Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

A Few More Thoughts on Email Authentication… errr… Trust

Mike Hammer's thoughtful article, A Few Thoughts on the Future of Email Authentication, should trigger thoughtfulness in the rest of us. Email abuse has been around a long time. Anti-abuse efforts have too. Yet global abuse traffic has grown into the 90+% range, with no hint of trending downward. The best we hear about current effectiveness is for last-hop filtering, if you have the money, staff and skills to apply to the problem... more

Considering a Vulnerability Disclosure Program? Recent Push Raises Questions for General Counsel

Several years ago, vulnerability disclosure programs, also called "bug bounty" programs, were novel and eyed with suspicion. Given sensitivities and potential liabilities, companies are wary of public disclosure and hackers seeking to exploit research. When a hacker presented a flaw to a company, the company was more likely to be concerned about taking legal action than making a public announcement or offering a reward. That is changing. more

Reducing Cybersquatting, Phishing

Solutions to cybersquatting and phishing must target brand customers instead of the trademark infringers, who are in effect liars. This post outlines why online-based traditional solutions fail, and it offers solutions to two types of lying (cybersquatting and phishing). more

Ethiopia’s Ban on Skype: An Excessive Stretch

Most international Medias picked the story wrong. And I see it being repeated. It is true that there is some legislative initiative regarding the regulation of VoIP calls and mainly the telecommunication sector in Ethiopia. But the initiative is just a draft, noting more. Besides there is no such a thing as 15 years punishment in the draft law for using Skype. Here are the provisions in the draft law that are stretched in many news headlines to bemoan that the use of Skype in Ethiopia entails 15 years punishment. more

6 Domain Name Industry Developments to Lookout for in 2014

2013 was one of the most exciting and forward-looking year for our Industry, and here we are, right at the beginning of 2014. Shall we look into the crystal ball and see what the horizon up ahead likely holds for us? We hope and foresee that a lot of everyone's hard work will eventually begin to pay off this year. We also believe that the industry will witness a huge change; opportunities and possibilities that were never before thought of. more

ICANN Should Not Ululate Over “Booking.com” IRP Outcome: Decision Exposes Failure of Accountability

The IRP Panel that was tasked with deciding the Booking.com vs. ICANN IRP that was filed regarding the application for the .hotels new gTLD name has made a decision that seems favorable to ICANN as the Defendant. However, this is not a victory for ICANN but an indictment of the ICANN procedures and accountability systems which are widely viewed as detrimental to new gTLD applicants. more

“ICANN Urged to Rule on .LLP ‘Breach’”

There is probably no worldwide community without at least one member located in the US. But does this qualify the closing of a community to only US based members and, by extension, to exclude all other eligible entities from around the world solely because of arbitrary geographical circumstances based upon company whims? more

Wine Applications: Results of the New gTLD Prioritization Draw

There are 4 applications related to the wine business in the new gTLD program. Yesterday the new gTLD prioritization draw took place where each application was assigned a randomly-drawn priority number. These priority numbers are used to determine the order in which initial evaluation results are released. In the 1917 applications, 4 applications are related to wine. more

MicroID: A Microformat for Claiming Ownership

This morning I learned about MicroIDs from Doc Searls. Jeremy Miller has proposed MicroIDs as a microformat that "allows anyone to simply claim verifiable ownership over their own pages and content hosted anywhere." A MicroID is a hash of two hashed values. The first is a verified communication ID. The second is the URI of the site that the content will be published on. You end up with a unique, long string of gibberish that can be put in the header of a Web page or even wrapped around one part of a page... more

Bill Gates Has Not Forgotten Teledesic – Might We See Another Broadband LEO Constellation?

Teledesic was the first company to plan to offer broadband connectivity using a constellation of low-earth-orbit (LEO) satellites. Craig McCaw, who had sold McCaw Cellular to AT&T, founded Teledesic in 1990 and it got a big visibility and credibility boost when Bill Gates made a small ($5 million) investment in the company. McCaw and Gates were able to attract capital - $200 million from a Saudi Prince, $750 million from Motorola, and $100 million from Boeing, which signed on as the prime contractor.  more

2nd Round gTLDs: the Good, the Bad, and the Ugly

This post outlines the advantages (good) and threats (bad) that can make or break a gTLD, and the eternal fact that some applications will doom themselves to failure (ugly). The Good... Waiting until the second round to apply for a gTLD may end up being a virtue for the following reasons... more

The Blackout: Preventing Network Domino Effects

After a widespread blackout hit the United States and Canada, the so-called network domino effect attracted high public attention. Modern physicists have paid attention to the effect of network dominos. Especially, scientists who have studied complex systems have warned that a network domino effect, if it occurs, will bring chaos to a society that is well connected through the Internet. The cause of the blackout in the United States and Canada was not traced down quickly. But it apparently shows a typical network domino effect.  more

com.google April Fools’ Is No Laughing Matter: What .google Could Mean for Other .brands

When April Fools' Day rolls around each year, Google is generally one of the front runners for jokes -- often making headlines for its quirky gimmicks. This year was no exception. On April 1st, Google launched its first domain name under the recently delegated .google Top-Level Domain (TLD), a massive milestone for all .brand TLD owners. Google is encouraging millions of people around the world to visit: www.com.google. more

EoWhy?

I have come to acceptance that the community proposal for Expressions of Interest in new gTLDs (EoI) was removed from consideration during ICANN's March 12th Board Meeting in Nairobi. It should have passed, but it got lobbied into oblivion by some in attendance at the Nairobi meeting. They deserve their say, those who oppose it, but quite frequently the arguments used fail logic once one reflects upon them, or contrast them against the facts. more

The Great ITU Internet Heist

There was a meeting in Geneva a few weeks ago dealing with Internet names and addresses. Known as the Second Informal Expert Group Meeting of the Fifth World Telecommunication / Information and Communication Technologies Policy Forum, it was yet another of the endless blathering bodies on this subject that have met for the past fourteen years. more

Topics

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days