Featured Blogs

Latest

Will Obama Re-Nationalize ICANN?

Speaking at a Technology University of Delft conference on the internationalization of infrastructures, Professor Viktor Mayer-Schoenberger made some unique and provocative observations about the future of the ICANN tether to the U.S. government. Mayer-Schoenberger was trying to predict the position of the three main players: the EU, the US and China... more

Reaching Google via Asia?

Across the Internet, yesterday, Google users twittered, blogged and emailed that Google search and mail were not usable. And, yesterday afternoon, on Google’s official blog, Urs Hoelzle reported that Google “direct[ed] some […] web traffic through Asia”... Even though Google is very well-connected to a diverse set of other networks, two of these relationships predominate. It is through these relationships that much of the Internet reaches Google... more

Belgian Incumbent ISP Not Dominant Operator Says Appeals Court

Picture this: the still state-owned (51% of shares) Belgian incumbent telecom and Internet operator, Belgacom, is not a dominant player on the ISP market, according to the Brussels appeals court... It is obvious to every inhabitant of Belgium that the incumbent is everywhere. It owns all the copper pairs to homes and a good deal of the fibre. No single Internet or telephony operator can get into the business without transiting through the Belgacom network at some stage. more

Satellite Broadband, Stimulus Funds and Network Neutrality

At the IP Satellite Summit in Washington this week, a panel composed of satellite service providers and product vendors discussed whether or not they would pursue the economic stimulus funds set aside for broadband development. While the service providers agreed that there are viable business models for satellite broadband service without the stimulus money – of course, they were delivering service before the current economic collapse and talk of the stimulus money – the consensus seemed to be that they would apply for the grants to further develop, deploy and perhaps even subsidize their service offerings... more

Hannaford Data Breach Plaintiffs Rebuffed in Maine

A US District Judge in Maine largely granted a motion to dismiss brought by Hannaford in a big data breach case... According to the court, around March 2008, third parties stole up to 4.2 million debit and credit card numbers, expiration dates, security codes, PIN numbers, and other information relating to cardholders "who had used debit cards and credit cards to transact purchases at supermarkets owned or operated by Hannaford." more

China Calls for an End to the Internet Governance Forum

There's been a global argument going on for some time now over how the Internet should be governed. Many governments, including China but also many others, are not happy that the "root" of the Internet is controlled by the Internet Corporation for Assigned Names and Numbers (ICANN), which ultimately answers to the U.S. Department of Commerce. In 2005, there were proposals from various countries to move Internet governance from ICANN to a United Nations body of some kind... But there was no consensus. Human rights groups were rightly concerned that giving governments like China and Iran greater say in Internet governance would lead to more censorship and the elimination of privacy and anonymity. more

Securing a Cloud Infrastructure

George Reese (author of the new book Cloud Application Architectures: Building Applications and Infrastructure in the Cloud) is talking at Gluecon about securing cloud infrastructures. Two recent surveys found "security" was the number one concern of companies considering a move to the cloud. George says the key to making customers comfortable with cloud security is transparency... more

Can’t Connect… Won’t Connect

BBC technology correspondent Rory Cellan-Jones must be hoping that his near neighbours don’t decide they want a larger family. He recently spent ages setting up a high-speed wireless network at home, documenting the whole tortuous process on the BBC Technology blog, but all his hard work could apparently be ruined by a single baby listener in the neighbourhood... more

Canadian Spam Law Update

As you may know, there are two laws currently being discussed in Canadian legislative assemblies: Senate Bill S-220, a private member’s bill with private right of action and criminal remedies; Parliamentary Bill C-27, tabled by the government, with private right of action, coordination between various enforcement agencies... more

How to Steal Reputation

The term "reputation hijacking" continues to spread through the anti-spam community and the press. It's intended to describe when a spammer or other bad actor uses someone else's system -- usually one of the large webmail providers -- to send their spam. The idea is that in doing so, they're hijacking the reputation of the webmail provider's IPs instead of risking the reputation of IPs under their own control. But I really have to laugh (though mostly out of sadness) whenever this technique is described as something new... more

ICANN’s New gTLD Timetable: the Good, the Bad & the Ugly

ICANN staff recently posted on its website an updated timeline on the new gTLD process. Attempting to be "fair and balanced," I see some good, some bad, and some potential ugly in this timeline. I know there are a lot of good people at ICANN working very hard to conclude the Herculean task of implementing the new gTLD process. However, ICANN just can't help shooting itself in the foot with poorly worded and ambiguous statements... more

Stimulus Driving Optical Developments

FttH networks had begun to arrive well before the financial crisis hit, but surprisingly it is the crisis itself that is now driving fibre beyond its first stage. This first stage was basically a continuation of the 100-year-old vertically-integrated telephone business model. This saw more of the same delivered at higher speeds and higher costs, and there was only a limited market that was willing to pay a premium for such a FttH service... more

Thoughts on the Toys “R” Us Acquisition of Toys.com

Using the purchase by Toys "R" Us of Toys.com as an example, I outline the problems that come with using the popular ascending auction design and point out some of the potential strategic uses and signals of the domain name acquisition. Toys “R” Us paid $5.1 million in February 2009 for Toys.com. It outbid five others, including National A-1 Advertising and Frank Schilling... more

A “G12” to Oversee ICANN? Not Likely

Viviane Redding, the Information Society and Media Commissioner for the EC posted a video blog this week noting that the JPA between ICANN and the US Department of Commerce ends this September. In it she proposes that ICANN be overseen by a "G-12 for Internet Governance" with 12 geographically balanced government representatives from around the world. That's such a non-starter that I'm baffled that she would even propose it... more

Crime vs. Cybercrime: Is the Law Adequate?

In 2001, I published an article on "virtual crime." It analyzed the extent to which we needed to create a new vocabulary -- and a new law -- of "cybercrimes." The article consequently focused on whether there is a difference between "crime" and "cybercrime." It's been a long time, and cybercrime has come a long way, since I wrote that article. I thought I'd use this post to look at what I said then and see how it's held up, i.e., see if we have any additional perspective on the relationship between crime and cybercrime... more

Topics

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

Threat Intelligence

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days