Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Is the Future of the Internet at Risk?

The debate about the control of the internet is intensifying, with interesting discussions expected later on this year in Dubai at the WCIT conference organised by the ITU. Over the last 25 years the industry has moved from being mainly telephony-based to being mainly IP-based, and many say that what is now at stake is the future of the internet as we know it at this point in time... The reality now is that the political stakes of the internet have risen significantly. more

Google, China, and the Future of Freedom on the Global Internet

Maybe it's because I was schooled in political science, not computer science. But frankly I've been surprised by the extent to which some respected commentators have focused on trashing Google for lacking purity of motive. As if that were some kind of brilliant revelation. Of course Google's actions are motivated by self-interest. Self-interest is a complicated thing, and isn't only financial... But let's be honest with ourselves. How many people on the planet do anything for 100% selfless reasons? If having a free, open and just society depends on purity of motive, God help us all. more

Calling Africa: ICANN’s New Approach to Africa Is a Welcome and Significant Opportunity

The announcement last month of a new approach by the Internet Corporation for Assigned Names and Numbers (ICANN) to Africa is welcome, and significant for a number of reasons. Africa must participate in ICANN's activities to help shape its policies, and benefit from the domain name industry (estimated at $2 billion in 2008), where it lags behind other regions, given the few African registrars, and that there are no generic top-level domain names (gTLDs) registries that are African. more

China Calls for an End to the Internet Governance Forum

There's been a global argument going on for some time now over how the Internet should be governed. Many governments, including China but also many others, are not happy that the "root" of the Internet is controlled by the Internet Corporation for Assigned Names and Numbers (ICANN), which ultimately answers to the U.S. Department of Commerce. In 2005, there were proposals from various countries to move Internet governance from ICANN to a United Nations body of some kind... But there was no consensus. Human rights groups were rightly concerned that giving governments like China and Iran greater say in Internet governance would lead to more censorship and the elimination of privacy and anonymity. more

What Is the Potential Business Impact of New gTLDs On Existing TLDs?

How will the business of existing top-level domains (TLDs) be impacted by the new gTLDs? Someone asked me this simple question and I was very surprised to see that my online searches couldn't easily find many detailed articles or research related to that point. more

The Report on “Securing Cyberspace for the 44th Presidency”

A report "Securing Cyberspace for the 44th Presidency" has just been released. While I don't agree with everything it says (and in fact I strongly disagree with some parts of it), I regard it as required reading for anyone interested in cybersecurity and public policy. The analysis of the threat environment is, in my opinion, superb; I don't think I've seen it explicated better. Briefly, the US is facing threats at all levels, from individual cybercriminals to actions perpetrated by nation-states. The report pulls no punches... more

The Global Network Initiative

After more than two years of work behind closed doors, the Global Network Initiative is launching this week. That's the corporate code of conduct on free speech and privacy I've been talking about in generalities for quite some time. By midnight Tuesday U.S. East Coast time, the full set of documents and list of initial signatories will be made publicly available at globalnetworkinitiative.org. more

Don’t Overlook the Network When Migrating to the Cloud

The success or failure of public cloud services can be measured by whether they deliver high levels of performance, security and reliability that are on par with, or better than, those available within enterprise-owned data centers... IDC forecasts that public cloud IT spending will increase from $40 billion in 2012 to $100 billion in 2016. To provide the performance, security and reliability needed, cloud providers are moving quickly to build a virtualized multi-data center service architecture, or a "data center without walls." more

ICANN Releases Paper on Domain Name Security

Today ICANN releases a paper with the title "DNSSEC @ ICANN - Signing the root zone: A way forward toward operational readiness". The paper explains in more detail than earlier documents what ICANN view on signing of the root zone is. I think the key points mentioned in this paper are true, and in general, I think this document is a good read. It is not long, and summarizes what I would call the current view is. more

I Spoke to a .TAXI Driver

Last week I took a Cab on my way back from the Montparnasse Station in Paris. My wife had ordered a Taxi and it was waiting for us at the Taxi station. We had ordered it because we arrived late in Paris that night. Surprisingly, the Cab was a black Limousine with no Taxi sign on its top and the driver, who wore a costume, was gentle and polite. If you ever took a Taxi in Paris, you probably know why I am adding this to this paragraph. more

Building a More Inclusive Internet for All: A Radix Initiative

Universal Acceptance (UA) is a fundamental requirement for a truly multilingual and digitally inclusive Internet. UA is important because it ensures that all domain names, including new long top-level domains (TLDs) and Internationalized Domain Names (IDNs), and email addresses are treated equally and can be used by all Internet-enabled applications, devices, and systems. more

Counter-eCrime Operations Summit (APWG) In Prague Next Week

The sixth annual Counter-eCrime Operations Summit (CeCOS VI) will engage questions of operational challenges and the development of common resources for the first responders and forensic professionals who protect consumers and enterprises from the ecrime threat every day. This year's meeting will focus on the shifting nature of cybercrime and the attendant challenges of managing that dynamic threatscape. more

The Worm and the Wiretap

According to recent news reports, the administration wants new laws to require that all communications systems contain "back doors" in their cryptosystems, ways for law enforcement and intelligence agencies to be able to read messages even though they're encrypted. By chance, there have also been articles on the Stuxnet computer worm, a very sophisticated piece of malware that many people are attributing to an arm of some government. The latter story shows why cryptographic back doors, known generically as "key escrow", are a bad idea. more

Internet of Things Requires a Rethink of Business Models

There certainly is a lot of interest in machine-to-machine communication (M2M) and the Internet of Things (IoT). But what we are seeing is only what is happening on the surface. Most of the M2M activities are taking place unnoticed. For example, most newly produced electronic devices are now all M2M enabled. Over 100 million smart meters have already been deployed by the electricity industry, with literally hundreds of millions of them in the pipeline. Healthcare is another key industry. more

The Race to Bury Net Neutrality

The Internet is currently full of news articles describing how the FCC will soon be putting to bed the last vestiges of its order a few years ago to eliminate net neutrality rules. The order that is widely being called the net neutrality ruling was a far-reaching change at the FCC that essentially wrote the FCC out of any role in regulating broadband. more

Topics

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

DNS Security

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days