Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

New gTLDs and Their Hidden Costs: Part 2

In my last post I discussed some questions that remain about ICANN's generic Top-level Domain (gTLD) budget. Today I discuss the rights protections mechanisms as they currently appear. An economic study commissioned ICANN to analyze the new gTLD process recently concluded that "the biggest likely costs" of approving new gTLDs are "consumer confusion and trademark protection." more

Are Botnets Run by Spy Agencies?

A recent story today about discussions for an official defense Botnet in the USA prompted me to post a question I've been asking for the last year. Are some of the world's botnets secretly run by intelligence agencies, and if not, why not? Some estimates suggest that up to 1/3 of PCs are secretly part of a botnet. The main use of botnets is sending spam, but they are also used for DDOS extortion attacks and presumably other nasty things like identity theft. But consider this... more

Egypt’s Internet Blocked - I Call on My Friend Tarek Kamel to Unblock It and Join His People

Internet all over Egypt has been blocked in an unprecedented revolt. I call on my friend Tarek Kamel, Egypt's Minister of Telecommunication, to overturn this oppressive decision and to unblock the Internet in all Egypt immediately and to join his people in their peaceful revolt. I have known Tarek Kamel for more than a decade and long before he became minister back in the days when he used to say he had no authority and that the decisions were in the hands of his boss and that he was a mere decision-less adviser to then Minister of Telecommunication, Mr. Nazif. more

End of Domain Name Auction Sites

Having eBay has worked out pretty well for the world at large; now it's time for the world of domain names to start using it. We need to throw away the jumble of different auctions and dealer sites. Speculators may not like having their haunts cleaned out, but corporate (end-user) buyers and investors will welcome the chance to deal with one centralized auction mechanism with one set of rules. more

The DNS Still Isn’t a Directory

Back in the mid 1990s, before ICANN was invented, a lot of people assumed that the way you would find stuff on the Internet would be through the Domain Name System. It wasn't a ridiculous idea at the time. The most popular way to look for stuff was through manually managed directories like Yahoo's, but they couldn't keep up with the rapidly growing World Wide Web. Search engines had been around since 1994, but they were either underpowered and missed a lot of stuff, or else produced a blizzard of marginally relevant results. more

Who Contacts Whom: A Material Factor in Selling Domain Names Corresponding to Trademarks

Acquiring domain names for the purpose of selling them to complainants is the second most heavily invoked of the four circumstances that are evidence of abusive registration. Because no self-respecting domain name reseller will ever admit to acquiring domain names "primarily for the purpose" of selling them to complainants "for valuable consideration in excess of [their] documented out-of-pocket costs directly related to the domain name" evidence of bad faith is typically deduced by other factors. more

Universal Acceptance of All TLDs Now!

Universal acceptance of top level domains hasn't really meant much to most Internet users up until now. As long as .COM was basically the default TLD, there wasn't much of an issue. No longer. With 263 delegated strings (according to ICANN's May 12, 2014 statistics) adding to the existing 22 gTLDs that were already live on the net after the 2004 round of Internet namespace expansion, the problem of universal acceptance gets very real. more

From Connecting Computers to Connecting Stakeholders: Stanford Univ. Hosts NetMundial Initiative

1974, Bob Kahn and Vint Cerf checked in the Crown Plaza Hotel in Palo Alto, worked a couple of days and presented to the world the TCP/IP protocol. Stanford hosted one of the four computers connected on equal footing (ARPANET) in 1969... A framed document in the hotel lobby remembers the historic moment. On March 31, 2014 a crowd of about 30 people from all over the world checked in the same Crown Plaza hotel for the first working meeting of the new Coordination Council (CC) of the NetMundial Initiative (NMI). more

IPv6 and DNSSEC Are Respectively 20 and 19 Years Old. Same Fight and Challenges?

A few weeks ago I came across an old interview of me by ITespresso.fr from 10 years back entitled "IPv6 frees human imagination". At the time, I was talking about the contributions IPv6 was expected to make and the challenges it had to face. After reading the article again, I realized that it has become a little dusty (plus a blurred photo of the interviewee :-)). But what caught my attention the most in the interview was my assertion: "If IPv6 does not prevail in 2006, it's a safe bet that it will happen in 2007". Wow! more

Canada Emerging at the Forefront of LTE

Canada has made impressive progress in mobile broadband deployment in recent months. This is partly due to operators needing to arrest falls in revenue from mobile voice services by buttressing their data capabilities, as also by the stimulus to the market introduced through the auction of Advanced Wireless Services spectrum in 2008. This auction overhauled the wireless market, introducing a number of smaller players which have added to the competitive mix as well as furthered the development of LTE. more

IPv6 for the Rest of Us

IPv6 deployment is in a chicken and egg situation. On the one hand, there is no willingness from ISPs and commodity DNS router manufacturers to include IPv6 support in their infrastructure or equipment because "there is no demand". On the other hand, there is no demand because the average Joe Blow could not care less if he accesses a web site under IPv4 or IPv6. It should just work. The equipment and infrastructure should adapt transparently... What we users can do is to stop waiting for the industry to get its act together and work around its limitations... more

Internet Management and National Security: Time for a Federal Action Plan

Former CIA Director George Tenet recently gave a speech highlighting the need for federal action on internet management in order to protect national security. As reported by the online edition of Government Executive, Mr. Tenet explained that, "greater government regulation of the Internet and telecommunications networks is needed in order to guard against terrorist attacks." more

The Hidden World of Undersea Fiber

Since the first undersea cable was completed in 1858 to deliver telegraph messages between the US and England, we've had an extensive network of undersea cable networks that enable communications between continents. Earlier this year there were 378 undersea fiber cables in place that stretch over 745,000 miles. Here's an interactive map that shows all of the cables... What's most intriguing about the map is that there are a few cities around the world where numerous cables terminate. more

What’s in a Name?

What's the difference between .local and .here? Or between .onion and .apple? All four of these labels are capable of being represented in the Internet's Domain Name System as a generic Top Level Domains (gTLDs), but only two of these are in fact delegated names. The other two, .local and .onion not only don't exist in the delegated name space, but by virtue of a registration in the IANA's Special Use Domain Name registry, these names cannot exist in the conventional delegated domain name space. more

Private vs. ICANN Auction of Last Resort

As an applicant in this new gTLD round with quite a few overlapping strings, I've had a keen interest in the various proposed auction platforms. In the past six months the ideas behind private auction have matured significantly and I now see it as a strong mechanism for resolving contention. Following are my observations. more

Topics

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days