Featured Blogs

Latest

Will Microsoft Be Able to Make the Jump?

In marketing terminology this is called 'jumping the S-curve'. Microsoft, however, has left its jump rather late. One could argue that we are well and truly at the top of the S at the moment, so it will be interesting to see if Microsoft can still take the leap towards the enormous growth that is currently taking place in the group of digital media companies such as Google and Apple. more

European ACTA Document Leaks With New Details on Mexico Talks and Future Meetings

A brief report from the European Commission authored by Pedro Velasco Martins (an EU negotiator) on the most recent round of ACTA negotiations in Guadalajara, Mexico has leaked, providing new information on the substance of the talks, how countries are addressing the transparency concerns, and plans for future negotiations. more

Domain Registry Locking Program: It Is There for a Reason, So Why Not Use It?

At the beginning of last year, MarkMonitor participated in VeriSign's beta program to test server-level protections which were designed to mitigate the potential for unintended domain name changes, deletions and transfers. When VeriSign finally released their Registry Locking Program to all registrars, I expected to see the owners of highly trafficked sites flocking to this new offering. However, after a review of the top 300 most highly trafficked sites, I was shocked to uncover that less than 10% of these valuable domains were protected using these newly available security measures. more

Measuring Typosquatting Perpetrators and Funders

For more than a decade, aggressive website registrants have been engaged in 'typosquatting' -- the intentional registration of misspellings of popular website addresses. Uses for the diverted traffic have evolved over time, ranging from hosting sexually-explicit content to phishing. Several countermeasures have been implemented, including developing policies for resolving disputes. Despite these efforts, typosquatting remains rife. But just how prevalent is typosquatting today, and why is it so pervasive? (Co-authored by Tyler Moore and Benjamin Edelman) more

IMP Continuing Despite Industry Backlash

Back in November 2008 a colleague of mine, Neil Watson (Head of Operations at Entanet International Ltd), published an article on Entanet's opinion blog about the government's proposed plans to centrally store records of all electronic communications throughout the UK. The Interception Modernisation Programme (IMP) will be the largest surveillance system ever created in the UK and calls for a 'live tap' to be placed on every electronic communication in Britain including telephone calls, emails and visited websites. more

Google Puts Its Weight Behind FttH

The blogs are flying all around the world -- some seem to get it right but most do not. My analysis of Google's announcement to become involved in building FttH networks is actually the same as the one as I made when that company announced its plans to build wireless city networks, and when it announced its intention to invest in submarine cable networks. more

The Canoe Tipping Point

Google has successfully created a nationwide (worldwide) fine-grained, targeted ad market by using queries to its search engine. The cable industry would like to be able to use its cable and broadband subscriber data to create a nationwide, fine-grained, targeted ad market. This race has substantial implications for the future of online video -- and online activity generally. more

Registration of Generic Names: Advocate General’s Opinion Before the Court of Justice of the EU

One of the most debated questions at the time of the opening of the .eu Top-Level Domain (TLD) was whether or not it was possible to register names on the basis of prior rights on signs which include special characters, such as an ampersand. The Advocate General of the Court of Justice of European Union has just published his opinion (4 years later...) more

Absolutely No Wireless Spectrum Shortage in 2010

Sure the iPhone has problems, but John Stankey of AT&T thinks restoring a $2B capex cut will fix them. It may take a little more money than that, but Glen Campbell of Merrill Lynch has confirmed he's on track. In a 50 page report that's one of the best I've read in years, Merrill destroyed the common belief that wireless has a significant spectrum shortage. more

Project Title: Adopt-an-Haitian-Internet-Technician-or-Facility

I circulated this, and its precursors, notes about the necessity for diesel to keep the generators powering Boutilliers Hill NAP on the Hatian-Dominican Republic Border from failing, earlier this month on the North American Operators Group (NANOG) mailing list. Efforts by former ICANN people, in public service and in the private sector, were critical to bringing the continuity of the surviving infrastructure to the attention of the White House, the Department of State, and the Southern Command. more

A Dangerous Buzz, and Opt-In Isn’t Just for Email

Google is great at generating buzz, and they've done it again with their new social vitality tool, appropriately named Google Buzz. Buzz takes all of your Gmail contacts (and presumably other connections from elsewhere within the Googleplex), and makes them all your "friends" by default; it then shares your activity from Google Reader, YouTube, and other tools with all of them, and vice versa... more

Why ICANN Nairobi Security Concerns May Be a Blessing in Disguise

There is a questionmark over ICANN's upcoming meeting in Nairobi, Kenya again. This time it has more bite than the usual xenophobia: the COO has published a US Department of State report that lists the conference centre itself as a specific threat from a Somalian insurgency group, Al-Shabaab. In response, a number of Internet companies have already announced they are pulling their people. more

DNS Resolvers and DNSSEC: Roll Over and Die?

Security is great when all the green lights are shining brightly and everything validates as intended, but what happens when you encounter failure? In this work we examine the behaviour of the DNS when security, in the form of DNSSEC is added, and we look at what happens when things do not happen as intended. What triggered this examination was a sudden increase in the traffic generated by secondary servers for the in-addr.arpa reverse zones in December 2009. more

How to Manage Internet Abundance

The Internet has two billion global users, and the developing world is just hitting its growth phase. Mobile data traffic is doubling every year, and soon all four billion mobile phones will access the Net. In 2008, according to a new UC-San Diego study, Americans consumed over 3,600 exabytes of information, or an average of 34 gigabytes per person per day. Microsoft researchers argue in a new book, "The Fourth Paradigm," that an "exaflood" of real-world and experimental data is changing the very nature of science itself. We need completely new strategies, they write, to "capture, curate, and analyze" these unimaginably large waves of information. more

IPv6 and the Swedish Public Sector

No one can have failed to notice that the last IPv4 address will soon be allocated. We have lived with a shortage of addresses for 15 years, but when the last address is allocated, the shortage will become acute, instead of just a pain, as it is today... In The Hitchhiker's Guide to the Galaxy, Douglas Adams describes the least expensive and most effective method for making something invisible. You simply decide that it is Someone Else's Problem or SEP, if you abbreviate. This is an approach that is frighteningly similar to the Swedish public sector's view of the address shortage on the Internet. "It is not our problem -- if we ignore it, it will probably go away." more

Topics

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

Threat Intelligence

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days