Featured Blogs

Latest

Fixing the Internet Might Break It Worse Than It’s Broken Now

Willis Alan Ramsey, who wrote "Muskrat Love," recorded one and only one studio album. The cognoscenti of country think it's a gem, an all time top ten. There's an apocryphal story that when Ramsey was pushed to make another record he allegedly retorted, "What's wrong with the first one?" We who use the Internet every day risk losing sight of what a miracle it is, and the openness that keeps it so miraculous... We also lose sight of the fact that even as the Internet's miracles occur, it's almost always broken or malfunctioning or threatening or worse in many places along the line. more

Trademark Protection Dust-Up Obscures the Potential Value in New gTLDs

As a member of ICANN's Business Constituency I have heard first-hand the perfectly appropriate criticisms from trademark holders of ICANN's roll-out of new generic Top-Level Domains (gTLDs). But while it may be OK for branded companies to wish they didn't have to deal with the matter, the dust that has been kicked up has obscured real value in the program. more

Resolving the ICANN-Proposed TLDs Debate

The Internet Corporation for Assigned Names and Numbers (ICANN) has recently decided to allow any entity to register a top-level domain name (TLD). The best mechanism for valuing this decision, a mechanism that outperforms crowdsourcing, blogs, and committee decisions, is the legal and easy-to-implement solution known as prediction markets.
In handing down its TLD decision, ICANN never identified the problem it was trying to solve... more

What Would You Like to Ask at the ICANN Public Fora in Mexico City?

ICANN has its 34th international public meeting in Mexico City on 1-6 March i.e. in just over a fortnight. One of the consistent concerns I hear in my role as general manager of public participation for the organization is that there is not a way for people to ask questions to the staff and the Board. I don't think that's really true but I do accept that the formats used are not liked by a large number of people... more

An Economic Outlook on Information Security

As enterprise information security spending is scrutinized in unprecedented fashion in 2009 Information Technology management will seek to get more for their security dollar. While budgets tighten and risks grow due to the global economic downturn IT departments will be looking for point solutions, not suites of security tools. more

Ten Telecom Tsunamis

The telecom industry five years from now will be unrecognizable. The creative destruction of the Internet broadly writ will be even greater than it has been in the last decade. The major telcos, the major television networks, and the major cablecos -- if they still exist at all -- will have very different revenue models than they have today. That's the good scenario... more

Peer-to-Peer Gambling Wins in the Washington Court of Appeals

Adding to the flurry of gambling news of late, the Washington Court of Appeals issued a decision today that found peer-to-peer betting company (betcha.com) did not violate Washington state gambling laws. The court runs through some other issues underlying the statute, but the net result is that Betcha is off the hook... for now. Read more... more

Government Policies Beyond Broadband

The telecom infrastructure decisions we are now facing have very little to do with developments or the need for services in 2009 or 2010. They are more related to where the digital economy is taking us in the future. This is well beyond the time needed to kick-start sluggish economies. more

Designing Secure Networks with Cisco Technology, Part 2

In this multipart series I will be presenting some of the leading industry-standard best practices for enterprise network security using Cisco technologies... In Part 1 of this series, I provided an overview of the critical role that properly designed data security architectures play within an Internet-connected organization. Before we begin to discuss the security designs, processes and recommendations related to Cisco technology, let's first discuss some of the ways a network becomes unsecure... more

Should We Make the Possession of Malware a Crime?

In the U.S., it is a federal crime to use malware to intentionally cause "damage without authorization" to a computer that is used in a manner that affects interstate or foreign commerce. Most, if not all, U.S. states outlaw the use of malware to cause damage, as do many countries. The Council of Europe's Convention on Cybercrime, which the United States ratified a few years ago, has a provision concerning the possession of malware. Article 6(1)(b) of the Convention requires parties to the treaty to criminalize the possession of malware "with intent that it be used for the purpose of committing" a crime involving damage to a computer or data... more

To What Extent Will the US Broadband Stimulus Package Provide a… Stimulus?

The story of America's lacklustre broadband performance is relatively well known. Part of that story relates to its low broadband penetration levels when compared with other developed economies... Another aspect of the story relates to broadband speeds... in terms of broadband technology levels, the USA still trails behind leading countries such as Japan and Korea, and some European countries such as France and Italy, by a full generation. more

Open Networks Delivering the Goods for All

The City of Amsterdam announcement to now move to the next stage of their FttH (fibre to the home) project -- with another roll out covering 100,000 connections -- is a clear indication that the concept of open access FttH networks is a valid one. This will have large scale implications for countries around the world who are looking at using open network based telecoms infrastructure projects to stimulate their economies. more

A Storm in a Teacup or a Perfect Storm?

We've had snow storms recently in the UK, so there is much talk about storms. It strikes me that some might view the current issues at Nominet as a storm in a teacup – a small event that has been exaggerated out of all proportion. Not unsurprisingly, I don't agree. I think that the storm has already had a significant effect on Nominet... more

Telco Stimulus Package: Australian Case Study

Most developed nations are now revisiting their telecoms policies with a view to using telecoms infrastructure as a tool to revive the economy. And when exploring this it quickly becomes clear that open networks are necessary if we are to achieve the economic benefits that the digital economy has to offer. The multiplier effect of open infrastructure is obvious. It stimulates developments in healthcare, education, energy, media and Internet -- this in stark contrast to the closed (vertically-integrated) networks that are currently operated by most incumbent telcos around the world. more

First gTLD Signed: Dot Gov

Today is a historic day as the first generic Top-Level Domain (gTLD) has been signed. Only a few other top level domains, all of which are country code Top-Level Domains (ccTLDs), have been signed to date. This step is part of the first phase of adoption. Authoritative DNS servers need to sign and publish their zones. The second part is for the resolvers on the Internet to validate the keys. Both systems working together will provide security in the DNS. more

Topics

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days