Featured Blogs

Latest

New Map Illustrates All 245 Country Code Top-Level Domains

Byte Level Research has published a map that illustrates not only all 245 country codes but the size of each country and territory. The map is quite up to date and comprehensive including country codes for such places as Svalbard (.sj), Southern Georgia (.gs), and Bouvet Island (.bv), which is uninhabited. "Today, companies must register as many as a hundred country codes to be competitive globally -- and protect their intellectual property. This map helps professionals keep track of all these country codes -- and see where the Internet is headed. For example, China is on pace to have the most popular country code on the planet by 2012," said Yunker," said John Yunker, president of Byte Level Research and developer of the map. more

Every Domainer Is Subsidizing Tasting… Abolish Registration Grace Period

One issue that a large number of domainers agree on is that domain tasting under the current ICANN-approved policy is bad for the industry. For one thing, a healthy portion of the practice involves trademark use that not only is illegal but also destroys value. Of course, particular segments of the domain name ecosystem can suffer value destruction because of tasting that doesn't infringe trademarks. But most criticism is directed, and rightly so, at tasting that raises trademark issues. Litigation over the trademark issues has done little to stop the practice and destroys value for trademark holders and domainers alike... more

Walks Like a Telco, Yalks Like a Telco… Must be a Telco

Vonage's latest woes are written up by Om Malik in Vonage: How Low Can You Go. More interesting than Om's reportage (Sprint wins case, Vonage ordered to pay damages, stock drops to $1.30) is the commentary afterward, in which one reader takes Om to task for the "gleeful" way in which he reports the demise of the VoIP companies... Boosters made the argument that VoIP was fundamentally cheaper than the TDM systems that phone companies deploy, and so therefore they enjoyed a price advantage in the market place. Anyone in the business of supplying telecom equipment, however, will tell you that the argument is flawed... more

Telephony is Disrupted Because Voice No Longer Matters… (As Much)

Does "voice" communication really matter as much today in business communications? Think about it. When you need to reach someone today, what do you do? Do you call them on the phone? Or do you send them email? Or a text message? or IM? I know personally that my normal communication flow usually goes something like this: Instant Messaging; I check first to see if I can reach the person on some form of IM... SMS; if the matter is relatively important... E-mail/Facebook/Twitter/other; Previously that would have just been email, but these days I find myself very often sending messages via Facebook or Twitter... more

A Consociational Bureau for the Internet Governance Forum

The principle that Internet governance "is a joint effort which requires cooperation and partnership among all stakeholders" (Geneva Declaration of Principles, para 20) has become axiomatic since it was first agreed at WSIS, and is fundamental to the IGF as a "new forum for multi-stakeholder policy dialogue" (Tunis Agenda, para 72). However at the same time as this principle has been universally embraced, some of its implications, that would require the four stakeholder groups identified in the Tunis Agenda to collaborate on the development of joint policy recommendations (Tunis Agenda para 72(g)) have met with resistance. That the strongest resistance has come from those stakeholders with the greatest investment in the existing Internet governance regime... more

Developing Internet Standards: How Can the Engineering Community and the Users Meet?

There is currently a discussion going on between Milton Mueller and Patrik Fältström over the deployment of DNSSEC on the root servers. I think the discussion exemplifies the difficult relation between those who develop standards and those who use them. On the one hand, Milton points out that the way the signing of the root zone will be done will have a great influence on the subjective trust people and nation states will have towards the system. On the other hand, Patrik states that "DNSSEC is just digital signatures on records in this database". Both are right, of course, but they do not speak the same language... more

Ameritrade Leaks User Information Yet Again, Blames Hacker X

OK, you know things are getting bad when Ameritrade leaks its customer information yet again, and I don't even bother to report it because it's not news anymore. Well, recent updates to the story have prompted me to correct that omission. Yes, it happened again. Roughly a month ago, correspondents began to receive pump-n-dump spam to tagged email addresses which they had given only to Ameritrade... This now marks the third major confirmed leak of customer information from Ameritrade. In addition, the Inquirer reported the loss of 200,000 Ameritrade client files in February 2005. One correspondent informs me that this has happened to him on four or five previous occasions. more

