Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Where Did “Data Shadow” Come From?

Anyone who works in privacy is familiar with the term "data shadow": the digital record created by our transactions, our travels, our online activities. But where did the phrase come from? Who used it first? A number of authors have attributed it to Alan Westin, whose seminal book Privacy and Freedom (largely a report on the work of the Committee on Science and Law of the Association of the Bar of the City of New York) set the stage for most modern discussions of privacy.  more

New Registry Agreement, All Good?

In the run-up to the launch of new gTLDs, ICANN has been negotiating both of its main supplier contracts. The registrar contract (Registrar Accreditation Agreement or RAA) negotiations are now all but complete. A new contract draft has been posted for public comment and it now seems likely that in little over a month, this will become the official new 2013 RAA. more

New Hair-Like Plastic Polymer Cable Can Transmit Data Ten Times Faster Than Copper

Scientists and engineers are always looking for ways to speed up and more efficiently configure computing devices to maximize data flow. There are a lot of applications today that require the exchange of huge volumes of data in real-time. MIT scientists have created a hair-like plastic polymer cable that can transmit data ten times faster than copper USB cables. more

New gTLDs: Floodgates for Spammers?

Ever since I heard of the new generic Top-Level Domains (gTLDs), I wondered whether they would be prone to abuse. For example, Microsoft might want to register www.microsoft.microsoft, or Sony might want to register www.sony. But isn't this opening up the floodgates for spammers to register their own domains and squat on them? Why couldn't a spammer register www.cit.ibank? They could then send phishing messages and fool people into clicking very legitimate looking domains. But I don't think this will be a problem. more

New gTLDs Differentiation: Do Good

Congratulations! The Internet Corporation for Assigned Names and Numbers (ICANN) has approved your application for a new generic top-level domain (gTLD) extension. Now what? ...This essay focuses on how to differentiate by being socially responsible. more

Removing Principle of Confidentiality in ICANN’s NomCom is a Bad Idea

In its informal background paper "Applying the Highest Standard of Corporate Governance" (August 2011) the European Commission proposes to revise the procedures of ICANNs Nominating Committee (NomCom). Instead of the confidential treatment of applicants the EU calls for an open publication of "a full list of candidates". Is this a good idea? I don't think so. The rationale behind the EU proposal is "to improve confidence on the selection procedure" and "to avoid conflict of interests". But the proposed improvement is based on a wrong assumption... more

IPv6 and Formula One Racing

The Telecom World converged in greater numbers than ever before on Barcelona last week for the annual Mobile World Congress (MWC). This years' motto: Redefining Mobile. To see one of the worlds' leading automotive industry executives, Ford Motor's Bill Ford Jr. delivering a keynote was yet another illustration of the growing osmosis between Telecommunications and other industry verticals. more

ICANN and Legalities

Bret Fausett points to two lawsuits against VeriSign and ICANN for violating U.S. anti-trust laws. They state the obvious: VeriSign and ICANN made an agreement that is to the large financial benefit of the two corporations and the financial detriment of nearly everyone else. The proposed contract is absurd, but so is ICANN's request that people comment on it before ICANN approves it. Anyone familiar with legal negotiations could see that there is no room for significant negotiation on the part of ICANN. more

Thoughts on IPv6 Security, Take Two

A few months ago, I made a post about IPv6 security. I've caught some flak for saying that IPv6 isn't a security issue. I still stand by this position. This is not to say that you should ignore security considerations when deploying IPv6. All I claim is that deploying IPv6 in and of itself does not make an organization any more or less secure. This point was made by Dr. Joe St. Sauver, of the University of Oregon... more

IGF 13 & Paris Peace Forum: Europe Should Take Lead in Shaping a “New Deal” on Internet Governance

The development of the Internet has arrived at a new Crossroads. The growing Internet Governance complexity is leading also to a higher level of confusion on how the digital future should be shaped. The French president Emanuel Macron and UN Secretary General Antonio Guterres will open both the Paris Peace Forum and the 13th IGF where Internet Governance is a key issue. Is the time ripe for a "New Deal" on Internet Governance? And which stakeholder should bear the primary responsibility for the normative framing of the key challenges internet governance is facing? more

Does Bell Really Have a P2P Bandwidth Problem?

Bell filed its response to the Canadian Association Of Internet Providers (CAIP) submission to the Canadian Radio-television and Telecommunications Commission (CRTC) on its throttling practices yesterday, unsurprisingly arguing that its actions are justified and that there is no need to deal with the issue on an emergency basis. Several points stand out from the submission including its non-response to the privacy concerns with deep-packet inspection... and its inference that P2P usage could be deemed using a connection as a "server" and therefore outside the boundaries of "fair and proportionate use" under typical ISP terms of use. more

Mistrust of ICANN Is Fully Vindicated

Recently, I have been reporting on a highly questionable auction scheme for a single domain name, o.com, which is currently being improperly warehoused by ICANN along with a number of other .com and .net domain names. This violates ICANN's Bylaws -- but, so what? more

Cuba’s Mobile-Internet Strategy?

This post is speculative, but I think Cuba may use satellite for 3G backhaul and, when the technologies are ready, leapfrog over 4G to 5G mobile connectivity and next-generation satellite. ETECSA began rolling out 3G connectivity for Cubans about a year ago and a few things have led me to believe they will continue... But, could they provide widespread 3G mobile? Doing so would require more base stations and more backhaul from those base stations to the Intenet. more

Learning in a Multistakeholder Environment: 15 Years of Summer School on Internet Governance

The 15th edition of the European Summer School on Internet Governance (EuroSSIG) took place recently in Meissen/Germany, from August 15 -20, 2021. It was the second hybrid meeting under the challenging condition of the pandemic. Eighteen fellows from 15 countries representing all regions of the world traveled to Germany, as well as five faculty members. Fifteen faculty members joined via Zoom from California to Beijing. The agenda of the one-week course included a broad range of topics such as cybersecurity, digital diplomacy, IGF+, DNS Abuse, human rights, digital trade and taxation, as well as artificial intelligence. more

Big Data Stress? Go Zen With These 5 Technologies

The promise of "big data" -- real-time insights, predictive analytics and a better understanding of customer behaviors -- has many companies jumping into this near-bottomless information pool with both feet. But the sheer volume of data can cause serious stress for IT professionals trying to balance C-suite expectations, legacy tech limitations and corporate workloads. What's more, the data market is rapidly evolving. more

Topics

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days