Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Rent vs. Buy: The Driver of Economics

We the people like to own stuff and not pay rent to use it (BTW, rent includes taxes but that's another story). They the oligarchs like to own the stuff and charge us rent to use it. The rise of a middle class has historically meant the rise of a property-owning class. The underclass pays exorbitant rents. The telecommunications world -- or at least the US part of it -- is a battle of rent vs. buy. Economics says that ownership or rentership is all based on access to capital. Certainly capital is a huge part of the equation -- can you spell "home loan"?; but it's not the whole story... more

Chinese Hackers and Cyber Realpolitik

For many people the comments made by Michael Hayden, Former Director of the Central Intelligence Agency, at this week's Black Hat Technical Security Conference in Abu Dhabi may have been unsettling as he commented upon the state of Chinese cyber espionage. I appreciate the candor of his observations and the distinction he made between state-level motivations. In particular, his comment... more

Old Dog, New Tricks: Gift Card Scams in Social Networks

In the past few months, a flurry of gift card scams leveraging such high-profile brands as Best Buy, Whole Foods and IKEA have emerged on Facebook. These scams often use the brand's logo, website URL, or general "look and feel" on Facebook "fan" pages to give the impression that these offers are legitimate. Some scams are even bold enough to include bogus, non-interactive fan comments to add a greater sense of authenticity to the gift card offer. To date, these scams have been successful at tricking tens of thousands of consumers. In just one day, for example, a fan page titled "IKEA Get a FREE $1000 IKEA Gift Card! (ONLY AVAILABLE 1 DAY)" registered 40,000 fans before being shut down. more

Whither .XXX?

What's going to happen this week on .XXX? Nairobi is the first public board meeting since the independent review panel's nonbinding declaration in February that ICANN acted against its own rules in refusing to go ahead with .XXX. Reports that ICANN is going to 'do something' about .XXX have gone around the world via BBC news, and even surfaced on the radio in rural Ireland. The ICM team are out in force here in Nairobi, and there is endless speculation about what will happen at the Board's meeting on Friday. more

The Results of the ICANN Bingo Are In!

A few early technical hiccups with the system streaming it live did not prevent ICANN's prioritization draw from running smoothly yesterday, December 17, 2012. All 1917 remaining applications (out of initial 1930 announced last June) were processed in one of the meeting rooms at the Los Angeles Airport Hilton, starting at 13:00 local time. Shortly before midnight, or more than 10 hours later, Google's Dot MBA was the last application to be pulled out of the box. more

Value or Love for New gTLDs?

ICANN has started its historic and controversial program to expand the number of generic Top-Level Domains (gTLDs). This essay outlines the factors needed for the program to create economic value, warns against a cognitive trap that complicates selection of a new gTLD and considers the value contribution of the registries. I will not go into relevant macro measures, but I examine the problems associated with the popular measure of simply counting the number of registrations. more

Fragment or Not Fragment – Is This the Question? Will the “One World-One Internet” Survive Today’s Geopolitical Stress Tests?

In today's world, it has become axiomatic that drastic change can occur overnight. One of those cherished concepts at risk is the idea of "One World – One Internet." In the wake of the war in Ukraine, the geopolitical tensions on the existing Internet have increased. If the "One Internet" will survive the 2020s is increasingly an open question, as good, bad, and not-very-helpful intentions strive to pull it apart. more

A DNS View of Lockdown

At NANOG 79 earlier this month Craig Labowitz from Nokia Deepfield presented on the impact on the COVID-19 pandemic on Internet use. The approach to the analysis used real-time streaming telemetry from Communication Service Provider (CSP) backbone and aggregation routers, and the data analysis covered content provider networks in North America, Europe and parts of Asia. more

Top Ten New gTLD Gotchas

With the launch of new generic Top-Level Domains (gTLDs) expected to occur early next year, many are closely examining the opportunities and risks associated with ICANN's Program. Although still in draft format and subject to change, keep these gotchas in mind as you think through your strategy. more

Next Steps in Preparing for Post-Quantum DNSSEC

In 2021, we discussed a potential future shift from established public-key algorithms to so-called "post-quantum" algorithms, which may help protect sensitive information after the advent of quantum computers. We also shared some of our initial research on how to apply these algorithms to the Domain Name System Security Extensions, or DNSSEC. In the time since that blog post, we've continued to explore ways to address the potential operational impact of post-quantum algorithms on DNSSEC, while also closely tracking industry research and advances in this area. more

What’s So Outrageous Asking High Prices for Domain Names?

Panels appointed to hear and decide disputes under the Uniform Domain Name Dispute Resolution Policy (UDRP) have long recognized that three letter domains are valuable assets. How investors value their domains depends in part on market conditions. Ordinarily (and for good reason) Panels do not wade into pricing because it is not a factor on its own in determining bad faith. more

FedRAMP: Critical to Cost-Effective Cloud Computing Cybersecurity

In September 2009, the Obama Administration announced the Federal Cloud Computing Initiative. As the government's CIO explained, cloud computing "has the potential to greatly reduce waste, increase data center efficiency and utilization rates, and lower operating costs." The Federal Risk and Authorization Management Program (FedRAMP) addresses the key elements of a cloud computing framework for federal agencies. more

Outdated Whois Information Might Lead to False Light Tort: Meyerkord v. Zipatoni

It's a late entry, but this opinion may be a dark horse candidate for the most bizarre case of 2008. Meyerkord was a Zipatoni employee and listed as the registrant on domain names at Zipatoni's Register.com account. Meyerkord left in 2003. In 2006, Zipatoni ran an astroturfing viral campaign for Sony to promote the Play Station Portable at the domain alliwantforxmasisapsp.com... Unfortunately for Sony -- and Meyerkord -- the campaign did not go well. more

Google Explains What They Mean by “Net Neutrality”

Google has launched a new Public Policy Blog focused on U.S. government legislation and regulation -- reported in the media as part of Google's efforts in setting up focus on the U.S. government since early 2005. In an entry posted over the weekend on the blog by Richard Whitt, Washington Telecom and Media Counsel, key argument within the net neutrality debate is explained... more

Multistakerholderism and Its Discontents: A Reply

Twenty years after multistakeholderism helped save the Free Internet and present-day Internet governance from a potentially existential crises, the term is again triggering some strong emotions. There are very real questions around definitions, accountability, participation, and even legitimacy in all multistakeholder models. Within Internet governance, there are declared enemies of the multistakeholder approach... more

Topics

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

DNS Security

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days