Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

IGP Asks You to Weigh in on the USG’s .xxx Intervention

Responding to the .xxx intervention by the US Commerce Department, the Internet Governance Project has produced a "STATEMENT OPPOSING POLITICAL INTERVENTION IN THE INTERNET'S CORE TECHNICAL ADMINISTRATIVE FUNCTIONS." You can view the statement here and add your name as a signatory at the bottom. Over 60 people have endorsed it. The Statement claims that "The NTIA's recent intervention in the .xxx proceeding undermines assurances" that the U.S. government's special unilateral authority over ICANN "would never be used to shape policy but was only a means of protecting the stability of the organization and its processes." The NTIA's open acknowledgment of the influence of religious groups made the intervention particularly dangerous. more

7 Key Questions to Ask When Choosing a Domain Name Extension

In the last three years, almost 1,000 new generic top-level domains (new gTLDs) have entered the market, increasing the previous 22 options for generic domain name extensions, like .com, .net and .org, by almost 5,000 percent. While expanded choice can be good for consumers, small businesses and website owners may be overwhelmed by the many different options and have a lot of questions about which domain extension is right for them or their brand. Recently I spoke with editors at WIRED about what their readers should ask themselves when determining how to choose the right domain name and it came down to the following seven key questions. more

Where Do Old Protocols Go To Die?

In Ripley Scott's classic 1982 science fiction film Blade Runner, replicant Roy Batty (portrayed by Rutger Hauer) delivers this soliloquy... "I've...seen things you people wouldn't believe... Attack ships on fire off the shoulder of Orion. I watched C-beams glitter in the dark near the Tannhäuser Gate. All those... moments... will be lost in time, like (cough) tears... in... rain. Time... to die." more

Clueless About Cloud Computing

The European Union's cloud computing strategy couldn't come at a better time as the region lags behind the rest of the world when it comes to cloud computing usage. The EU announced its cloud computing strategy last month and is optimistic it will create new jobs and help boost a struggling economy. An information campaign is necessary if the EU is to overturn the misunderstanding and general lack of knowledge about the cloud. more

Blockchain, Cryptocurrency Channels Considered by European Interests to Bypass U.S. Sanctions

Bitcoin's unreal hype has obscured that it is mostly used to facilitate drug deals, ransomware, tax evasion, and even the occasional murder for hire. After the 60% price drop, demand for bitcoin mining gear has fallen so much TSMC has to lower sales estimates for 2018... Now, Austrian Ambassador in Tehran Stefan Scholz has suggested it could be a powerful boost to the European intent to bypass the U.S. economic blockade. That could provide demand for $billions of bitcoins. more

Overture to Take Over Internet Governance: ITU at ICANN Meeting, Cairo

ITU is 143 years old and it has done a lot of good work. But it is so huge and powerful that it has been monopolizing (or mono-unionizing) Telecommunications for the last 143 years. ITU's hold over communications has been sweeping. But during the last ten years, ITU's member Telcos have seen several challenges from the open Internet architecture... ITU and the Internet organizations did not quite get along for this and several other reasons Especially the ITU has had its share of differences with the ICANN. Dr. Hamadoun Toure, Secretary General of the ITU addressed the ICANN Annual Meeting at Cairo on 6 November 2008. Here are some excerpts from the Secretary General's speech with my comments. more

Berlin the Latest New TLD Battleground?

If you've been following the new Top-Level Domain (TLD) process within ICANN over the last year or so you will have probably been aware of how slow and tortuous development has been. To recap, ICANN, which oversees domain names globally, announced that it was "opening up" the internet so that "anyone" could get the domain extension they wanted. Of course it's not really "everyone" and the process to date has been far from smooth. more

.EU TLD Comes Closer Than Ever to Becoming a Reality

With much awaited fanfare, .EU is inching ever closer to becoming real! I am a bit reluctant to say it is actually here until the gates are actually open, but I can imagine that there are many who are grateful as I am that the process has gotten as far as it has. On March 23rd, 2005, ICANN announced that they had approved an agreement earlier that week with EURid to have .eu added to the root zone... more

How to Listen to the Individual Internet User

The recent ICANN meeting in Vancouver touched upon many issues important to ordinary Internet users: privacy in domain name registration; the cost and terms of .com domain names; internationalized domains; introduction of new domain suffixes. But there were few "ordinary Internet users" at the meeting. Few people can roam the globe to keep up with ICANN's travels, and not many more participate in online forums. more

Network Neutrality and the FCC’s Inability to Calibrate Regulation of Convergent Operators

For administrative convenience and not as required by law, the FCC likes to apply an either/or single regulatory classification to convergent operators. Having classified ISPs as information service providers, the Commission unsuccessfully sought to sanction Comcast's meddling with subscribers' peer-to-peer traffic. Now Chairman Genachowski wants to further narrow and nuance regulatory oversight without changing the organic information service classification. more

Yahoo Addresses a Security Problem by Breaking Every Mailing List in the World

DMARC is what one might call an emerging e-mail security scheme. It's emerging pretty fast, since many of the largest mail systems in the world have already implemented it, including Gmail, Hotmail/MSN/Outlook, Comcast, and Yahoo. DMARC lets a domain owner make assertions about mail that has their domain in the address on the 'From:' line. It lets the owner assert that mail will have a DKIM signature with the same domain, or an envelope return (bounce) address in the same domain that will pass SPF validation. more

How Registrants Can Reduce the Threat of Domain Hijacking

Because domain names represent the online identity of individuals, businesses and other organizations, companies and organizations large and small have expressed increasing concern over reports of "domain name hijacking," in which perpetrators fraudulently transfer domain names by password theft or social engineering. The impact of these attacks can be significant, as hijackers are typically able to gain complete control of a victim's domain name - often for a significant period of time. more

What is WSIS Getting At?

Attacks on ICANN are coming from several different directions, and the list of concerns includes "cybercrime and protection of intellectual property rights."... First, it's not apparent to me that any government can "control" the internet -- and it's even less likely that that control can happen through the DNS. The most that governments will do will be to build walls between nations, requiring their ISPs to point only to approved sites. (China is well on its way to doing this already.) That's not controlling the Internet, that's creating different, national Internets. more

Why App Stores Won’t Survive

The recent news that online retailing giant Amazon.com would open an app store to compete with Google's Android Market has set off a flurry of speculation about the future app store landscape. Within the next few months there will be no fewer than three major Android app stores... Several other major players have announced app store intentions though specifics are lacking. And of course, there are existing independent app stores that publish Android apps, such as GetJar, SlideMe and Appbrain. more

Google Chrome: Cloud Operating Environment

Rather than blathering on to the blogosphere about the superficial features of Google's new Chrome browser I've spent some time studying the available material and [re]writing a comprehensive Wikipedia article on the subject which I intend for anyone to be free to reuse under a Creative Commons Attribution 3.0 license rather than Wikipedia's usual strong copyleft GNU Free Documentation License (GFDL). This unusual freedom is extended in order to foster learning and critical analysis, particularly in terms of security. more

Topics

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

Threat Intelligence

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days