Featured Blogs

Latest

The Design of the Domain Name System, Part I

Over the past 30 years the Domain Name System has become an integral part of the operation of the Internet. Due to its ubiquity and good performance, many new applications over the years have used the DNS to publish information. But as the DNS and its applications have grown farther from its original use in publishing information about Internet hosts, questions have arisen about what applications are appropriate for publication in the DNS, and how one should design an application to work well with the DNS. more

Automated Theft of Intellectual Property

A few days ago I wrote about a piece of my intellectual property, an article I wrote and posted on DaileyMuse.com, being stolen, plagiarized, and posted on another web site under a different authors name. I hadn't been looking for my work elsewhere, I was simply browsing the access logs and visiting other websites that stood out. As a result of finding my work posted elsewhere without my permission, I contacted the owner of the website by email and provided 24 hours to remove the content before I pursued legal action. more

War of Words - the gTLD Weaponry

Why would the Association of National Advertisers (ANA), representing 400 member organizations and their 10,000 brands that spend $250 billion annually, be so wrong about ICANN's generic top-level domain (gTLD) program? They're complaining as if new gTLDs are being sold overnight in dark alleys with a no questions asked policy in exchange of a large suitcase filled with newly printed currency. This is definitely not the case, so what did they miss? more

Google Is NOT Moving Into the Mobile Phone Business

It might appear paradoxical for Google to buy a company for $12 billion and to then not move into that business, but I believe this is the strategy supporting that company's purchase of Motorola Mobility. As many have already pointed out, the value of Motorola resides in its patents. For more than a decade this company has been a fading star... more

The Need for Major Structural Changes

In keeping with the discussion that I have been involved in over the last decade, 'structural changes' should be today's key phrase - not just for the telecoms sector but for every sector in our economies. It has been clear for a long time that structural change is well overdue. It doesn't really matter which sector you pick, you will see that some of these reform debates go back at least a decade - and often longer -- in healthcare, education, environment, energy, finance and banking and media. more

Prediction Methods for Crime

There's a new sheriff in town and he's riding the horse of "predictive policing". Back in July the Santa Cruz Police Department began deploying police officers to places where crime is likely to occur in the future -- making use of new predictive modeling programs that are designed to provide daily forecasts of crime hotspots -- thereby allowing the Department to preempt more serious crimes before they occurred. In essence, this is another physical-world application of machine learning and clustering technologies -- applied to preempting a criminal problem. In the cyber-world we've been applying these techniques for a number of years with great success. more

A New Quality gTLD Can Compete with .COM

If you choose a new generic top-level domain (gTLD), will it be able to compete with .com? A recent academic paper indicates that the answer is yes if your new gTLD is of outstanding quality. "How Quality Drives the Rise and Fall of High-Tech Products" by professors Tellus, Yin, and Niraj in the Sloan Management Review provides evidence that new products can beat out established rivals... more

ICANN Chief Announces Departure Via Twitter

ICANN's CEO and President, Rod Beckstrom, has announced that he will be stepping down in July of next year. The announcement came via Twitter of all places, with a press release, presumably with more details, due sometime soon... With the launch of the new Top-Level Domain (TLD) program scheduled to officially launch early in 2012 maybe Beckstrom feels that his job "is done", or maybe there's another motive behind his departure. more

Will Googlerola Be Able to Fight Data Caps?

"Is Google Turning Into a Mobile Phone Company?" asks the headline in Andrew Ross Sorkin's New York Times story. Wrong question, IMHO. But is Google doing the deal at least partly to give it leverage over wireless providers? I think so. The biggest threat to the growth of Smart Phones and tablets and other Google businesses like YouTube is the imposition of data caps and metered pricing by wireless providers like at&t and Verizon Wireless. more

Is FttH Future-Proof Infrastructure?

Telecoms engineers from all of the major telecoms services and equipment companies around the world agree that FttH is the only future-proof telecommunications technology. So who should we trust - the technology experts or politicians with different agendas? If there had been a division of opinion among these experts it would have been necessary to investigate it; but if they are all in agreement it is safe to follow their advice. more

Spam Continues to Drop

The chart in this post shows the amount of inbound mail that we see, both spam and non-spam, over the past three and a half years. You can see in the above that the amount of good mail that we see has continued to increase over time. This is because of an increased customer base, not because the total amount of good mail worldwide has gone up... However, the amount of spam has plummeted from 23,000 in mid 2010 to 5000 now, a drop of over 75%. The contrast couldn't be starker -- spammers are not spamming as much anymore. It almost looks like the battle against spam is almost over. What's still left to do? more

Anonymous, LulzSec, and the Option of Internet Security

As hacking groups such as Anonymous and LulzSec continue to make headlines, many of us in the Information Security field can only sit back and shake our heads. The large number of successful system breaches, web site defacements, and the publication of confidential data is not at all surprising, and for the most part was only a matter of time. more

Authentication Methods Used in the RIPE Database

Objects in the RIPE Database can only be modified by those authorised to do so. For instance, an object representing a certain range of IP addresses assigned to an organisation by the RIPE NCC or a Local Internet Registry (LIR) can be modified by the organisation holding that address space. Each database object contains one or more attributes referencing the maintainer(s) of that object. In a maintainer (MNTNER) object, credentials are listed for those who are authorised to modify any object referencing that MNTNER object. more

Defense in Depth for DNSSEC Applications

At the time of this writing DNSSEC mostly does not work. This is not a bad thing - in fact it's expected... There is a significant last-mover advantage DNSSEC deployment (or IPv6 deployment) and that can't be helped. It's all in a good cause though - everybody knows we need this stuff and some farsighted contributors put a lot of money and other resources into DNSSEC years or decades ago to ensure that when the time comes the world will have a migration path. Sadly, this leaves current investors and application designers and developers wondering whether there's a market yet. more

FttH Is Not About High-Speed Internet Access - It Is About the Internet of Things

The future of our communications infrastructure will to a very large extent be based on the Internet of Things (IoT). What this means is that hundreds of millions of devices will be connected to the national broadband networks (NBN), gathering massive amounts of information and providing feedback in real time. In any single country, the electricity grid alone will have tens of millions of sensors and devices connected to deliver the energy efficiencies that we all so desperately need. more

Topics

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Threat Intelligence

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days