Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

New .WINE and .VIN Are Now Political Tools

The more I follow the .WINE & .VIN opera, the more I start to believe that the idea is either to kill both new gTLD applications to free space in Round 2 of the ICANN new gTLD program or make this subject a political tool "only" to increase Europe's presence in ICANN decisions. If there still is a wish from the European Commission to help .WINE and .VIN to become the strongest identity European wines could ever have on Internet, I would like to understand why the situation is still blocked... more

NTIA’s FOIA Disclosures Shed Limited Light on IANA Transition Decision

On March 27, 2014, shortly after the National Telecommunications and Information Administration's (NTIA) March 14th announcement of its intent to transfer its counterparty status on ICANN's IANA functions contract to the global multistakeholder community, the conservative advocacy organization Americans for Limited Government (ALG) filed a Freedom of Information Act (FOIA) request with NTIA. ALG's request was for disclosure of "All records relating to legal and policy analysis developed by or provided to the National Telecommunications and Information Administration (NTIA) that support its decision to "transition key internet domain name functions," including any analysis showing whether the NTIA has the legal authority to perform the transition." more

Will the ICANN Auctions Kill off New gTLD Innovation?

As the launch of the first of the new gTLDs draws ever closer, more and more applicants are beginning to publicise their business models and ideas for putting the Domain Name System (DNS) to good use. By doing so, they are also shedding light on what promises to be a far less uniform Top Level for the Internet than might have previously been feared. A schism is appearing in the type of applicant/TLD model being enacted. Up until now, Donuts, Google et al have tended to hold the spotlight, and for good reason. more

The Design of the Domain Name System, Part IV - Global Consistency

In the previous installments, we've been looking at aspects of the design of the DNS. Many databases go to great effort to present a globally consistent view of the data they control, since the alternative is to lose credit card charges and double-book airline seats. The DNS has never tried to do that. The data is roughly consistent, but not perfectly so. more

A Tribute to the Father of the RFC, Dr. Stephen D. Crocker

40 years ago the Request for Comments (RFC) process for the Internet was born. The RFC process continues to be the way Internet protocols are expressed today. We have one very special man to thank for this and his name is Dr. Stephen D. Crocker. He has played a key role in shaping the modern day Internet. For this, I felt that a special tribute to him was in order as we take a look at his countless contributions from the foundation of the Internet to the Internet as we know it today. more

Call for Nominations: M3AAWG J. D. Falk Award Seeks Stewards of a Better Online World

Anyone seeking to honor a groundbreaking contribution toward a better online world should submit a nomination for the 2014 M3AAWG J. D. Falk Award. Presented to people whose work on specific projects made the Internet a safer, more collaborative, more inclusive place, the J. D. Falk Award has recognized leaders and pioneers who saw elements of the online experience that needed improvement and took action to fix them.  more

Private Cyber Investigators

This post was prompted by questions I was asked to address when I participated in a panel discussion of cybersecurity. Here are the relevant questions: "Should we reconsider the notion that companies under attack are prohibited from investigating the attackers and trying to locate them? We allow private investigators to conduct some activities that usually only the police are allowed to do; should we accredit private cyber investigators?" ...The one I found more interesting is the second question: whether we should accredit private cyber investigators. more

A New Way to Value Registry Business

There's a new site on the web - nTLDstats.com - that has a ton of valuable information about the new gTLD program. It shows numbers of registrations by registry, registrar, registry service provides - all the "Rs" in the domain name industry. It has quickly become the place where people go to measure how the industry, and the competitors in it, are doing. There's only one problem - not all domain registrations are created equal. more

Google Wave: Good News or Bad News for Carriers?

The recent launch of Google Wave generated a lot of attention, and for good reason. It's recently crossed my path in a few different settings, and while the news is still fresh, there is a lot here for service providers to be thinking about. At a high level, Wave is Google's entry into the real time collaboration space, and being Web-based, is poised to disrupt the status quo, not just for vendors, but service providers as well. more

Cloud Computing on Linux Has Microsoft Blogging

The Cloud Manifesto, a collaborative document prepared jointly by Amazon, Google, IBM and others has apparently upset Microsoft. In a blog post entitled "Moving Toward an Open Process on Cloud Computing Interoperability" and penned by the senior director of developer platform management for Microsoft, Steven Martin, Mr. Martin stated his position that the Cloud Manifesto and the process of creating it was biased to benefit its authors, and unfair to their competitors – such as Microsoft... more

Breaking the AI Bottleneck: The Future of High-Density Data Centers

Artificial intelligence (AI) has become synonymous with innovation, transforming industries at an unprecedented pace. While some may frame AI as a groundbreaking development of our time, it's essential to acknowledge that its roots run deep. AI has evolved immensely from early tools like the abacus to present-day GPU-driven large language models. What sets the current landscape apart? The sheer scale of data, computational demand, and complexity of workloads. more

A Three Minute Guide to Network Automation Bliss

The cloud computing paradigm has been making steady progress in 2016. With the DevOps model making its way from cloud to networking, the business upside of fully automated service architectures is finally beginning to materialize. The associated service agility is expected to unleash new business models that transform the ways in which applications and connectivity can be consumed. more

Household Botnet Infections

Pinning down the number of infected computers is really, really hard. I'd go as far as saying it's practically impossible to calculate, let alone observe. Still, that's not going to stop people from attempting to guess or extrapolate from their own observations. Over the years I've heard "reliable" numbers ranging from 10% through to 60% -- and I don't trust any of them. There's a whole gaggle of reasons why the numbers being thrown out to the public are inaccurate and should ideally be interpreted with a lot of skepticism by any right-minded folks. more

ICANN 35: What’s Going Down, Down Under (Want the Low Down?)

As I've been getting ready to catch my plane for ICANN 35 (Sydney), I can't help but thinking that there are a lot of things going down these days that will dramatically affect makeup of the Internet for years to come. Next year at this time, the root could be a very, very different place. A few of the items that will be getting deconstructed, discussed, debated Down Under are outlined below... more

The GNSO Review

The London School of Economics review of the GNSO was recently released by ICANN. ...The review is refreshing. But first, a pause: Do you know what the GNSO is or what it does? Do ICANN's processes seem difficult to understand? I bet (unless you've been going to ICANN meetings) you don't know much about this. And the focus of the report on the impenetrability of ICANN's work is refreshing and very useful. more

Topics

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

DNS Security

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days