Featured Blogs

Latest

Are Phishing and Malware Separate Threats?

Phishing is when bad guys try to impersonate a trusted organization, so they can steal your credentials. Typically they'll send you a fake e-mail that appears to be from a bank, with a link to a fake website that also looks like the bank. Malware offers another more insidious way to steal your credentials, by running unwanted code on your computer... I like VeriSign's characterization of this kind of malware as an insecure endpoint, the PC which is the endpoint of the conversation with the bank isn't actually under the control of the person who's using it. more

Routing Redundancy: How Much Is Enough?

Internet connectivity is a good thing. Many of us depend on it for everything from our livelihoods to our entertainment. However, the Internet is very fragile and even the The New York Times is worried about it. But they're primarily concerned with overloads that can occur when everyone on the planet does the same thing at roughly the same time, such as surfing for news about Michael Jackson. Unfortunately, we will never avoid all such scenarios. Physical systems are designed around average and typical peak loads, not around extremely high loads associated with very unlikely events. Who would pay for that? more

Examininng Value in New ICANN TLDs on Search and Navigation, Companies, Domain Registries

I outline the implications for value presented by ICANN's proposed introduction of new Top-Level Domains (TLDs) on user search and navigation, companies, and registries... For the new tools to be value adding they should facilitate navigation, reduce search cost, or provide actionable branding information through marketing. Unfortunately, the new TLDs bring in a mixed bag of value-adding and -destroying tools. more

Downloading is Not Enough… Probably

Peer to peer download services are still popular with music-loving kids, it seems. The second annual survey of young people's music consumption by pressure group UK Music found that three-fifths of the 1,808 18-24 year olds who took part said they used p2p services, and four-fifths of those did so at least once a week. This is almost the same as last year's result, and would seem to indicate that the efforts by the music industry to offer a range of licensed alternatives to Limewire and other p2p services have failed to have any real impact. more

Are the FCC Workshops Fair?

The FCC has run three days of workshops on the National Broadband Plan now, for the purpose of bringing a diverse set of perspectives on broadband technology and deployment issues to the attention of FCC staff. You can see the workshop agendas here. The collection of speakers is indeed very diverse. As you would expect, the session on eGov featured a number of government people and a larger collection of folks from the non-profit sector, all but one of whom has a distinctly left-of-center orientation. Grass-roots devolution arguments have a leftish and populist flavor, so who better to make the argument than people from left-of-center think tanks? more

IPv6, Phone Numbers and Analogies

My local area code (814) is running out of phone numbers. When discussing IPv6 with non-technical folks, I frequently use the hypothetical scenario of running out of phone numbers as an analogy for IPv4 address depletion. The conversation usually goes like this: "Imagine if we were running out of phone numbers. One way of solving that problem would be to make them bigger. Instead of ten digits, what if we made then thirty digits? If we did that, how many other things would we have to change? Some mundane things like business cards, letterhead, and phone books. But also more substantial things..." more

Comment on the Kleiman/Komaitis Proposal on Multiple IP Clearinghouses for the New gTLD Process

I recently learned about a meeting that took place between ICANN staff and Noncommercial Users Constituency (NCUC) members Kathy Kleiman and Konstantinos Komaitis regarding the Implementation Recommendations Team (IRT) recommendations for the protection of intellectual property rights in new generic Top-Level Domains (gTLDs). My comment relates to the White Paper published by Ms. Kleiman and Mr. Komaitis with respect to the notion of having multiple Regional Trademark clearinghouses (TMCs). For the reasons stated in this comment, the KK Proposal fails a number of the benchmarking checklists used by the IRT in evaluating proposals. more

DotEco Bids Heat Up - Catfight Anyone?

The new Top-Level Domain (TLD) process is occupying a lot of people in the domain name industry at present. While some people are obviously very much against the entire concept of new TLDs, there are plenty of people and organisations who support the project. But what happens when you have more than one organisation vying for the same namespace? ...Seemingly the competition between two rival bids for .eco (doteco) has been getting more than a little dirty in the past few weeks. more

Google Voice Dispute Highlights an Opportunity for Mobile Network Operators

The recent row between Google, Apple and AT&T concerning the removal of Google Voice from the Apple iPhone store highlights the friction existing between network operators and so-called over the top (OTT) application providers. Most observers believe that AT&T initiated the blockade because Google Voice (which offers free or highly discounted calling rates) is a direct threat to AT&Ts call revenue (Google Voice users need only pay AT&T for access to the Internet). more

Twitter, DDoS and the Motivations Behind the Attack

As we all know by now, last week, on Thursday, August 7, Twitter was hit with a denial-of-service attack that took it down for several hours. Other social networking sites like Facebook, LiveJournal, Youtube and Blogger were also hit. They managed to repel the attack although Facebook was not quite as successful as the other larger players. The theory floating about at the moment is that this was a politically oriented play designed to target one guy: a blogger. We are nearing the 1-year anniversary of a the Russian/Georgian 2008 war. There is a pro-Georgian blogger by the username of "Cyxymu" who had accounts on all of these services. more

Realizing There’s More to Life Than .COM, Europe and Asia Already Do

It's getting so hard to find a decent .COM domain name that a big weed patch of businesses has grown up hawking really terrible names for enormous prices -- and they're finding buyers. They're catering to people who are just trying to find something -- anything! -- that will work for their new web site. The problem is especially acute for those who are trying to start a business. more

Analysis of the US Broadband Stimulus Package

In January 2009 the US Congress began considering the American Recovery and Reinvestment Bill 2009 aimed at kick-starting an economy in deep recession. The package, passed into law on 17 February, comprised $787 billion of mainly tax cuts, unemployment benefits and spending in education, health care, infrastructure and energy. Included in the fiscal stimulus package was a relatively modest $7.2 billion for broadband and wireless in unserved and underserved areas... more

ICANN Culls Three More Domain Name Registrars

ICANN has announced that three more domain name registrars have lost their accreditation due to non-compliance with the RAA. The three registrars have been informed that their agreements with ICANN will not be renewed. South American Domains (NameFrog), Simply Named and Tahoe Domains have been sent letters by ICANN outlining the decision and the reasons for it. So what now? more

Why Can’t We Make the Internet Secure?

In a discussion about a recent denial of service attack against Twitter, someone asked, "Some class of suppliers must be making money off of the weaknesses. Anybody out there have a prescription for the cure?" Sure, but you're not going to like it. The Internet was originally a walled garden, where its operators knew who all the users were and could eject anyone who misbehaved... more

An End to Spam Litigation Factories? (Gordon v. Virtumundo)

When CAN-SPAM was passed in 2003, it was fairly clear that Congress wasn't trying to enable broad private enforcement. Everyone knew that rabid anti-spammers would seize any new statutory right for a litigation frenzy... Although I personally think Congress would better served all of us by omitting all private enforcement rights in CAN-SPAM, unquestionably the private rights in CAN-SPAM are drafted narrowly to prevent their abuses. That hasn't stopped some zealous anti-spammers from testing the limits of CAN-SPAM's private enforcement remedies anyway. more

Topics

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Threat Intelligence

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days