Featured Blogs

Latest

Can’t Connect… Won’t Connect

BBC technology correspondent Rory Cellan-Jones must be hoping that his near neighbours don’t decide they want a larger family. He recently spent ages setting up a high-speed wireless network at home, documenting the whole tortuous process on the BBC Technology blog, but all his hard work could apparently be ruined by a single baby listener in the neighbourhood... more

Canadian Spam Law Update

As you may know, there are two laws currently being discussed in Canadian legislative assemblies: Senate Bill S-220, a private member’s bill with private right of action and criminal remedies; Parliamentary Bill C-27, tabled by the government, with private right of action, coordination between various enforcement agencies... more

How to Steal Reputation

The term "reputation hijacking" continues to spread through the anti-spam community and the press. It's intended to describe when a spammer or other bad actor uses someone else's system -- usually one of the large webmail providers -- to send their spam. The idea is that in doing so, they're hijacking the reputation of the webmail provider's IPs instead of risking the reputation of IPs under their own control. But I really have to laugh (though mostly out of sadness) whenever this technique is described as something new... more

ICANN’s New gTLD Timetable: the Good, the Bad & the Ugly

ICANN staff recently posted on its website an updated timeline on the new gTLD process. Attempting to be "fair and balanced," I see some good, some bad, and some potential ugly in this timeline. I know there are a lot of good people at ICANN working very hard to conclude the Herculean task of implementing the new gTLD process. However, ICANN just can't help shooting itself in the foot with poorly worded and ambiguous statements... more

Stimulus Driving Optical Developments

FttH networks had begun to arrive well before the financial crisis hit, but surprisingly it is the crisis itself that is now driving fibre beyond its first stage. This first stage was basically a continuation of the 100-year-old vertically-integrated telephone business model. This saw more of the same delivered at higher speeds and higher costs, and there was only a limited market that was willing to pay a premium for such a FttH service... more

Thoughts on the Toys “R” Us Acquisition of Toys.com

Using the purchase by Toys "R" Us of Toys.com as an example, I outline the problems that come with using the popular ascending auction design and point out some of the potential strategic uses and signals of the domain name acquisition. Toys “R” Us paid $5.1 million in February 2009 for Toys.com. It outbid five others, including National A-1 Advertising and Frank Schilling... more

A “G12” to Oversee ICANN? Not Likely

Viviane Redding, the Information Society and Media Commissioner for the EC posted a video blog this week noting that the JPA between ICANN and the US Department of Commerce ends this September. In it she proposes that ICANN be overseen by a "G-12 for Internet Governance" with 12 geographically balanced government representatives from around the world. That's such a non-starter that I'm baffled that she would even propose it... more

Crime vs. Cybercrime: Is the Law Adequate?

In 2001, I published an article on "virtual crime." It analyzed the extent to which we needed to create a new vocabulary -- and a new law -- of "cybercrimes." The article consequently focused on whether there is a difference between "crime" and "cybercrime." It's been a long time, and cybercrime has come a long way, since I wrote that article. I thought I'd use this post to look at what I said then and see how it's held up, i.e., see if we have any additional perspective on the relationship between crime and cybercrime... more

Why US Broadband Service Continues to Stagnate - Some Simple Numbers to Drive the Point Home

I've been fascinated by the recent announcement that Australia is spending $31 billion USD to upgrade its broadband. With all the excitement and fuss over the broadband stimulus funding in the American Recovery and Reinvestment Act, it may seem strange to be claiming that the $7.2 billion is a pitifully small amount -- but let me bring this home for you... more

Cyber Security and the White House, Part 2 - Cyberwarfare

This is a follow-up to my previous post on Cybersecurity and the White House. It illustrates an actual cyberwarfare attack against Estonia in 2007 and how it can be a legitimate national security issue. Estonia is one of the most wired countries in eastern Europe. In spite of its status of being a former Soviet republic, it relies on the internet for a substantial portion of everyday life -- communications, financial transactions, news, shopping and restaurant reservations all use the Internet. Indeed, in 2000, the Estonian government declared Internet access a basic human right... more

Cyber Security and the White House

A few months ago, an article appeared on arstechnica.com asking the question "Should cybersecurity be managed from the White House?" During the recent presidential elections in the United States and the federal elections in Canada, the two major players in both parties had differing views that crossed borders. In the US, the McCain campaign tended to favor free market solutions to the problem of cybersecurity, and the Conservatives in Canada took a similar position... more

Another Attack, Another Reason for the Urgency of DNSSEC Adoption

News broke this week about an attack in Puerto Rico that caused the local websites of Google, Microsoft, Yahoo, Coca-Cola, PayPal, Nike, Dell and Nokia to be redirected for a few hours to a phony website. The website was all black except for a taunting message from the computer hacker responsible for the attack... more

“.Pol”, a “.Com” for Political Candidates

In the coming months, ICANN will ambitiously expand the number of top-level domains (TLDs). ICANN could add ".movie" and ".paris", among others, to the existing ranks of ".com", ".org", ".gov", and ".edu". Here's another they should consider: a new ".pol" TLD that is reserved exclusively for political candidates and entities. A ".pol" TLD is needed to alleviate problems linked to a now-common phenomenon called political cybersquatting... more

IPv6… Canada About to Score?

USA-Canada World Championship hockey games never fail to elicit great excitement. In the IPv6 adoption world league however, the US seems to have a convincing lead over their northern neighbour but the game is not over yet, here come the Canucks. Internet evolution, and IPv6 in particular, were the major themes at the ISACC (ICT Standards Advisory Council of Canada) Plenary meeting in Ottawa mid April... more

Blame Yourself, Not ICANN

Domain name owners have traditionally complained that ICANN does not listen to us, and there is indeed plenty of evidence demonstrating the group’s obliviousness to community input. Nevertheless, as domain owners, we need to begin giving ourselves a share of blame too. It’s time to reflect on our failures so we can come up with an actionable solution... more

Topics

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days