Featured Blogs

Latest

Psst - Interested in Some Lightly-Used IP Addresses?

The Internet Service Provider (ISP) community is carefully watching the impending depletion of the unassigned IPv4 address pool. Most estimates place the depletion of the central pool of unassigned IPv4 addresses by mid-2011. After that, each Regional Internet Registry (RIR) will continue to satisfy requests for additional IPv4 space for a limited time (depending on the rate of incoming requests and the amount of address space on hand in the RIR at the time of central pool depletion). more

IPv6: The Four Horsemen of the IPcalypse

War, famine, pestilence and death. They fought for the last IPv4 addresses, hoarded and sold them at outrageous prices, traffic and commerce came slowly to a halt... Pestilence invaded the internet... Bandits roam the lands. A retired general told recently that the internet looks like the North German plains, easy to invade. Cyberwar and Cybersecurity are becoming mainstream subjects and have increasing Government attention. more

Three Things Registrars Must Do to Enhance Security

If the rise of phishing has taught us anything, it's that on the Internet, if a digital asset has value, there's somebody out there who wants to steal it. Whether it's a bank account password, a credit card number, a PayPal login, or even a magic sword in an online game, there's a fraudster somewhere trying to misappropriate it for his or her own nefarious purposes. Domain names have always been a target for such criminals. more

New gTLDs and Their Hidden Costs: Part 2

In my last post I discussed some questions that remain about ICANN's generic Top-level Domain (gTLD) budget. Today I discuss the rights protections mechanisms as they currently appear. An economic study commissioned ICANN to analyze the new gTLD process recently concluded that "the biggest likely costs" of approving new gTLDs are "consumer confusion and trademark protection." more

Net Neutrality: A Net-Head View

Net neutrality is a complex issue with some strongly opposed views that at times sound more like religion than sensible argument, so this article is an attempt to provide some sense for those still not completely sure what it is all about. Be warned though, that this article is not an unbiased appraisal of the arguments, it is written from the perspective of a confirmed net-head. more

New gTLDs and Their Hidden Costs: Part 1

New generic Top-Level Domains (gTLDs) appear to be headed for introduction next year, finally. That's a good thing for many ICANN constituents who have been waiting for them to become available. Important questions persist about how new gTLDs will affect ICANN and its constituents, however, despite a lot of effort to resolve concerns. Pressing those questions should not be taken as criticism of the basic wisdom of making new gTLDs available to many constituents under many circumstances. But too much is at stake not to get it right. more

Broadband Initiatives: Impact Will Depend on Wireless and Fixed Strategies

Broadband; we want it, and we all depend on it; but where you live can impact access and adoption of the best that service providers have to offer. The FCC is looking to change both geographic and demographic limitations now plaguing the U.S. in the global race for broadband economic supremacy. Can a combination of a fixed and wireless-mobile strategy improve broadband economic viability by increasing access, adoption, and affordability across the broadband spectrum? more

About Those “Mission Critical” Bits

News that Google and Verizon are negotiating "better than best efforts" Internet routing probably comes across as a betrayal of sorts to network neutrality advocates. Bear in mind that Information Service Providers ("ISPs") do not file public contracts known as tariffs and have the freedom to negotiate deals with individual clients. On the other hand ISPs, regardless of their FCC regulatory classification, cannot engage in unfair trade practices that achieve anticompetitive goals such a tilting the competitive playing field in favor of a corporate affiliate, or special third party. more

Out of Office Alerts are So Out of Here

Do Out of Office alerts these days serve a purpose anymore? They seem to work well a decade ago when you were really out of the office and your computer sat under your desk and you couldn't check email till you got to it. Today, we as an industry and as individuals now have laptops, iPads, Smartphones, Wifi, WiMAX, etc. keeping us 100% of the time on the Internet at one time or another. And you know we all at one point throughout our days whether or not on vacation or after 5 PM check email as part of our everyday lives. more

A Look at IPv6 Allocations Since 1999

In the previous graph and article published here two weeks ago, we showed that many ISPs in the RIPE NCC service region (Europe, the Middle East and parts of Central Asia) have not yet obtained IPv6 addresses from the RIPE NCC. Our latest graph demonstrates just how quickly this is changing. more

DNSSEC Taking Center Stage at 2010 Black Hat

On July 28th DNSSEC took center stage at the 2010 Black Hat Conference in Las Vegas. Two years ago, at the same conference, Dan Kaminsky unveiled the infamous DNS bug that many believe became a major catalyst for DNSSEC implementation. To kick things off, Jeff Moss -- founder of Black Hat -- in his opening speech called out the fact that "we have not solved any fundamental problems" and noted that the technical community must catch up. more

Using Facebook for Verisimilitude? For real?

I recently became aware of the new pay-by-mobile phone service Venmo.com. "Pay friends with your phone, skip the ATM, Settle up on meals, rent, bills and drinks" ... Venmo are using Facebook connect as a way of verifying user identities, at least that is what they claim. more

DNS RPZ, Malicious Domains… Bring Your Own Policy. Dress Casual.

Paul observed that most new domain names are malicious. Are they? Since the "dawn of tasting", some 30 million domain names have been created for the purposes of interposition on existing name to resource mappings. That is a third of the .COM historical growth, and mostly in the last five years. ... It is difficult not to conclude that interposition on persistent, public referents is without malice, and that the malicious parties are advertisers seeking to transform public referents into private property, as promotional devices... more

Even if Do-Not-Track Were a Good Idea, Could It Ever Work?

In a recent article, I read about increasingly intrusive tracking of online users, which has lead to a proposal at the FTC, "FTC Chairman Jon Leibowitz said the system would be similar to the Do-Not-Call registry that enables consumers to shield their phone numbers from telemarketers." Maybe I'm dense, but even if this weren't a fundamentally bad idea for policy reasons, I don't see how it could work. more

Bandwidth: Why Fast is Important in a Global Economy

Bandwidth is the basic foundation for Internet traffic as a connector to everything important in our lives. Whether it is basic bandwidth for connecting to family and friends, or a super fast highway for global reach and competitiveness in the business world, bandwidth constitutes the speed at which we connect as a global presence within the expanding sphere of Internet communication. ... To understand why bandwidth is important to all Americans, including personal and business uses, we must understand the different types Internet traffic. more

Topics

Cybersecurity

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days