Featured Blogs

Latest

The Regulatory Arbitrage Lovefest

My day job, which includes finishing a book, updating a broadband law treatise, and trying to engage undergraduate students in the challenges of telecommunication and Internet policy, prevents me from weighing in each time I see yet another outrageous claim on such issues as network neutrality, broadband market penetration, and the competitiveness of U.S. telecoms markets. But I have to make time for this one. more

Reducing Cybersquatting, Phishing

Solutions to cybersquatting and phishing must target brand customers instead of the trademark infringers, who are in effect liars. This post outlines why online-based traditional solutions fail, and it offers solutions to two types of lying (cybersquatting and phishing). more

IPv6, Stimulus, Digital Recovery and Job Creation

When our G20 leaders met in Pittsburgh last week, stimulus and recovery were foremost on their minds. Needless to dwell on the ravages of sub-prime lending and outsized bonuses rewarding dismal performance. It is good to see that, in today's global economy, Information Technology is recognized as a major driver of economic growth and quality of life. ...The timing of the Cisco announcement linking IPv6 and smart grids is certainly no coincidence. There is a money trail to be followed and IPv6 will ride the smart grid coattails. more

Post JPA: Tempered Happiness

The Affirmation gladdens me. The Affirmation worries me. The Affirmation makes me wonder what is next. I am of course referring to the Affirmation of Commitments between the United States Department of Commerce (DoC) and ICANN. In the respect that the US is loosening its grip on ICANN a little, this is a good thing. Symbolically, of course it is gigantic... more

Ambient Connectivity: An Introduction

"Ambient Connectivity" is the ability to assume connectivity anywhere and anytime. Ambient Connectivity is the future of the Internet once we've removed the barriers we associate with today's telecom and extend the reach beyond the narrow confines of "broadband". The nuanced definition of Ambient Connectivity is that we can view connectivity as infrastructure but we need to take responsibility if we find ourselves disconnected. more

DOC to ICANN: Time to End Double-Weighted Voting of Registries and Registrars

The US Department of Commerce and ICANN announced today an Affirmation of Commitments. One of the important elements of that document was in section 4, namely that "ICANN and DOC recognize that there is a group of participants that engage in ICANN's processes to a greater extent than Internet users generally." more

ICANN’s September Surprise

"Surprise, surprise, surprise!" is how Gomer Pyle would react to the news that the US government has allowed the JPA to expire, thus completing the transition of DNS management to ICANN. Plenty of skeptics doubted the US would let it happen, but today really is ICANN's independence day. more

Verizon: Voice is Dying

Ivan Seidenberg, Verizon CEO, saying "voice is dying" is a defining moment in telecom history. He didn't use those words, but his comments at Goldman Sachs are clear "we have to pivot and make a shift from the voice business to the data business and eventually to the video business. ... we must really position ourselves to be an extremely potent video-centric asset." more

Registry-Registrar Cross Ownership: Framing the Issues

There has been much said and written recently about the issue of registry-registrar cross ownership with regard to New Top Level Domains ("New TLDs"). It is clear that there appears to be a fair amount of confusion about the issue and the positions espoused by various parties. To assist the ICANN community in understanding the issue -- the points of agreement and debate -- I offer the following overview on behalf of Network Solutions and Central Registry Solutions... more

Why Distinguish Between Defensive and Offensive Domain Names?

Offensive domain-name registrations require strategic corporate decisions. Second, they require different strategic and tactical remedies when third parties register desired names. Thus, different organizational approaches are necessary to manage domain name risks and rewards. The essay identifies the strategic differences and remedies for the two types of domain names, and outlines the implications for internal work-flow organizational structures. more

Why Does the Telco Industry Need to Change?

Over the last years the telecommunications market has been regulated on the basis of operating telephony services. Internet access has been added to this in recent years but it is still essentially linked to telephone line regulations. While major societal changes have been happening, since the 1980s at least, very few policy changes were made around the telecoms industry to enable it to play a key role in these changes. Key telecoms reforms in the mid- and late 1990s still refused to take a more multi-media -- or perhaps what we now call a trans-sector -- approach towards the industry. more

Is the Transition to IPv6 a “Market Failure?”

At the outset I should say that here I would like to restrict my view to the transition from the IPv4 Internet to the IPv6 Internet, and, in particular, to examine the topic of the appropriate market structure that lies behind the dual stack transition strategy, and the manner in which the Internet can transition from the universal use of IPv4 as the underlying datagram protocol to the universal use of IPv6. more

In Congress, A Confusing Argument Against New TLDs

In a recent post to CircleID entitled New Domains and ICANN Accountability, Steve DelBianco paints himself as "frustrated" that ICANN didn't take a different path toward new Top-Level Domains (TLDs). Mr. DelBianco was one of four witnesses at a hearing before the House Judiciary Committee's Subcommittee on Courts and Competition on September 23, 2009. He is a creative advocate for his clients, an engaging speaker, and a skillful writer, and he produced a synopsis of the hearing which sounded convincing -- until I tried to make sense of it. more

An Authenticated Internet

Discussions around DNSSEC are so often focused on the root, the attacks, what DNSSEC does and doesn't do and so on -- and these are all valid and important points. But there is far less attention focused on the opportunities that will surface from an authenticated internet. ...DNSSEC is becoming more of a reality now -- rather than a technical discussion which has been stuck in the mud for 15 years. We can now begin to think about new opportunities to build from a secure DNS, opportunities that build on the certainty that you have arrived at the correct website. Today, you can't be sure. more

China’s Censorship Arms Race Escalates

Last week the China Digital Times reported that a photo (shown in the post) has been making the rounds in Chinese blogs and chatrooms. It is an image of a "computer science float" for Thursday's National Day parade, onto which somebody has photoshopped a screenshot of the Internet Explorer error message familiar to anybody who has ever tried to access a blocked website in China: "This page cannot be displayed." more

Topics

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Threat Intelligence

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days