Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Local “.city” TLDs as an Opportunity for City Portals

One of the most frequently asked question when it comes to the discussion about a city top-level domain ".city" (such as .london, .berlin or .nyc) is what .city means to the already established official city portal (such as London.gov.uk, Berlin.de, NYC.gov or in general City.com). This article contributes to the most important topics in this discussion... The choices at the top-level available to individuals, companies and regional communities is today limited to country codes (such as .de or .fr) and a very few generic endings (such as .com or .info). Individuals and companies in cities can't really identify with Internet addressing and look for ways to circumvent it. For instance, the term "hamburg" is already used in about 50,000 domains such as www.habour-hamburg.de demonstrably showing that they belong to the Hamburg community. The synonym "nyc" can be found in almost 300,000 domains... more

Three Things TLD Registries Must Know About China’s Domain Name Regulation

Recently there have been a number of news reports/articles that are incorrect or misleading in interpreting China's domain name management policy. James has posted an article aiming to clarify what is going to in China's domain name market. Considering the potential negative impact of those reports on the participants of this market, I supplement James's post by pointing out three things, which I believe critical for any TLD registries that hope to have a better understand of China's domain name regulation and the special action based on it. more

Net Neutrality: A Net-Head View

Net neutrality is a complex issue with some strongly opposed views that at times sound more like religion than sensible argument, so this article is an attempt to provide some sense for those still not completely sure what it is all about. Be warned though, that this article is not an unbiased appraisal of the arguments, it is written from the perspective of a confirmed net-head. more

“Globally, Internet Traffic Passes Through 13 Root Servers” (!)

The Times of India recently interviewed India's Minister of State for Communications and IT, Sachin Pilot, on Internet Governance. Titled "'Internet's governance can't be limited to one geography'", the article started off with an amazing assertion by the minister... While this interview is a fairly standard restatement of the position some Governments (including India) have about governmental control of Internet Governance, it is sadly apparent that the minister unfortunately doesn't appear to understand what the root servers are, or how they work. more

8 Security Considerations for IPv6 Deployment

Feb. 3, 2011, came and went without much fanfare, but it was a milestone for Internet stakeholders, whether they knew it or not. On that Thursday, the last available IPv4 addresses were allocated by the Internet Assigned Numbers Authority (IANA). Though some Regional Internet Registries (RIRs) have a reasonable inventory of IP addresses that could last another year or two, the days of "new" IPv4 address allocations are largely over. more

The Verisign Shared Registration System: A 25-Year Retrospective

Every day, there are tens of thousands of domain names registered across the globe -- often as a key first step in creating a unique online presence. Making that experience possible for Verisign-operated top-level domains (TLDs) like .com and .net is a powerful and flexible technology platform first introduced 25 years ago. more

Security Costs Money. So - Who Pays?

Computer security costs money. It costs more to develop secure software, and there's an ongoing maintenance cost to patch the remaining holes. Spending more time and money up front will likely result in lesser maintenance costs going forward, but too few companies do that. Besides, even very secure operating systems like Windows 10 and iOS have had security problems and hence require patching. (I just installed iOS 10.3.2 on my phone. It fixed about two dozen security holes.) more

UN Cyberdiplomcy I: PoC, Cybercrime and the Global Digital Compact

Despite global polarization, recent UN cyber diplomacy has achieved three significant agreements in 2024: a cyber attack reporting system, a convention against cybercrime, and a "Global Digital Compact." These successes show that consensus on global issues is possible, though the vague wording of agreements raises concerns about their long-term effectiveness in ensuring security and peace. more

Fifth Publication of the UN ICT Task Force Series

The following is the introductory excerpt from the United Nations ICT Task Force's recently published "Internet Governance: A Grand Collaboration". This publication offers a collection of works from the March 2004 meeting. more

Every Domainer Is Subsidizing Tasting… Abolish Registration Grace Period

One issue that a large number of domainers agree on is that domain tasting under the current ICANN-approved policy is bad for the industry. For one thing, a healthy portion of the practice involves trademark use that not only is illegal but also destroys value. Of course, particular segments of the domain name ecosystem can suffer value destruction because of tasting that doesn't infringe trademarks. But most criticism is directed, and rightly so, at tasting that raises trademark issues. Litigation over the trademark issues has done little to stop the practice and destroys value for trademark holders and domainers alike... more

Should the Government Prepare a Preemptive Cyber-Attack?

The House Committee on Science recently held a hearing to "examine the extent of U.S. vulnerability to cyber attacks on critical infrastructure such as utility systems, and what the federal government and private sector are doing, and should be doing, to prevent and prepare for such attacks." Specific issues addressed at the hearing included whether: 1) the U.S. is able to detect, respond to, and recover from cyber-attacks on critical infrastructure; and 2) is there a clear line of responsibility within the federal government to deal with cybersecurity... more

Understanding Broadband Oversubscription

It's common to hear that oversubscription is the cause of slow broadband -- but what does that mean? Oversubscription comes into play in any network when the aggregate subscribed customer demand is greater than the available bandwidth. The easiest way to understand the concept is with an example. Consider a passive optical fiber network where up to 32 homes share the same neighborhood fiber. more

To Serve the Public Interest You First Have to Define ‘Public Interest’

In the ancient parable, six blind men are asked to describe an elephant, with each coming up with wildly different answers, depending on which part of the animal they touched. Now, while I would hesitate to call participants in the ICANN process "blind men," I am starting to think that "public interest" is their elephant. ICANN is on the threshold of completing its first major obligation under the Affirmation of Commitments it signed with the U.S. Government in 2009. more

Time to Play Offense

The United States is under cyber-attack. An article in Time magazine titled "The Invasion of the Chinese Cyberspies" discusses a computer-network security official for Sandia National Laboratories who had been "tirelessly pursuing a group of suspected Chinese cyberspies all over the world." The article notes that the cyberespionage ring, known to US investigators as Titan Rain, has been "penetrating secure computer networks at the country's most sensitive military bases, defense contractors and aerospace companies." more

New Trend: Vanity IPv6 Addresses

It's like a vanity license plate, but for your IP address. Previously under IPv4 DNS registration, users were limited to only using numbers. However, with the height of IPv6 underway users are getting creative with their newfound use of characters. Although you can only use characters A-F, it only takes a little creativity to find ways around this. more

Topics

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

DNS Security

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days