Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

TeleGeography’s Interactive Submarine Cable Map Is a Fun and Fascinating View Into Infrastructure

Ever want to know where all the submarine cables are that provide part of the physical infrastructure of the Internet? Or which cities in the world have the most connectivity via submarine cables? (or which regions might be single points of failure?) In doing some research I stumbled across this excellent site from the folks at TeleGeography... It is a very well done and captivating (to me, anyway) view into where all the current and planned submarine cables are located. more

Oh, Those Wild and Crazy New TLDs

Among the many issues affecting ICANN's thousand new TLDs is collisions, that is, the same name already used elsewhere. The other uses are non-standard and unofficial, but some names turn out to have been used a lot. One approach to see how bad the collisions are is controlled interruption, in which the TLD publishes wildcard records with obvious impossible values, in the hope that systems that use colliding names see them and do something about it. more

Revisiting Reverse Domain Name Hijacking

The conduct that reverse domain name hijacking (RDNH) was crafted to punish is "using the [Uniform Domain Name Dispute Resolution Policy] in bad faith to attempt to deprive a registered domain-name holder of a domain name." There are several variations ranging from the plain vanilla, claims that should never have been brought – mark owners whose rights postdate the registration of the challenged domain name as in Vudu, Inc. v. WhoisGuard, Inc. / K Blacklock, D2019-2247... more

The ETNO Proposal: Unintended Consequences

In the run up to the WCIT negotiations in December, the most talked about proposed change to the ITRs (International Telecommunications Regulations) is the ETNO proposal... Much of the discussion has focused on how this would deter innovation, hamper start-ups and make Internet access much more expensive. Overlooked thus far are the unintended consequences of how this proposal will affect the Content Distribution Network (CDN) industry while simultaneously making cybercrime much easier. more

DCA Open Letter to Congress in Defense of the Status Quo on Global Internet Governance Model

As spearhead of the Yes2DotAfrica Campaign, I recently wrote a letter on behalf of DCA, to the Chairman of the United States Senate Committee on Commerce, Science & Transportation, Senator Jay Rockefeller which was also copied to other U.S. leaders and officials to express support for the present status quo on Global Internet Goverenance and a Reaffirmation of the Mult-stakeholder model. The full text of the letter is published in this post. more

Verisign iDefense Analysis of XcodeGhost

At Verisign we take our Internet stewardship mission very seriously, so when details emerged over the past week concerning the XcodeGhost infection, researchers at Verisign iDefense wanted to help advance community research efforts related to the XcodeGhost issue, and leveraging our unique capabilities, offer a level of public service to help readers determine their current and historical level of exposure to the infection. more

Book Review: Forks in the Digital Road - Key Decisions in the History of the Internet

At first glance, this book looks like another history of the Internet, but it is much, much more. The authors use their engineering and scholarly understanding of what constitutes Internet history to identify forks in the digital road and key past decisions that shaped the Internet's path. The first part of the book maps out the core technical and policy decisions that created the Internet.  more

The Federal Cybersecurity Regulation Already in Place

While Congress and the White House deliberate possible actions on FISMA reform and increased oversight of critical infrastructure, relatively little attention is being given to the government-wide cybersecurity regulation already in place, the Data Quality Act (DQA). Unlike FISMA, which primarily governs the government's internal cybersecurity processes, and contemplated legislation and/or Executive Order(s), which would likely also include a focus on critical infrastructure protection, the DQA contains a unique mandate. more

New TLD Application Window Opens Tomorrow - What Does It Mean? (Here are Answers to Some Basic FAQs)

Tomorrow, January 12th 2012 ICANN will open the application window for new TLDs. This post includes answers to some of the based frequently asked questions. If you have any other questions/queries, or if something is unclear please let me know via the comment at the end of the post. more

ICANN Culls Three More Domain Name Registrars

ICANN has announced that three more domain name registrars have lost their accreditation due to non-compliance with the RAA. The three registrars have been informed that their agreements with ICANN will not be renewed. South American Domains (NameFrog), Simply Named and Tahoe Domains have been sent letters by ICANN outlining the decision and the reasons for it. So what now? more

Privacy and Trust Go Hand-In-Hand

A few days ago, Eric Goldman wrote an interesting thinkpiece in CircleID regarding users' feeling about privacy. He seems to conclude that the existent regulations and policies on the matter are unnecessary, since Privacy doesn't "really" matters to the consumer. Eric based his argumentation on a number of surveys, stating that, even when the user expresses concerns about their privacy, on line behavior shows a different reality. We don't want to discuss here the soundness of surveys as a reliable source of information, but the author could be assuming too much in his analysis. more

How to .DOWNLOAD Banging Tunes, Sick Movies and Nasty Apps

TeenSpeak is being rivalled by GeekSpeak: most Internet Geeks know what "the cloud" is. They know because they are "Internet Geeks", most Internet users don't profess to the same level of 'Geekdom'. Now while I don't claim to be an Internet Geek, I do like to think of myself as an educated Internet user; and the way I think of "the Cloud" is of a computer, plugged in somewhere, and holding lots of "computer things" for the use of anyone, anywhere. You may have heard the expression: "it is hosted in the cloud". more

Africa vs. Africa: The GAC Early Warnings on New gTLD Applications Indicate an Africa Divided

Last week, the much-anticipated Governmental Advisory Committee (GAC) Early Warnings on new gTLD applications were finally issued. And the GAC didn't disappoint. A total of 242 warnings were issued on 163 strings (including 31 strings applied for by Radix). The GAC warnings yet again show that Africa is perfectly capable of being at the top of league tables -- for the wrong reasons. more

Dot-Biz Saga

Two sides can oppose each other strenuously and still be wrong in exactly the same way. For or against, too much of the debate about the new ICANN top-level domains (TLDs) ignores TLD signaling and uses inappropriate TLD success measures. Here I spotlight the key mistakes by concentrating on ".biz" registrations, and I put forward some possible remedies. more

The UN Panel on Digital Cooperation: An Agenda for the 2020s

The UN Panel on Digital Cooperation presented last week in New York its final report, and an old question is back on the international agenda: Could the global Internet be ordered by a reasonable arrangement among stakeholders which would maximize the digital opportunities and minimize the cyber risks by keeping the network free, open and safe? more

Topics

DNS Security

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days