains will be received by ICANN through the online TLD Applications System (TAS) by April 12 when the round closes, for processing and evaluation afterwards. This promises to be a hectic and engaging period for new gTLD applicants, and also for ICANN. more

Refusing REFUSED

The U.S. Congress' road to Stopping Online Piracy (SOPA) and PROTECT IP (PIPA) has had some twists and turns due to technical constraints imposed by the basic design of the Internet's Domain Name System (DNS). PIPA's (and SOPA's) provisions regarding advertising and payment networks appear to be well grounded in the law enforcement tradition called following the money, but other provisions having to do with regulating American Internet Service Providers (ISPs) so as to block DNS resolution for pirate or infringing web sites have been shown to be ineffectual, impractical, and sometimes unintelligible. more

New TLD Application Window Opens Tomorrow - What Does It Mean? (Here are Answers to Some Basic FAQs)

Tomorrow, January 12th 2012 ICANN will open the application window for new TLDs. This post includes answers to some of the based frequently asked questions. If you have any other questions/queries, or if something is unclear please let me know via the comment at the end of the post. more

Server-Side Mobile Web Detection Used by 82% of Alexa Top 100 Sites

About 82% of the Alexa 100 top sites use some form of server-side mobile device detection to serve content on their main website entry point. As you descend from the top 10 to the top 25 and top 100 sites the percentage of sites using server-side detection falls from 100% to 96% to 82%. This is an interesting fact given that all the recent discussion in the blogosphere is of responsive design using client-side techniques such as media queries. more

Carriers Skirting Rules on Network Neutrality vs. Free’s Innovative Network

From will they ever learn department, we are once again seeing attempts by incumbent carriers to skirt rules around network neutrality. They tried and failed with UBB. Now they are at it again with "speed boost" technologies. The two technologies at question are Verizon's "Turbo" service and Roger's "SpeedBoost". more

Trademarks Tango in Cyber Ballrooms

The global trademark laws have served the business community well during the last century. But is it possible that with the advent of ICANN gTLD, a new layer of speed and protection would complement the trademark holders to further establish their name identity presence and visibility in the complex marketplace? Although the trademark laws have served the business community very well during the last century, now with the advent of ICANN gTLD platform, it appears that it will provide an additional layer of speedy protection and increase the name identity visibility resulting in market domination via name identity. more

Types of Attack

A lot of pixels have been spilled in the last few years about "advanced persistent threats" (APT); if nothing else, any high-end company that has been penetrated wants to blame the attack on an APT. But what is an APT, other than (as best I can tell) an apparent codename for China? Do they exist? After thinking about it for a while, I came up with the following representation... more

Will We See IPv6-Enabled Consumer Devices at CES This Week?

What kind of IPv6 support will we see in consumer devices at the massive Consumer Electronics Show (CES) happening in Las Vegas this week? The show is already underway and much of the tech media is already writing in breathless prose about the latest tablets, notebooks and zillions of other consumer devices making their debut at CES. While the bright-shiny-object-chasing side of me definitely notices those articles, my own interest is on a deeper and far more technical level. more

Secret Doors in Phones and Computers

An article appeared in Computer World that alleges: in exchange for the Indian market presence" mobile device manufacturers, including RIM, Nokia, and Apple (collectively defined in the document as RINOA) have agreed to provide backdoor access on their devices. Could it be true that Nokia, RIM and Apple opened up to Government interception? more

IPv6 Riding the LTE Coattails

In June 2009 we mused in these columns about Long Term Evolution standing for Short Term Evolution as wireless networks started to drown in a data deluge. It is January 2012 and we keep our heads above the mobile data deluge, even if barely, thanks to a gathering avalanche of LTE networks. Even the wildest prognoses proved conservative as the GSMA was betting on a more 'managed' progression... more

How to Make DNS Green

The Dutch Internet registry SIDN has launched a unique program in partnership with CleanBits to identify what proportion of .nl domain names were hosted on a green or CO2-neutral basis. The results show a strong trend towards the 'greening' of the .nl internet zone. Nearly 30 per cent of .nl names were found to have green hosts. more

Cloud Computing’s Concealed Complexity

James Urquhart claims Cloud is complex - deal with it, adding that "If you are looking to cloud computing to simplify your IT environment, I'm afraid I have bad news for you" and citing his earlier CNET post drawing analogies to a recent flash crash. Cloud computing systems are complex, in the same way that nuclear power stations are complex - they also have catastrophic failure modes... more

The Case of Mobile Users’ Bandwidth Consumption and Causality

It started with a report in the New York Times, citing a study from Arieso, saying that "Top 1% of Mobile Users Consume Half of World's Bandwidth". Arieso said that part of the reason for the increase in download volumes may be Apple's Siri voice feature on the iPhone 4S which allows consumers to dictate to the phone and enter more text and data... Other news outlets picked up the story and lost all perspective. more

ICANN’s Final Preparations for New gTLDs

I think it's fair to say that ICANN is in a state of near meltdown at the moment. With less than a week to go before the new gTLD program's first application window is opened, on Thursday January 12, 2012, the amount of work being done is mind-bending. The ICANN Board held a special meeting on January 5 to determine the program's state of readiness ahead of the launch. more

Topics

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days