Featured Blogs

Latest

In Support of ICANN’s New Trademark Protection Rules (Mostly)

Yesterday, I sent ICANN my comments about the draft recommendations from ICANN’s Implementation Recommendation Team (IRT), which has been tasked with coming up with a trademark protection scheme for new top-level domains. For the most part, I think they did an excellent job... more

ICANN IRT Report Open for Comment With Short Timeframe?

The Intellectual Property Constituency's draft report on trademark issues is now available for comment. The draft report was put together behind closed doors, which would appear to go against the normal policy development process at ICANN, which is quite worrying. Its contents, however, are even more disturbing... more

Domain Name Registries Must Do More to Protect Highly-Trafficked Domains

With the recent attacks against high-profile New Zealand domain names including Coca-Cola.co.nz and F-Secure.co.nz, fingers are naturally pointing to Domainz, the registrar of record for these domains, as the party responsible for this lapse in security. While domain name registrars certainly need to ensure the security and stability of their systems, domain name registries must also step up and take responsibility for mitigating risks posed by hackers... more

Commerce Department: Headed Toward ICANN 3.0?

The NTIA has published a Notice of Inquiry, Assessment of the Transition of the Technical Coordination and Management of the Internet's Domain Name and Addressing System, in advance of the expiration of the Joint Project Agreement in September 2009. The document outlines the history and evolution of the Memorandum of Understanding (MOU) between the Department of Commerce (DoC) and ICANN, and the questions posed cover fairly standard territory. However, the following might be worth paying attention to... more

Global DNS SSR Recap

This past February, around 100 DNS industry experts met in Atlanta, GA for the "The Global DNS Security, Stability, & Resiliency Symposium." Organized by ICANN and hosted by Georgia Tech, this event was to strengthen personal relationships between operators and review what we know about the DNS infrastructure... The content included three breakout groups over two days: Enterprise Use of DNS, DNS in Resource Constrained Environments, and Combating Malicious Use of DNS... more

A Few More Thoughts on Email Authentication… errr… Trust

Mike Hammer's thoughtful article, A Few Thoughts on the Future of Email Authentication, should trigger thoughtfulness in the rest of us. Email abuse has been around a long time. Anti-abuse efforts have too. Yet global abuse traffic has grown into the 90+% range, with no hint of trending downward. The best we hear about current effectiveness is for last-hop filtering, if you have the money, staff and skills to apply to the problem... more

ICA to ICANN: The IRT Must Open Up Or Be Stripped of Official Status and Support

On April 21st the Internet Commerce Association submitted a formal request to Mr. Frank Fowlie, ICANN Ombudsman, requesting an immediate investigation of the non-compliance of the Implementation Recommendation Team (IRT) with applicable provisions of ICANN's Bylaws. The IRT was created by a March Resolution adopted by the ICANN Board during its Mexico City meeting, and was charged with proposing "solutions" to the concerns of trademark holders. Unfortunately, the IRT has chosen to operate in a non-transparent manner... more

TWC Does the Right Thing - Again!

In response to customer feedback, Time Warner Cable has discontinued its trials of tiered Internet service. [Corporate Announcement here.] It was quite a stuff-storm, but to TWC's credit, they put their finger up, felt the howling gale, and changed course right away. This is in marked contrast to their larger competitor, Comcast... more

Is It Time to Supplement Desktop Security Protections?

Internet users are acutely aware of their exposure on the Internet and clearly concerned about their safety. Increased downloads of scareware as Conficker made headlines in the mainstream media are only the latest evidence. Desktop software is often viewed as a one-stop shop for fighting Internet threats such as viruses, worms and other forms of malware and phishing. These solutions have served us well but more protections are needed to address the dynamic and increasingly sophisticated web based exploits being launched... more

YouTube’s Fine - Analysts Don’t Understand Internet Peering

As widely reported, Credit Suisse analysts have estimated Google's YouTube may lose $470M in 2009 and more in the future. However, their estimates say Google will pay $360M for bandwidth in 2009. I don't know how Google figures their cost of bandwidth, but anyone who understands anything about Internet transit/peering knows Credit is way off base. more

What to Do with Skype?

Without rehashing the mainstream headlines, it's clearly on the table now that eBay has given up trying to create synergies with Skype, so the focus now is on making the best of things as distinct entities. The preferred route for eBay would be to keep Skype and recoup their investment via an IPO sometime next year. That would certainly bring an end to things with both parties leaving on a high note. Of course this hinges heavily on the state of capital markets... more

A Few Thoughts on the Future of Email Authentication

With the Online Trust Alliance Town Hall Meeting and Email Authentication Roundtable next week as well as the RSA Conference, I decided to pause and think about where we are and where we might be headed with regard to email authentication. Over the years, many of us have collectively worked to provide a framework for authenticating email... more

New gTLD Comment Period Closes

Internet Corporation for Assigned Names and Numbers (ICANN) has been holding a public comment period on the second draft of the new generic Top-Level Domains (gTLD) handbook. This period was due to close yesterday. Prior to yesterday afternoon there was a healthy number of comments, but in the past 24 hours a significant number of new comments have been submitted... more

The Cybersecurity Act of 2009

Four senators (Rockefeller, Bayh, Nelson, and Snowe) have recently introduced S.773, the Cybersecurity Act of 2009. While there are some good parts to the bill, many of the substantive provisions are poorly thought out at best. The bill attempts to solve non-problems, and to assume that research results can be commanded into being by virtue of an act of Congress. Beyond that, there are parts of the bill whose purpose is mysterious, or whose content bears no relation to its title. more

A Tribute to the Father of the RFC, Dr. Stephen D. Crocker

40 years ago the Request for Comments (RFC) process for the Internet was born. The RFC process continues to be the way Internet protocols are expressed today. We have one very special man to thank for this and his name is Dr. Stephen D. Crocker. He has played a key role in shaping the modern day Internet. For this, I felt that a special tribute to him was in order as we take a look at his countless contributions from the foundation of the Internet to the Internet as we know it today. more

Topics

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

Threat Intelligence

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days