Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Are Domain Names Recession-Proof? Probably Not, Next Question?

I didn't see the Fortune article Are domain names recession proof until the weekend, and being the author of the now infamous Domain aftermarket overdue for an asset repricing last year I feel somewhat obligated to comment on it. So, how will domain names fare in a recession? The Fortune article was upbeat... more

Email Recommendation Engine for ESPs – Text Length Optimization (Part II)

Popular email editors today have no way to optimize for text length. An email marketer may attempt to build her content but has no idea whether that content is optimized related to word count for a specific industry/client. As it relates only to text length, does the email have too many or too few words. Currently, there is no built-in predictive model to inform her. Well, until now. Last month we described an evolutionary real-time data-driven process for email campaign builders to have at their disposal. more

Who Is Really Behind the Plan to Block .Web?

In May of this year, I questioned whether the continued legal maneuvering of a company called Altanovo Domains Ltd. (Altanovo) could further delay the launch of .web. After reading its second Independent Review Process (IRP) complaint, and ICANN's response, it seems that the unfortunate answer is a resounding "yes," or at least that is Altanovo's intent. more

Enterprise Domain Stargazing: Understanding Your Company’s Galaxy of Domains

In CSC's recent insight paper, we address the trend that many business leaders today don't realize the extent to which their modern enterprise -- and its millions of digital assets -- rely on. It's a vast domain ecosystem that needs to be protected from online threats. Often, to better understand this need for domain security, we need to understand how critical and interconnected domains are within a business. more

Facebook vs. Domain Names: Lessons from Cambridge Analytica

The current revelations about Cambridge Analytica's use of Facebook data illustrate an important drawback to using a Facebook account as your business' online presence: Facebook knows and sells your customers! Millions of companies - especially small companies and start-ups - rely on a Facebook account for their online presence. On the surface, it seems like a great idea... more

Searching for Truth in DKIM: Part 3 of 5

Last year, MAAWG published a white paper titled Trust in Email Begins with Authentication [PDF], which explains that authentication (DKIM) is “[a] safe means of identifying a participant-such as an author or an operator of an email service” while reputation is a “means of assessing their trustworthiness.”

 more

ICANN and Attorneys General: Ends, Means and Unintended Ends

In a move, unprecedented in scale, ISOC moved to sell PIR, the registry for .ORG, to a for-profit entity which intends, in turn, to convert PIR into a for-profit entity itself. This move has, understandably, raised concerns from around the Internet community and cast a bright light on ICANN, the nature of its contracts with Registries and the responsibilities of the ICANN Board... As the Vice Chair for Policy of the At-Large Advisory Committee (ALAC), I've tried to navigate a consensus involving ALL of those parties because of our diverse membership. more

Where Did “Data Shadow” Come From?

Anyone who works in privacy is familiar with the term "data shadow": the digital record created by our transactions, our travels, our online activities. But where did the phrase come from? Who used it first? A number of authors have attributed it to Alan Westin, whose seminal book Privacy and Freedom (largely a report on the work of the Committee on Science and Law of the Association of the Bar of the City of New York) set the stage for most modern discussions of privacy.  more

Information Protection for the Domain Name System: Encryption and Minimization

In previous posts in this series, I've discussed a number of applications of cryptography to the DNS, many of them related to the Domain Name System Security Extensions (DNSSEC). In this final blog post, I'll turn attention to another application that may appear at first to be the most natural, though as it turns out, may not always be the most necessary: DNS encryption. (I've also written about DNS encryption as well as minimization in a separate post on DNS information protection.) more

Flushing the ‘Net Down the Tubes

Doc Searls has written a brilliant piece framing the battle for the 'Net at Linux Journal. The piece is long, but if you take the time to read just one essay on the 'Net and the politics surround it this year, read this one. If you're involved in public policy, it's especially important that you take the time to understand what's at stake here. One of Doc's main points: we haven't framed the conversation correctly and our poor choice of words makes the argument seem overly technical and arcane when it's really about freedom, markets, and innovation. more

Powell Warns Net Neutrologists Not to Be Naive

Just got this email reporting the speech made by former FCC Chairman @ F2C organized by David Isenberg. "Former FCC chairman Michael Powell is up on the stage at the Freedom to Connect conference right now, and he warns the tech elite crowd here not to be naive about the dangers of asking Congress for legislation on Net Neutrality. As he explains..." more

Google: Not All ccTLD’s Are Created Equally in Generic Search Rankings

There is a very interesting video posted on YouTube.com from Matt Cutts of Google who answered the question about how ccTLD's are viewed by Google especially when they are being used as domain hacks. Here is the question: "We have a vanity domain (http://ran.ge) that unfortunately isn't one of the generic TLDs, which means we can't set our geographic target in Webmaster Tools. Is there any way to still target our proper location?" more

Huawei’s Very Red World

The map below shows countries working with Huawei 5G in red and pink. As can be seen, Huawei is doing very well in 5G, although it's not as dominant as the colors here suggest. Ericsson is actually close to Huawei in 5G revenue, aided by the ban in the US and Australia. Years ago, Huawei was the price leader in order to break into the European market. more

Making IDN gTLDs Attractive and Safe

The primary focus of this article is to illustrate that the Applicant Guidebook is not supplying sufficient protection mechanisms, and creates too high financial barrier for those who are interested in applying for multiple Top-Level Domains (TLDs) that are translations/transliterations of each other and/or of an existing generic Top-Level Domains (tt-gTLDs). more

Gruber Gives Up On His IDN

Tech pundit John Gruber threw in the towel on his domain ?df.ws. He writes: "What I didn't foresee was the tremendous amount of software out there that does not properly parse non-ASCII characters in URLs, particularly IDN domain names." more

Topics

Cybersecurity

Sponsored byVerisign

DNS Security

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days