Featured Blogs

Latest

Threat of Tiered Pricing Continues in New gTLD Guidebook Version 2

The draft New gTLD Applicant Guidebook (version 2) has been released along with an analysis of the comments to the prior version. The documents are voluminous. I glanced at the revised draft Base Agreement, and it's clearly unacceptable as there continue to be no price caps in place to protect domain name registrants... more

I Am Not an IP Address, I Am a Free Man… and a Potential Customer

When I heard that full episodes of The Prisoner TV series were available online I immediately headed over to the AMC website to wallow in nostalgic enjoyment and remind myself just how cool Patrick McGoohan was as he stumbled around Portmeirion trying to avoid a big plastic ball... I would happily have watched online and let AMC advertise to me in return, but sadly it was not to be. When I got to The Prisoner page on its site I saw only an unfriendly message, shouting at me... more

Dumb When They Want To Be…

David Akin pointed me to this article in the Ottawa Citizen which describes CRTC initiatives aimed at getting the cablecos to pay into a fund that would support, "the creation of high-quality, high-cost, scripted Canadian broadcasting content in the new media." In it, Ken Engelhart, senior vice-president of regulatory [affairs?] for Rogers Corp. is quoted saying... more

Facebook’s TOS Fumble

One big story of the day was Facebook's new and improved terms of service which this Consumerist post flagged and which set off a firestorm of controversy... What Was Facebook's Mistake? Facebook could have avoided much of the controversy by providing its users some advance notice of the upcoming changes. more

FttH Boom in North Asia

In the mid-year 2008 rankings by the Fibre-to-the-Home (FttH) Council, South Korea, Hong Kong, Japan and Taiwan occupy the top four positions in terms of household penetration percentage. Asia Pacific now accounts for more than 27 million of the world’s 32 million FttH connections. more

Fixing the Internet Might Break It Worse Than It’s Broken Now

Willis Alan Ramsey, who wrote "Muskrat Love," recorded one and only one studio album. The cognoscenti of country think it's a gem, an all time top ten. There's an apocryphal story that when Ramsey was pushed to make another record he allegedly retorted, "What's wrong with the first one?" We who use the Internet every day risk losing sight of what a miracle it is, and the openness that keeps it so miraculous... We also lose sight of the fact that even as the Internet's miracles occur, it's almost always broken or malfunctioning or threatening or worse in many places along the line. more

Trademark Protection Dust-Up Obscures the Potential Value in New gTLDs

As a member of ICANN's Business Constituency I have heard first-hand the perfectly appropriate criticisms from trademark holders of ICANN's roll-out of new generic Top-Level Domains (gTLDs). But while it may be OK for branded companies to wish they didn't have to deal with the matter, the dust that has been kicked up has obscured real value in the program. more

Resolving the ICANN-Proposed TLDs Debate

The Internet Corporation for Assigned Names and Numbers (ICANN) has recently decided to allow any entity to register a top-level domain name (TLD). The best mechanism for valuing this decision, a mechanism that outperforms crowdsourcing, blogs, and committee decisions, is the legal and easy-to-implement solution known as prediction markets.
In handing down its TLD decision, ICANN never identified the problem it was trying to solve... more

What Would You Like to Ask at the ICANN Public Fora in Mexico City?

ICANN has its 34th international public meeting in Mexico City on 1-6 March i.e. in just over a fortnight. One of the consistent concerns I hear in my role as general manager of public participation for the organization is that there is not a way for people to ask questions to the staff and the Board. I don't think that's really true but I do accept that the formats used are not liked by a large number of people... more

An Economic Outlook on Information Security

As enterprise information security spending is scrutinized in unprecedented fashion in 2009 Information Technology management will seek to get more for their security dollar. While budgets tighten and risks grow due to the global economic downturn IT departments will be looking for point solutions, not suites of security tools. more

Ten Telecom Tsunamis

The telecom industry five years from now will be unrecognizable. The creative destruction of the Internet broadly writ will be even greater than it has been in the last decade. The major telcos, the major television networks, and the major cablecos -- if they still exist at all -- will have very different revenue models than they have today. That's the good scenario... more

Peer-to-Peer Gambling Wins in the Washington Court of Appeals

Adding to the flurry of gambling news of late, the Washington Court of Appeals issued a decision today that found peer-to-peer betting company (betcha.com) did not violate Washington state gambling laws. The court runs through some other issues underlying the statute, but the net result is that Betcha is off the hook... for now. Read more... more

Government Policies Beyond Broadband

The telecom infrastructure decisions we are now facing have very little to do with developments or the need for services in 2009 or 2010. They are more related to where the digital economy is taking us in the future. This is well beyond the time needed to kick-start sluggish economies. more

Designing Secure Networks with Cisco Technology, Part 2

In this multipart series I will be presenting some of the leading industry-standard best practices for enterprise network security using Cisco technologies... In Part 1 of this series, I provided an overview of the critical role that properly designed data security architectures play within an Internet-connected organization. Before we begin to discuss the security designs, processes and recommendations related to Cisco technology, let's first discuss some of the ways a network becomes unsecure... more

Should We Make the Possession of Malware a Crime?

In the U.S., it is a federal crime to use malware to intentionally cause "damage without authorization" to a computer that is used in a manner that affects interstate or foreign commerce. Most, if not all, U.S. states outlaw the use of malware to cause damage, as do many countries. The Council of Europe's Convention on Cybercrime, which the United States ratified a few years ago, has a provision concerning the possession of malware. Article 6(1)(b) of the Convention requires parties to the treaty to criminalize the possession of malware "with intent that it be used for the purpose of committing" a crime involving damage to a computer or data... more

Topics

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days