Featured Blogs

Latest

Australia Sets Rules for Access on Incumbent’s Fixed Network

In December 2005 the Australian Competition & Consumer Commission (ACCC) launched an inquiry into the future regulation of wholesale access on fixed networks. It has now announced a final decision, following a public inquiry, under section 152AL of the Trade Practices Act 1974 on six fixed-line services that had been due to expire at the end of this month. The following will remain declared services until July 2014... more

Mobile Broadband in Africa and the GCC Countries

The story of the growth of pre-paid mobile voice and SMS in Africa and the countries of the Gulf Cooperation Council is well known. The challenge is to move to mobile broadband, which is seen as having potentially explosive growth. Operators will need to create new value propositions, they face significant internal challenges and risk being displaced by rivals moving faster or better able to understand and meet the needs of customers... more

Google Wave: Good News or Bad News for Carriers?

The recent launch of Google Wave generated a lot of attention, and for good reason. It's recently crossed my path in a few different settings, and while the news is still fresh, there is a lot here for service providers to be thinking about. At a high level, Wave is Google's entry into the real time collaboration space, and being Web-based, is poised to disrupt the status quo, not just for vendors, but service providers as well. more

I Needed Music ‘cos I Had None…

The latest report on young people's online music-finding habits from consumer research company The Leading Question has attracted a fair amount of coverage for its headline finding that UK teenagers use of filesharing services has dropped by a third... Music industry pollsters will inevitably look for a silver lining in the cloud of consumer behaviour, and a focus on the growth of legal services is to be expected. But even with that caveat in mind, there has clearly been a shift in behaviour as more young people find licensed ways to listen to the music they want, watching YouTube videos, streaming songs through MySpace and Spotify and generally using legal avenues to find and enjoy the music of new bands like Florence and the Machine. more

ICANN and Free Speech

Upon being appointed as ICANN's new CEO in Sydney, Rod Beckstrom gave a rousing speech in which he stressed the vital importance of free expression on the Internet... Many ordinary, powerless people are indeed willing to fight and die. But is ICANN going to help them? Or at very least make sure that their decisions won't help those who want to muzzle them? more

When You Hear “Security,” Think “National Sovereignty”

These days you can hardly talk about Internet governance without hearing about security. DNSSEC is a hot issue, ICANN's new president is a cyber-security expert, and cyberattacks seem to be a daily occurrence.
This reflects a larger shift in US policy. Like the Bush administration before it, the Obama administration is making security a high priority for the US. Only now the emphasis is on security in cyberspace. The outlines of the new policy were published in the recent US Cyberspace Policy Review, which even recommends a cyber security office directly in the White House. more

How Unconscionable is the Profit That Verisign Makes from Its Registry?

VeriSign makes a great deal of money from the .COM and .NET registries. Can we tell how much they make, and how much that might change if the CFIT lawsuit succeeds? It's not hard to make some estimates from public information. The largest gTLD registry that VeriSign doesn't run is .ORG, which was transferred a few years ago to the Public Internet Registry (PIR) which pays Afilias to run the registry, and uses whatever is left over to support the Internet Society (ISOC)... more

Data Security: Being Open About Secrecy

It must be tricky to be an advocate of transparency when your job involves selling serious encryption tools to government departments, large and small companies, hospitals and people who are concerned about having their bank account details hijacked from a home PC. After all, the point about good encryption software and the systems that surround it is that they provide a way to keep your secrets secret, while open government and the effective regulation of financial services would seem to require the widest possible dissemination of all sorts of operational data... more

New CEO Stresses ICANN’s Role in Cybersecurity

One summer sport in Internet governance is speculating on what direction ICANN's new CEO will take it in. Making the media rounds yesterday on Fox and Lehrer News Hour to talk about the recent DDoS attacks on US and S. Korea government and commercial websites, new CEO Rod Beckstrom pushed how the response to cyber attacks is a coordinated effort, he also alluded to ICANN's role in similar attacks. Responding to a question on the News Hour about the USG policy response to dealing with cyber attacks, Beckstrom highlighted the critical role of ISP filtering, and identified the "organic" as well as "somewhat structured" coordination which occurs during a typical response. More interestingly, he plugged ICANN's facilitating role. more

Beyond Telco 2.0 and Quadruple Play

One of the great challenges has been to conceive a business model for next generation telephone companies. This is constrained by their limited core competences which do not match well with many of the opportunities that lie in entertainment and complex/customised bundles for consumers. Frost & Sullivan, a leading firm of industry analysts, notes the enthusiasm of service providers to offer connectivity, entertainment and information services, within a digitally connected world... more

A Review of Broadband Over Power Lines (BPL) or Power Line Telecommunication (PLT)

The OECD has published a detailed report, Broadband over Powerlines: Developments and Policy Issues, on what was once considered a potentially interesting and disruptive technology that might have rivaled DSL. It notes that having largely failed in that, it is instead being applied to "smart grid" applications. more

ICANN Regime Change:  Exit Twomey, Enter Beckstrom

On July 1st 2009, Rod Beckstrom succeeded Paul Twomey as the fourth CEO of the Internet Corporation for Assigned Names and Numbers (ICANN). Rod assumes this important leadership role at a critical juncture in ICANN's ongoing evolution. Saying that he is jumping into the deep end of a pool would not do justice to the magnitude of the tasks before him. The more appropriate analogy might be parachuting from a plane above the Mariana Trench during a typhoon. However, after reading some of his writings, reviewing his biography, and having met with him one-on-one during ICANN's recent Sydney meeting, I am confident that the ICANN Board made the right decision in selecting Rod to lead the organization at this defining moment in Internet governance. more

Tinkering Without Tampering: Wrestling With Convergence and Communications Policy (Transcript)

Our world finds itself at a critical juncture. Both trillions of dollars and the future of human communications including fundamental access to it are at stake. For telecom operators and media outlets there is not a migratory way from where we are to the future. There is a clear consumer shift underway that runs in the opposite direction to that of telecom and media incumbents; emergent social practice is increasingly clashing with the very structure and desires of incumbent players... It was for these reasons that one of the six keynote speakers invited to Spring 2009 Emerging Communications Conference (eComm) in San Francisco was Richard Whitt, Google's Washington Telecom and Media Counsel. His keynote was entitled, Tinkering without Tampering: Wrestling with Convergence and Communications Policy... more

Carlton and Kende’s Narrow Understanding of Corporate Domain Registrations

Professor Denis Carlton was asked by the Internet Corporation of Assigned Names and Numbers (ICANN) to submit a report on (or justify!) the impact of new top-level domains (TLDs) on industry competition. After he did so, Dr. Michael Kende posted an elaborate comment on the report on behalf of AT&T, to which Professor Carlton published a rebuttal. This essay outlines some of the errors in Professor Carlton's rebuttal and Dr. Kende's comments. more

Three Myths About DKIM

The DKIM standard has been out for two years now, and we're starting to see some adoption by large mail systems, but there's still a lot of misunderstanding about what DKIM does and doesn't do... Any a mail system can add a signatures to the messages it handles, and spammers can sign their mail, too. A DKIM signature contains, stripped down to its basics, the domain of the signer and a checksum of the message. more

Topics

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days