Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Chinese Internet Research Conference: Getting beyond “Iron Curtain 2.0”

At last week's Chinese Internet Research Conference, much discussion of the "myths and realities" of the Chinese Internet revolved around images, metaphors, and paradigms. In his award-winning paper titled The Great Firewall as Iron Curtain 2.0, UPenn PhD Student Lokman Tsui argued that "our use of the Great Firewall metaphor leads to blind spots that obscure and limit our understanding of internet censorship in the People's Republic." more

Understand More, Fear Less: Will G20 Be Able to Contribute to an Internet Future with a Human Face?

Last week, the G20's ministers responsible for the digital economy met in Düsseldorf to prepare this year's G20 summit, scheduled for Hamburg, July 2017. Building on important strides initiated two years ago during the G20 summit in Antalya and based on the G20 Digital Economy Development and Cooperation Initiative (DEDCI), which was adopted last year under the Chinese G20 presidency, the Düsseldorf meeting adopted a "G20 Digital Economy Ministerial Declaration" which also includes a "Roadmap for Digitalisation". One day before the ministerial meeting, non-state actors were invited to discuss "Policies for a Digital Future" within a so-called Multistakeholder Conference. more

Finishing What We Started: A Level Playing Field for New gTLDs

While the Internet governance debate devours headlines, it's almost easy to forget that ICANN is in the midst of the most audacious and important policy process it has ever undertaken. And while many new generic top-level domains are now live, the process of ensuring the best opportunity to fulfill their potential is not yet complete. We recently reached the milestone of 280,000 registrations in the Donuts gTLDs that are currently generally available. more

Declaring IPv6 an Internet Standard

I've already shared my thoughts following a session of the IPv4 Sunset Working Group at IETF 95 that considered whether to declare IPv4 an "Historic" specification. Of course, as one would expect for a meeting of a Standards Development Organization (SDO), that wasn't the only standards process discussion through the week. Another session, this time in the IPv6 Maintenance Working Group, considered the related topic of whether to make the IPv6 specification a full Internet Standard. Let's look at that proposal. more

6 Domain Name Industry Developments to Lookout for in 2014

2013 was one of the most exciting and forward-looking year for our Industry, and here we are, right at the beginning of 2014. Shall we look into the crystal ball and see what the horizon up ahead likely holds for us? We hope and foresee that a lot of everyone's hard work will eventually begin to pay off this year. We also believe that the industry will witness a huge change; opportunities and possibilities that were never before thought of. more

Dead Ends: The Achievement of Consensus in UDRP Jurisprudence

Like the Internet Corporation for Assigned Names and Numbers (ICANN), the Uniform Domain Name Dispute Resolution Policy (UDRP) is consensus-driven; from the bottom up, not the top down. The result is a jurisprudence of domain names that develops in common-law fashion through Panel decisions that over time and through "deliberative conversations" among panelists resolve into consensus. more

Will a Global TAR Make DNSSEC Stick?

Two US Government contractors and the National Institute of Science and Technology have released a white paper, "Statement of Needed Internet Capability," detailing possible alternatives and considerations for a Trust Anchor Repository (TAR) to support DNSSEC deployment. The document was released through the DNSSEC-Deployment Group this week with a request that it be circulated as widely as possible to gather feedback. A Trust Anchor Repository (TAR) refers to the concept of a DNS resource record store that contains secure entry point keys... more

The Harsh Reality of Spam and Online Security… Should I Stay or Should I Go?

Working in the anti-spam and online malware fight can be depressing or at best invoke multiple personality disorder. We all know things are bad on the net, but if you want a dose of stark reality, check out Brian Kreb's fantastic 'Security Fix' blog on the Washington Post site... Speaking to an old friend who asked me what I was doing these days, I recently likened the fight against this relentless onslaught to having one's pinky in a dyke, and there are days when I don't even think we have a dyke! more

Will the Trademark Clearinghouse Fulfill its Potential?

ICANN created the Trademark Clearinghouse (TMCH) as a way to streamline the repetitive process forced on trademark owners during the launch of new top-level-domains. With the expected tsunami of hundreds of new TLD's starting later this year, the TMCH should generate a clear benefit for trademark owners who elect to participate in Sunrise and Claims Periods. The side effect of introducing new TLDs is that the legacy TLDs will be making changes to make sure they are competitive against the new TLDs. more

The ICANN New gTLD Program is Approved: Now What? How to Submit a Quality Application in 6 Months

On January 12, 2012, the application window opens. Any corporation or organization can submit a request to own a piece of the Internet -- their own top-level domain (TLD). Many reporters are confusing a TLD with a domain name... But with less than six months between now and when an application can first be submitted, many are wondering if there's enough time to do it right. more

Brexit Could Impact EU Domain Registrants

The current policies for .eu domain name registration restrict registration to organisations, businesses and individuals that meet certain criteria. In order to get a .eu domain name you need to be resident within the EU, Norway, Iceland or Liechtenstein. This is laid out in the current policy... Post-Brexit it is unclear whether UK registrants will still qualify to hold their .eu domains. more

What If New gTLD Applicants Held Private Auctions Where Losing Applicants, Not ICANN Gets The Money

Over the last week at ICANN the arguably best idea coming out of the ICANN meeting is the concept that applicants for new gTLD strings with more than one application, hold a private auction amongst themselves with the winning amount going to the other losing applicants instead of to ICANN. As a backdrop, under the Guidebook multiple applicants for a new gTLD extension are encouraged to work together and come to an agreement to resolve the conflict. more

Warning, Danger Lurks Here: Exploring DKIM/ADSP Edge Cases - Missing message-id

This article is the first in an occasional series on DKIM/ADSP edge cases that may not be generally recognized or understood. Many people advocate DKIM/ADSP adoption without fully recognizing potential implementation and operational issues. The fact is that the email messaging environment is fraught with opportunities for poor outcomes because of common practices that need to be considered or poorly understood implementations that are not considered... more

How Tiered Internet Pricing Could Actually Facilitate P2P

Time Warner Cable's planned experiment with tiered charging for Internet access has generated a flurry of coverage in the blogsphere, but no new insights (at least that I've seen). The primary problem ISP's complain about is that 5% of their customers use 90% of the available bandwidth and when they examine this traffic, it's mostly peer-to-peer file sharing... more

Minimum Disclosure: What Information Does a Name Server Need to Do Its Job?

Two principles in computer security that help bound the impact of a security compromise are the principle of least privilege and the principle of minimum disclosure or need-to-know. As described by Jerome Saltzer in a July 1974 Communications of the ACM article, Protection and the Control of Information Sharing in Multics, the principle of least privilege states, "Every program and every privileged user should operate using the least amount of privilege necessary to complete the job." more

Topics

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

DNS Security

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days