Featured Blogs

Latest

What Would You Like to Ask at the ICANN Public Fora in Mexico City?

ICANN has its 34th international public meeting in Mexico City on 1-6 March i.e. in just over a fortnight. One of the consistent concerns I hear in my role as general manager of public participation for the organization is that there is not a way for people to ask questions to the staff and the Board. I don't think that's really true but I do accept that the formats used are not liked by a large number of people... more

An Economic Outlook on Information Security

As enterprise information security spending is scrutinized in unprecedented fashion in 2009 Information Technology management will seek to get more for their security dollar. While budgets tighten and risks grow due to the global economic downturn IT departments will be looking for point solutions, not suites of security tools. more

Ten Telecom Tsunamis

The telecom industry five years from now will be unrecognizable. The creative destruction of the Internet broadly writ will be even greater than it has been in the last decade. The major telcos, the major television networks, and the major cablecos -- if they still exist at all -- will have very different revenue models than they have today. That's the good scenario... more

Peer-to-Peer Gambling Wins in the Washington Court of Appeals

Adding to the flurry of gambling news of late, the Washington Court of Appeals issued a decision today that found peer-to-peer betting company (betcha.com) did not violate Washington state gambling laws. The court runs through some other issues underlying the statute, but the net result is that Betcha is off the hook... for now. Read more... more

Government Policies Beyond Broadband

The telecom infrastructure decisions we are now facing have very little to do with developments or the need for services in 2009 or 2010. They are more related to where the digital economy is taking us in the future. This is well beyond the time needed to kick-start sluggish economies. more

Designing Secure Networks with Cisco Technology, Part 2

In this multipart series I will be presenting some of the leading industry-standard best practices for enterprise network security using Cisco technologies... In Part 1 of this series, I provided an overview of the critical role that properly designed data security architectures play within an Internet-connected organization. Before we begin to discuss the security designs, processes and recommendations related to Cisco technology, let's first discuss some of the ways a network becomes unsecure... more

Should We Make the Possession of Malware a Crime?

In the U.S., it is a federal crime to use malware to intentionally cause "damage without authorization" to a computer that is used in a manner that affects interstate or foreign commerce. Most, if not all, U.S. states outlaw the use of malware to cause damage, as do many countries. The Council of Europe's Convention on Cybercrime, which the United States ratified a few years ago, has a provision concerning the possession of malware. Article 6(1)(b) of the Convention requires parties to the treaty to criminalize the possession of malware "with intent that it be used for the purpose of committing" a crime involving damage to a computer or data... more

To What Extent Will the US Broadband Stimulus Package Provide a… Stimulus?

The story of America's lacklustre broadband performance is relatively well known. Part of that story relates to its low broadband penetration levels when compared with other developed economies... Another aspect of the story relates to broadband speeds... in terms of broadband technology levels, the USA still trails behind leading countries such as Japan and Korea, and some European countries such as France and Italy, by a full generation. more

Open Networks Delivering the Goods for All

The City of Amsterdam announcement to now move to the next stage of their FttH (fibre to the home) project -- with another roll out covering 100,000 connections -- is a clear indication that the concept of open access FttH networks is a valid one. This will have large scale implications for countries around the world who are looking at using open network based telecoms infrastructure projects to stimulate their economies. more

A Storm in a Teacup or a Perfect Storm?

We've had snow storms recently in the UK, so there is much talk about storms. It strikes me that some might view the current issues at Nominet as a storm in a teacup – a small event that has been exaggerated out of all proportion. Not unsurprisingly, I don't agree. I think that the storm has already had a significant effect on Nominet... more

Telco Stimulus Package: Australian Case Study

Most developed nations are now revisiting their telecoms policies with a view to using telecoms infrastructure as a tool to revive the economy. And when exploring this it quickly becomes clear that open networks are necessary if we are to achieve the economic benefits that the digital economy has to offer. The multiplier effect of open infrastructure is obvious. It stimulates developments in healthcare, education, energy, media and Internet -- this in stark contrast to the closed (vertically-integrated) networks that are currently operated by most incumbent telcos around the world. more

First gTLD Signed: Dot Gov

Today is a historic day as the first generic Top-Level Domain (gTLD) has been signed. Only a few other top level domains, all of which are country code Top-Level Domains (ccTLDs), have been signed to date. This step is part of the first phase of adoption. Authoritative DNS servers need to sign and publish their zones. The second part is for the resolvers on the Internet to validate the keys. Both systems working together will provide security in the DNS. more

Logical Deduction on Why New TLDs Will Not Increase Costs for Trademark Holders

Paul Stahura published a great report demonstrating that trademark holders have historically not been blocking their names across multiple Top-Level Domains (TLDs). I have always been a fan of number crunching -- "numbers never lie". Since Paul has already done a remarkable job of statistical analysis, I am going to wear my theorist hat and prove a reworded form of the Hypothesis using logical deduction and common sense... more

ICANN Blows $4.6 Million In Stock Market

If you visit the new dashboard on ICANN's web site, you see some nice bar charts, including one rather large negative number of $4,462,000. If you click the little arrow at the top of the Financial Performance chart, a footnote window pops open where the last sentence is: "The large variance to budget is due to investment losses of $4.6 mil." Investment losses? Yup, ICANN's been speculating in the stock market... more

A Seismic Shift: IPv4 Numbers Becoming Transferable and Consequently Property

A Tipping Point for the Internet? Catching the precise moment of a tectonic shift in a global system as large and important as the Internet may be viewed as an exercise in the improbable. However, I point out in this summary that I think we are precisely in the midst of such a shift... more

Topics

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

Threat Intelligence

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days