Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Book Review: Forks in the Digital Road - Key Decisions in the History of the Internet

At first glance, this book looks like another history of the Internet, but it is much, much more. The authors use their engineering and scholarly understanding of what constitutes Internet history to identify forks in the digital road and key past decisions that shaped the Internet's path. The first part of the book maps out the core technical and policy decisions that created the Internet.  more

The Hidden Value of IPv4 Addresses

All devices that connect to the internet need unique addresses. The number of IP addresses is limited, creating a demand for addresses worldwide, particularly from the cloud computing industry. This demand has raised the value of IPv4 to levels that the internet's original developers didn't predict, in part because the internet was considered an experiment at the time. Of course, use - and so demand -- has exceeded anyone's realistic expectations. more

Evolution of the Dot Brand Domains in 5 Years

ICANN's last new gTLD application closed in 2012 with more than 600 brands applying for their dot brand. Dot brand domains associate a keyword or keyphrase and a brand name in a complete domain name... To understand better how the evolution of the dotBrand has been throughout these years, number of websites launched, redirects, registries etc, Dot Brand Observatory prepared a few visual graphics. more

Why the 1# Vulnerability for Cyber Attacks Will Be Apathy

Everyone has heard of the cyber security attacks on Target (2013), Home Depot (2014), Neiman Marcus (2014), Sony Pictures (2014), and the United States' second-largest health insurer, Anthem (reported February 2015), but have you heard of the security breaches for Aaron Brothers, Evernote (denial of service attack), P.F. Chang's China Bistro, Community Health Services, Goodwill Industries, SuperValu, Bartell Hotels, Dairy Queen, U.S. Transportation Command contractors, and more. more

NANOGGING

There are many network operator group meetings being held these days. Even in the backwater of the South Pacific where I live there is now AUSNOG, and NZNOG is just next door in New Zealand. We now have MENOG in the Middle East and AFNOG in Africa. The original NOG was the North American Network Operators Group (NANOG), and they have the T-Shirts to prove it! NANOG meets three times a year, and I attended NANOG 41 in October 2007. NANOG meetings cover a broad variety of topics, from operational tools, measurement, and peering practices through to a commentary on the state of the Internet industry. Here are my impressions of the meeting. more

Advancing Digital Trust: Global Innovations in Domain Registrant Verification (Highlights from the ICANN79 Community Forum)

On 6 March 2024, the ICANN At Large Advisory Committee (ALAC) held a plenary session entitled "Building Trust on the Internet Through Registrant Verification" at the ICANN79 Community Forum in San Juan, Puerto Rico, that Michael Palage and Avri Doria co-moderated. This session was inspired in part by a recent World Economic Forum report entitled "Reimagining Digital ID"... more

Much Ado About WCIT-12 and Multi-Stakeholderism

In the last month of last year, the World Conference on International Telecommunications (WCIT-12) ended in Dubai amid, not hugs and fanfare, but finger-pointing and acrimony. The end, much anticipated as it was, wasn't the finest hour for international cooperation for the global public interest. Looking back, one would be forgiven to conclude that the WCIT-12 was doomed to fail. more

1,000th /22 Allocated from Last /8

On 14 September 2012, the RIPE NCC began allocating IPv4 address space from the last /8 we received from the Internet Assigned Numbers Authority (IANA). Nobody was entirely sure what would happen when we reached this point. Would there be a "run on the bank" for this final block of addresses? more

What Are New gTLD Governance Councils?

Many generic, community and other geographic new domain name extensions (also called "gTLDs" or "generic Top Level Domains") will soon become a focal point for the industry or sector they represent. These simple denominators which define a vertical sector, profession, geographic, ethnic or other delineated group on the Internet have not existed on the Internet until now. These new domain name extensions are moving from the realm of science fiction to science fact: in fact a domain name ending in ".science" will soon exist on the Internet and will clearly contain web sites with a relationship to science. more

What Digital Divide on IP Addresses?

I took an instant dislike to The Digital Divide on IP Addresses post for some reason, well for many reasons actually. First and foremost is that the implication that the "digital divide" is somehow caused by IP address allocation policies. While it is certainly true that there are "digital divides" between developed and developing parts of the world, the historical imbalance in IP addressing is not one of them. The fact is that while we will "run out" of IPv4 addresses at some point in the not too distant future, there are an unimaginably large number of IPv6 addresses available. more

The End of Net Neutrality Regulation COULD Mean the End of Last-Mile Oligopolies

Landline networks like the old phone system and the new(er) cable systems do lend themselves to monopoly or at least duopoly outcomes. Building these networks is both very expensive and requires myriad government approvals. Once a system is in place, it is hard for anyone to raise the capital to duplicate it. Even a network of wireless towers is hard to compete with. more

Considering a Vulnerability Disclosure Program? Recent Push Raises Questions for General Counsel

Several years ago, vulnerability disclosure programs, also called "bug bounty" programs, were novel and eyed with suspicion. Given sensitivities and potential liabilities, companies are wary of public disclosure and hackers seeking to exploit research. When a hacker presented a flaw to a company, the company was more likely to be concerned about taking legal action than making a public announcement or offering a reward. That is changing. more

Traceability

At a recent workshop on cybersecurity at Ditchley House sponsored by the Ditchley Foundation in the U.K., a primary topic of consideration was how to preserve the freedom and openness of the Internet while protecting against the harmful behaviors that have emerged in this global medium. That this is a significant challenge cannot be overstated... That these harmful behaviors can and do cross international boundaries only makes it more difficult to fashion effective responses. more

Wikileaks and the Gaps in Internet Governance

The recent publication of leaked United States diplomatic cables by Wikileaks has produced an extremist reaction by some governments, provoking them and compliant large corporations to strike out at the organisation's Web site, its financial base, and the person of its founder, Julian Assange. For the Civil Society Internet Governance Caucus (IGC), this highlights the need for cross-border Internet governance issues to be made subject to a due process of law, informed by sound political frameworks, including those of human rights. more

The Root Is Not a TLD

It's a simple, straightforward fact that the root is not a TLD. However, the current policy around new gTLDs treats the root like a TLD registry and as anyone who runs a TLD registry knows, they have certain inescapable characteristics that may not be the best for the root. In almost every TLD, once a domain name has been registered, the registrant can use it commercially with few restrictions... more

Topics

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

DNS Security

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days