Featured Blogs

Latest

Measuring Typosquatting Perpetrators and Funders

For more than a decade, aggressive website registrants have been engaged in 'typosquatting' -- the intentional registration of misspellings of popular website addresses. Uses for the diverted traffic have evolved over time, ranging from hosting sexually-explicit content to phishing. Several countermeasures have been implemented, including developing policies for resolving disputes. Despite these efforts, typosquatting remains rife. But just how prevalent is typosquatting today, and why is it so pervasive? (Co-authored by Tyler Moore and Benjamin Edelman) more

IMP Continuing Despite Industry Backlash

Back in November 2008 a colleague of mine, Neil Watson (Head of Operations at Entanet International Ltd), published an article on Entanet's opinion blog about the government's proposed plans to centrally store records of all electronic communications throughout the UK. The Interception Modernisation Programme (IMP) will be the largest surveillance system ever created in the UK and calls for a 'live tap' to be placed on every electronic communication in Britain including telephone calls, emails and visited websites. more

Google Puts Its Weight Behind FttH

The blogs are flying all around the world -- some seem to get it right but most do not. My analysis of Google's announcement to become involved in building FttH networks is actually the same as the one as I made when that company announced its plans to build wireless city networks, and when it announced its intention to invest in submarine cable networks. more

The Canoe Tipping Point

Google has successfully created a nationwide (worldwide) fine-grained, targeted ad market by using queries to its search engine. The cable industry would like to be able to use its cable and broadband subscriber data to create a nationwide, fine-grained, targeted ad market. This race has substantial implications for the future of online video -- and online activity generally. more

Registration of Generic Names: Advocate General’s Opinion Before the Court of Justice of the EU

One of the most debated questions at the time of the opening of the .eu Top-Level Domain (TLD) was whether or not it was possible to register names on the basis of prior rights on signs which include special characters, such as an ampersand. The Advocate General of the Court of Justice of European Union has just published his opinion (4 years later...) more

Absolutely No Wireless Spectrum Shortage in 2010

Sure the iPhone has problems, but John Stankey of AT&T thinks restoring a $2B capex cut will fix them. It may take a little more money than that, but Glen Campbell of Merrill Lynch has confirmed he's on track. In a 50 page report that's one of the best I've read in years, Merrill destroyed the common belief that wireless has a significant spectrum shortage. more

Project Title: Adopt-an-Haitian-Internet-Technician-or-Facility

I circulated this, and its precursors, notes about the necessity for diesel to keep the generators powering Boutilliers Hill NAP on the Hatian-Dominican Republic Border from failing, earlier this month on the North American Operators Group (NANOG) mailing list. Efforts by former ICANN people, in public service and in the private sector, were critical to bringing the continuity of the surviving infrastructure to the attention of the White House, the Department of State, and the Southern Command. more

A Dangerous Buzz, and Opt-In Isn’t Just for Email

Google is great at generating buzz, and they've done it again with their new social vitality tool, appropriately named Google Buzz. Buzz takes all of your Gmail contacts (and presumably other connections from elsewhere within the Googleplex), and makes them all your "friends" by default; it then shares your activity from Google Reader, YouTube, and other tools with all of them, and vice versa... more

Why ICANN Nairobi Security Concerns May Be a Blessing in Disguise

There is a questionmark over ICANN's upcoming meeting in Nairobi, Kenya again. This time it has more bite than the usual xenophobia: the COO has published a US Department of State report that lists the conference centre itself as a specific threat from a Somalian insurgency group, Al-Shabaab. In response, a number of Internet companies have already announced they are pulling their people. more

DNS Resolvers and DNSSEC: Roll Over and Die?

Security is great when all the green lights are shining brightly and everything validates as intended, but what happens when you encounter failure? In this work we examine the behaviour of the DNS when security, in the form of DNSSEC is added, and we look at what happens when things do not happen as intended. What triggered this examination was a sudden increase in the traffic generated by secondary servers for the in-addr.arpa reverse zones in December 2009. more

How to Manage Internet Abundance

The Internet has two billion global users, and the developing world is just hitting its growth phase. Mobile data traffic is doubling every year, and soon all four billion mobile phones will access the Net. In 2008, according to a new UC-San Diego study, Americans consumed over 3,600 exabytes of information, or an average of 34 gigabytes per person per day. Microsoft researchers argue in a new book, "The Fourth Paradigm," that an "exaflood" of real-world and experimental data is changing the very nature of science itself. We need completely new strategies, they write, to "capture, curate, and analyze" these unimaginably large waves of information. more

IPv6 and the Swedish Public Sector

No one can have failed to notice that the last IPv4 address will soon be allocated. We have lived with a shortage of addresses for 15 years, but when the last address is allocated, the shortage will become acute, instead of just a pain, as it is today... In The Hitchhiker's Guide to the Galaxy, Douglas Adams describes the least expensive and most effective method for making something invisible. You simply decide that it is Someone Else's Problem or SEP, if you abbreviate. This is an approach that is frighteningly similar to the Swedish public sector's view of the address shortage on the Internet. "It is not our problem -- if we ignore it, it will probably go away." more

“Internet Drivers License” - A Short History Lesson

The press, the blogosphere, CircleID - everybody has been discussing Craig Mundie's comment on the need for an "Internet Driver's License". Most of the reaction has been from privacy advocates fearing that this is simply another way to kill anonymity on the Internet. Oh well... that's the usual set of reactions. Now... the fun part is, a driver's license also shows that you have the competence to drive... more

ICANN and Its Responsibilities to the Global Public Interest

In 1998, the United States government might have taken a different path in asserting its control over the technical administration of the DNS. It might have asserted full U.S. governmental control, or it might have turned over the functions to an international body such as the International Telecommunications Union. Instead, it created a "private-public partnership", incorporated as a California "nonprofit public benefit corporation", with a charter giving the company a dual mission of quasi-governmental functions combined with responsibility for operational stability of the Internet. more

FCC’s Genachowski Promises He’s Not Out to Regulate Net, New Media

We learned from The Wall Street Journal yesterday that "Federal Communications Commission Chairman Julius Genachowski gets a little peeved when people suggests that he wants to regulate the Internet." He told a group of Journal reporters and editors today that: "I don't see any circumstances where we'd take steps to regulate the Internet itself," and "I've been clear repeatedly that we're not going to regulate the Internet." We're thankful to hear Chairman Julius Genachowski to make that promise. We'll certainly hold him to it. But you will pardon us if we remain skeptical... more

Topics

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days