Featured Blogs

Latest

OTT Threat to Telco’s Middleware Opportunities

I recently participated in two Comverse events, and once again the message was driven home to me about the enormous opportunities that lie ahead of the industry in the field of new telecoms applications. The middleware and cloud applications that are now appearing at the edge of the network will of course, be further developed once high-speed broadband becomes available, but already they are having an enormous impact on the telecoms market. The new user experiences that can be obtainable through these applications will enrich fast broadband networks beyond recognition. What we now have is, on the one hand, the Over-The-Top (OTT) applications that have conquered the world... more

LTE and Spectrum Stupidity

Mobile operators are counting on Long Term Evolution (LTE) technology to handle surging demand for mobile data access. But LTE developers made some poor choices, cutting spectral efficiency and thus driving up operator costs. LTE was envisioned as an all IP system, but the RF allocations follow the voice-centric approach of earlier generations. While LTE standards allow for either Frequency Division Duplexing (FDD) or Time Division Duplexing (TDD), all initial LTE equipment uses FDD. FDD requires two separate blocks of spectrum... more

Are Portable Email Addresses Possible?

News reports say that the Israeli government is close to passing a law that requires portable e-mail addresses, similar to portable phone numbers. Number portability has been a success, making it much easier to switch from one provider to another, and address portability might ease switching among ISPs. But e-mail is not phone calls. Is it even possible? more

Authorities Take Down the Mariposa Botnet

There are a number of sources talking about the takedown of the Mariposa botnet... Spanish authorities, working with researchers from Panda Labs, Defence Intelligence and a couple of other educational institutions, took down the Mariposa botnet (Mariposa is the Spanish word for "butterfly"). The Mariposa botnet is an absolutely enormous with around 12 million (!) nodes doing its bidding. It was involved in things like credit card phishing and identity fraud. more

ICANN Nairobi Kicks Off This Weekend - So What Is Cooking? .XXX , New TLDs and More

The ICANN meeting in Nairobi starts officially next Monday. However, as is normally the case, by the time Monday rolls around people will already have been working since Saturday morning (if not earlier). All ICANN meetings seem to be surrounded by some bit of controversy and excitement, but the Nairobi meeting is possibly more dramatic than many others. The last attempt to hold a meeting in Nairobi failed, with ICANN opting to hold the meeting near LA's airport, LAX, instead. more

Regional Internet Registries Conducting Internet Community Consultation on ITU IPv6 CIR Proposal

The Regional Internet Registries are conducting a Internet community consultation process regarding the recent ITU IPv6 Country Internet Registry (CIR) proposal. In collaboration with the other Regional Internet Registries, APNIC hosted a special session at APNIC 29 / APRICOT 2010 to give the global Internet Community an opportunity to discuss the issues and ramifications of the alternative model proposed by the ITU. For those interested in the outcome of the recent face-to-face session, a raw transcript and session summary statement are available... more

More Available Wireless Spectrum and Higher Market Entry Barriers

The tremendous demand for, and profitability of mobile telephony supports legislative and regulatory efforts to refarm spectrum with an eye toward reallocating as much as possible for wireless telephony and data services. But there is a downside that no one seems to acknowledge. In light of past FCC practice and the behavior of incumbent wireless carriers I expect two anticompetitive outcomes to occur with the onset of any more spectrum. more

The Internet is Interconnection

There's a scene in the Steven Soderbergh movie, Traffic, where the widow of a drug dealer brings a doll to the Columbian drug kingpin. "The doll is stuffed with cocaine. Big deal, we've been doing that for years," he says dismissively. "No," she answers, "the doll is cocaine." The whole toy is a heat-treated, compression-molded block of cocaine, undetectable to sniffing dogs. The drug lord becomes very interested. The Internet is like that doll... more

Creditor Can Execute Against Domain Name Where Registry is Located: Office Depot v. Zuccarini

The Ninth Circuit affirmed the district court's ruling in Office Depot v. Zuccarini, agreeing that a creditor may levy against a domain name in the jurisdiction where the domain name registry is located. The decision is significant for two reasons. First, it affirms (or reaffirms) that domain names are property subject to the claims of creditors... more

Web Application Delivery: The Challenge of Managing Thousands of Web Applications in the Cloud

Cloud Computing is a hot topic. Some say it is already here, most agree that it will be much bigger in the coming years. It is pushed forward by the economic benefits of virtualization and consolidation. Take a heterogeneous data center, full of many kinds of servers, running a myriad of applications and consolidate it into a uniform farm of virtual machines, where each application is services by one or more VMs and you have a cloud, what is called a private cloud. more

IPv6 and the 5 Billionth Customer

The POPClock tells us that there are 6,807,230,170 of us on this planet when I looked it up at 22:26 UTC (EST+5) Feb 26, 2010. In the meantime we are about to connect the 5 billionth cell phone user this year according to ITU Secretary-General Dr. Hamadoun Toure.
 more

Taking Permission

Permission is always a hot topic in email marketing. Permission is key! the experts tell us. Get permission to send email! the ISPs tell us. Marketers have responded by setting up processes to "get" permission from recipients before adding them to mailing lists. They point to their privacy polices and signup forms and say "Look! the recipient gave us permission." In many cases, though, the permission isn't given to the sender, permission is taken from the recipient. more

Nominet Passes Governance Test With Flying Colours

The dot-uk registry Nominet has passed a crucial governance test with flying colours, voting yes on eight Board resolutions with more than 93 percent member support... The vote was a crucial test for both Nominet's Board and members: trust and confidence in the Board had been damaged by an acrimonious internal battle, which had subsequently led to the UK government threatening to end self-regulation of the UK's registry operations. more

Closing in on the Google Hackers

Joseph Menn has an article on CNN.com wherein the crux of the story is that US experts are closing in on the hackers that broke into Google last month. It is believed by some that the Chinese government sponsored these hackers. China, naturally, denied involvement. My own take is that tools today are sophisticated enough such that you don't necessarily need state sponsorship in order to launch a cyber attack. more

Switching on the Light: Expression of Interest for New TLDs

They say late converts are the most passionate believers. Until now I haven't supported the Expression of Interest (EOI) for new TLDs, the proposed mechanism to measure the number and type of likely applications. Not because it won't work (I think it'll work fine) but because I didn't think it was necessary. I've changed my mind. Here's why. more

Topics

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days