Featured Blogs

Latest

Analysis of Domain Names Registered Across Multiple Existing TLDs and Implications for New gTLDs

The following is an analysis based on the hypothesis that trademark holders are not, in general, registering their trademarks as domain names across the existing top-level domain namespace. To determine if the hypothesis is true, we examine domain names registered in the popular generic top-level domains ("gTLDs" such as .com, .net and .info), also using other publicly available information such as the USPTO database of trademarks, the English dictionary, DNS entries, UDRP records and whois records. more

Benkler Analyzes Broadband in Stimulus Bills

Yochai Benkler has done a close reading of the broadband portions of both House and Senate stimulus bills. Nice work. To summarize Yochai's summary: House: $6 Billion, split between Commerce and Agriculture Depts., requires adherence to FCC's Four Internet Principles (the Martin FCC Version); Senate: $9 Billion, via Commerce Department's NTIA, requires less specific "interconnection and nondiscrimination." How much broadband can a Billion buy? more

IPv6… the Internet Dragon Stirred Under Its Shell

At Cisco Networkers in Barcelona earlier this week, some of us saw a dragon try to wiggle out of its shell, provided you connected in IPv6 that is. A smile to Kame, the turtle which only danced under a IPv6 caress. Networkers 2009 saw more than 3000 attendants and a good complement of IPv6 presentations highlighted by a high powered plenary panel on the status of IPv6. more

Dublin.tel Grabbed by Lantec

During the sunrise period for .eu domains there was quite a bit of controversy, as a number of high profile names were grabbed by companies that had no legitimate right to them. One of the domains that caught my attention at the time was dublin.eu (see Irish Times article). So what about the .tel sunrise?
Were companies like Lantec, who grabbed the dublin.eu domain, actively seeking high profile names this time round? more

Designing Secure Networks with Cisco Technology, Part 1

In this multipart series I will be presenting some of the leading industry-standard best practices for enterprise network security using Cisco technologies.... "Wisdom consists in being able to distinguish among dangers and make a choice of the least harmful." That quote is quite possibly the most accurate depiction possible of the never-ending struggle between network security and corporate budget. Providing a mechanism to defend the enterprise network from every conceivable threat is impossible in terms of both technology and funding. more

An Interview With Richard Whitt, Google’s Washington Telecom and Media Counsel

I recently had the opportunity to interview, Richard Whitt, Google's Washington Telecom and Media Counsel, who will be one of the keynote speakers at the upcoming Emerging Communications Conference (eComm 2009) being held on March 3-5 at the San Francisco Airport Marriott. The following is the transcript of our phone conversation and the audio recording of the interview. more

Extra Details on the Measurement Lab Launch

Well if you've been following tech news today, you probably already know -- after month (years, really) of work, the MeasurementLab.net (M-Lab) initiative has now officially launched. Given how many people have been working on this project, I'm amazed it didn't leak. Having just launched, I've been stunned by the immediate outpouring of interest — not only did it peg our servers, taking a couple of the research tools momentarily offline, but my inbox has been entirely flooded by correspondences. more

VoIP Security Predictions for 2009

Here are my VoIP and Voice security predictions for 2009, limited to just a few, key predictions... The poor economy will slow the adoption rate for VoIP and Unified Communications (UC). This will continue to limit the size of the enterprise VoIP deployments for potential hackers to exploit. VoIP/UC will continue to be mostly an internal/campus application where the threat level for attack is low, so deployments will be largely secured along the same lines as other data network applications. more

Top Ten List of Needed FCC Regulatory Reforms

Honesty is the best policy. At the risk of anthromorphizing a regulatory agency, at the very least the FCC has not told the complete truth, or put itself in a position not to know the truth. The FCC has contributed to debates about what constitutes credible facts and statistics, and what this data means. For example, soon-to-be former FCC Chairman Kevin Martin asserted as the gospel truth his factual conclusion that cable television operators collectively have a 70% market share... The FCC should acknowledge that it may not know all the facts. more

Domain Name Brand-Sharing Starts With Embracing Web 2.0

Irrespective of which solution to the current domain name brand-sharing impasse ends up being adopted by brand owners (option 1, option 2, or a combination), the owners must first understand and embrace current trends in online communications, information gathering, and entertainment. Thus, for a solution to succeed the corporate mindset toward new technologies needs to change; after that brand owners can work cooperatively with the domain name industry (owners and institutions) to increase the aggregate pie. more

Law Requiring Sex Offenders to Hand Over All Internet Passwords Going Too Far?

Maybe you've seen one of the news stories about the revised Georgia statute (Georgia Code ยง 41-1-12) that now requires sex offenders to turn their Internet passwords, screen names and email addresses over to authorities. The purpose of the revised statute is to give authorities the ability to track what sex offenders are doing online, to, in the words of one news story, "make sure" they "aren't stalking children online or chatting with them about off-limits topics." more

A Noteworthy Report on Fast Flux Hosting

This very interesting document was released by ICANN's Generic Names Supporting Organization (GNSO) for public comment yesterday. And it asks some fundamental questions while at the same time pointing to sources such as the Honeynet Alliance's reports on fast flux. more

Obama’s Tech Stimulus Plan: Health IT, Broadband, and Smart Grid

Steve Lohr has a nice piece in the New York Times ('Technology Gets a Piece of Stimulus,' 26 Jan 2009, p. C1) this morning about the role that technology and innovation will play in the economic recovery (aka stimulus) bill supported by the Obama Administration. In the past, health IT deployment has been approached as an engineering problem: what computers have to be part of which networks exchanging which types of data? This loses sight of the purpose of electronic medical records... more

Monster.com Response to Security Breach Unacceptable

As some of us are continuing to learn this week the Monster.com service has again been successfully hacked. According to a security bulletin posted on Monster.com on January 23rd, 2009, the intruder gained access to the user database, while no resumes were apparently compromised... As a user of Monster.com what I find incredibly upsetting about this situation is that I had to find out about this through a security blog. more

Security Psychology

I just came across a post telling of the Security and Human Behavior workshop. As some of you may be aware, I've been researching this subject for about two years now, and I am very excited that a conference has now happened! It means I did not waste the last two years of my life after all! more

Topics

Threat Intelligence

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days