Featured Blogs

Latest

Email Recommendation Engine for ESPs – Text Length Optimization (Part II)

Popular email editors today have no way to optimize for text length. An email marketer may attempt to build her content but has no idea whether that content is optimized related to word count for a specific industry/client. As it relates only to text length, does the email have too many or too few words. Currently, there is no built-in predictive model to inform her. Well, until now. Last month we described an evolutionary real-time data-driven process for email campaign builders to have at their disposal. more

What’s the Right Definition of Upload Speed?

I read a blog on the WISPA website written by Mark Radabaugh that suggests that the best policy for broadband speeds would be met by asymmetrical architecture (meaning that upload speeds don't need to be as fast as download speeds). I can buy that argument to some extent because there is no doubt that most homes download far more data than we upload. But then the blog loses me when Mr. Radabaugh suggests that an adequate definition of speed might be 50/5 Mbps or 100/10 Mbps. more

Anticompetitive and Predatory Misconduct by ICANN and Contracted Parties Must End

On May 26, 2021, I submitted a complaint to ICANN's Complaints Officer, Krista Papac. In a nutshell, my complaint centers on ICANN's blatant violation of its Bylaws, specifically Section 2.2, named Restrictions, which expressly prohibits ICANN from acting as a registrar. However, despite the absence of any exceptions to this unambiguous prohibition, ICANN is acting improperly as a registrar for the purposes of warehousing and cybersquatting on certain domain names in the .com and .net registries. more

An Attack on WiFi Spectrum

A little over a year ago, the FCC approved the use of 1,200 MHz of spectrum in the 6 GHz band for public use -- for new WiFi. WiFi is already the most successful deployment of spectrum ever. A year ago, Cisco predicted that by 2022 that WiFi will be carrying more than 50% of global IP traffic. These are amazing statistics when you consider that WiFi has been limited to using 70 MHz of spectrum in the 2.4 GHz spectrum band and 500 MHz in the 5 GHz spectrum band. more

Online Freedoms: Safeguards Must Be Balanced With Free Expression

The ongoing COVID-19 pandemic has been a major contextual factor of global internet governance discussions over the past year, and it appears that discussions in ICANN are no exception. Threats to the integrity and security of the DNS have become a regular topic of debate within the ICANN community. In recent months, these discussions have increasingly focused on the idea of 'DNS abuse' and, more specifically, COVID-19-related DNS abuse. more

ICANN, or ICAN’T or IWON’T?

We're halfway into ICANN71, and early interactions are posing questions about ICANN Org's capability to carry out its mission to maintain an orderly domain name system (DNS). Or, if that's not the case, ICANN leadership seems bent on a hands-off approach to its oversight responsibilities to the DNS. For years now - years - the ICANN community has raised the volume level about acute issues -- a workable Whois management and access system (including clearly delineated controllership)... more

The G7 and EU Join China in Call for Space Debris and Collision Regulation

Last month, the Chinese government published space situational awareness and traffic management regulations and procedures designed to guard against collisions in orbit and mitigate space debris, and this month, at the G7 summit, delegates from Canada, France, Germany, Italy, Japan, the USA, the UK, and the EU pledged to take action to tackle the growing hazard of space debris as our planet's orbit becomes increasingly crowded. more

Phishing Scams: How to Spot Them and Stop Them

Phishing scams are nothing new in the online security world and show no signs of subsiding. The scam starts when a fraudster sends a communication purporting to originate from a trusted provider and encourages the recipient, often with a conveyed sense of urgency, to click a link. That link leads to a fake site, usually intended to collect confidential login credentials or other personal information. In similar scams, the mail may encourage the recipient to open an attachment loaded with malicious content. more

As DENIC’s CEO Jörg Schweiger Prepares to Step Down, He Speaks About His Time at DENIC

In January Jörg Schweiger, DENIC's CTO from 2007 to 2014 and CEO since 2014, announced he was stepping down from his position in December. It's been quite a ride, and the domain name industry has evolved quite a lot. So we asked Jörg a few questions about his time with DENIC and the changes he's seen... he came up with some insightful views on why he thought new TLDs missed a great opportunity to do something with "innovative new business models," the importance of security to DENIC... more

Chinese Space Situational Awareness and Traffic Management Regulations and Procedures

In a recent issue of the Dongfang Hour Newsletter, Blaine Curcio pointed out that China's powerful State Administration of Science, Technology, and Industry for National Defence (SASTIND) had published a notice intended to promote the orderly development of microsatellites and strengthen safety management. The notice defines microsatellites as being below 1,000 kilograms, which would include those making up China's planned GwoWang/SatNet broadband constellation. more

Big Cable Co’s Touting 10G – Really?

Earlier this year, at the CES show in January, the big cable companies discussed their vision for the future. They introduced the concept that cable networks would be able to deliver 10-gigabit broadband in the future. They labeled the promotion at the show as 10G. I didn't write about it at the time because I assumed this was a gimmick to give some buzz to this show in the middle of the pandemic. But lately, I've seen that they are still talking about the 10G initiative. more

Examining Real Examples of DNS Abuse: A Summary Overview of the 2nd DNS Abuse Forum

It was not without a little trepidation that I planned the 2nd DNS Abuse Institute Forum to focus on the long-standing and often contentious definitional issues surrounding DNS Abuse. While the risk of getting stuck in the usual entrenched positions was real, it seemed to me that we had an opportunity to provide some clarity and if not change minds, at least provide perspective. more

DNS Level Action to Address Abuses: New Tools for DNS Operators and Legislators

The ways in which the Internet is embedded in our daily lives are too varied and numerous to catalogue. The Internet delivers information, access to goods, services, education, banking, social interaction and, increasingly, work space. The global pandemic has only heightened our dependence on the online world, which is why efforts to ensure that the Internet remains a trusted and secure environment are more important than ever. more

A Digital Bill of Rights (& Responsibilities), Part 1: Why Do We Need It

Using the lingo of Internet Governance, the "stakeholders" of digital technologies currently live in a state of confusion about their rights and responsibilities in the digital age. Digital technologies confront us with many questions we thought had been answered long before. We have a pretty clear understanding of our rights and responsibilities as citizens of our country, how a state should be governed, and how the private sector should conduct its business. more

Privacy, Legal vs. Natural Persons, and the Never-Ending ICANN EPDP

It has been just over 3 years since the General Data Protection Regulation (GDPR) came into effect, and the work within ICANN (type "EPDP 2a" into your acronym decoder ring) to develop a permanent Registration Data policy is progressing at a snail's pace. At issue is a proposed mandatory requirement for Contracted Parties (really just Registrars), to differentiate between "legal persons" (a fancy way of saying corporations and similar organizations) and "natural persons" (the kind that eat and breathe and schedule Zoom calls). more

Topics

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Threat Intelligence

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days