Enterprise or Public Sector Investment in National Lambda Rail Presents a Unique Opportunity

Sometimes in our worries about the Duopoly, we fail to recognize that some extraordinary wealth of opportunity sits right underneath our noses. National Lambda Rail (NLR) is one such case. About six months ago I wrote in some detail about NLR and what made this entity different from previous attempts at research networks in the US... NLR runs on a philosophy of a user owned and administered research network. Intrernet2 (I2), during the ten years of its existence, has run on the basis of first a Qwest donated backbone known as Abilene and since November 2006 on the basis of a seven year managed services contract with Level 3 Communications. more

Wireless Net Neutrality

To date, most of the discussion on net neutrality has dealt with the behaviour of conventional wireline ISPs. RCR Wireless News is carrying an opinion piece called "Paying for the bandwidth we consume" by Mark Desautels, VP -- Wireless Internet Development for CTIA -- the trade association for the US wireless industry. His article follows up on reports of Comcast cable moving to discontinue internet access service to so-called "bandwidth hogs"... more

Where are DNS Root Servers? See them on Google Maps

DNS root servers function as part of the Internet backbone, as explained in Wikipedia, and have come under attack a number of times in the past -- although none of the attacks have ever been serious enough to severely hamper the performance of the Internet. In response to some of the common misconceptions about the physical location and total number of DNS root servers in the world, Patrik Faltstrom has put together a visual map on Google, pin-pointing the approximate location of each server around the world. more

Radio Interview Discusses Domainers and Domaining

Damien Allen of VTalk Radio recently interviewed Professor Eric Goldman of the Santa Clara University School of Law on the topic of "Domaining". The interview covers the nature of domaining as a business and how it differs from cybersquatting. From the interview: "Often times the domainers are not particularly interested in profitable resale and, in fact, in my experience many times when domainers get complaints about domains, they'll just hand the domain name back, no questions asked and no money charged. They're not looking to make money from the resale of the domain names..." more

Microsoft Files Three More Cybersquatting Cases

Microsoft has filed 3 cybersquatting cases at the beginning of September 2007, as reported in an Inside Indiana Business article. I took the liberty of accessing the cases via the PACER system, and posted the major documents... It looks like they're stepping up efforts to defend their trademarks, and seeking big damages in court, rather than go the way of the UDRP. These cases demonstrate that new TLDs should not be a priority with ICANN until the problems in existing TLDs are addressed. more

Congestion in the Backbone: Telecom and Internet Solutions

When a network is subject to a rapid increase in traffic perhaps combined with a rapid decrease in capacity (for example due to a fire or a natural disaster), there is a risk of congestion collapse. In a congestion collapse, the remaining capacity is so overloaded with access attempts that virtually no traffic gets through. In the case of telephony, everyone attempts to call their family and friends in a disaster area. The long standing telephony approach is to restrict new call attempts upstream of the congested area... This limits the amount of new traffic to that which the network can handle. Thus, if only 30% capacity is available, at least the network handles 30% of the calls, not 3% or zero... more

Zango Verdict is Good News for Spam Filters and Blacklists

Zango, a company that used to be called 180 solutions, has a long history of making and distributing spyware. (See the Wikipedia article for their sordid history.) Not surprisingly, anti-spyware vendors routinely list Zango's software as what's tactfully called "potentially unwanted". Zango has tried to sue their way out of the doghouse by filing suit against anti-spyware vendors. In a widely reported decision last week, Seattle judge John Coghenour crisply rejected Zango's case, finding that federal law gives Kaspersky complete immunity against Zango's complaint... more

Is Bandwidth Infinite? It All Depends…

On August 23 ( while I was in China) a list member Lee S. Drybrugh wrote in jest: I happened to bump into Peter Cochrane stating, "The good news is -- bandwidth is free -- and we have an infinite supply." Next by sheer accident I bumped into this in relation to Gilder, "Telecosm argues that the world is beginning to realise that bandwidth is not a scarce resource (as was once thought) but is in factinfinite." Can anyone explain this infinite bandwidth as I think I am getting ripped off by my ISP if this is true? Craig Partridge then offered what I think is a very good commentary of a difficult question where the answer depends very much on context... more

Topics

Threat Intelligence

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days