Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Live Long and (Do Not) Prosper: Lessons and Reminders from Yesterday’s Wikipedia Outage

Yesterday's Wikipedia outage, which resulted from invalid DNS zone information, provides some good reminders about the best and worst attributes of active DNS management. The best part of the DNS is that it provides knowledgeable operators with a great tool to use to manage traffic around trouble spots on a network. In this case, Wikipedia was attempting to route around its European data center because... more

All Domain Name Professionals – Now Is the Time for a Portfolio Review

As we move further into the summer months and the demands made upon domain professionals typically ease, now is the ideal time to review domain name portfolios. And technology solutions can greatly automate this process. Ensuring that portfolios are pared, appropriate levels of security are implemented, and domains point to relevant content are all key areas upon which to focus. more

IP Address Distribution Doesn’t Fit in the Registry/Registrar Model

At the IGF2010 in Vilnius, two folk are floating a trial balloon about separating the allocation function from the registry services function. Currently, these functions are seen as indivisible by the Internet addressing community. In other words, one gets an allocation or assignment from a RIR and the RIR adds the assignment to their database... The question being asked is "Is it time for a split between allocation and services for Internet number resources as was the case for domain name resources?" My answer is no more

Malware and Search Warrant

A recent decision from a federal district court addresses an issue I hadn't seen before: whether searching malware on the suspect's computer was outside the scope of the search warrant issued for that computer. It seems a narrow issue, and unfortunately the opinion issued in the case doesn't tell us a whole lot about what happened; but I thought the issue was worth writing about, if only to note that it arose. more

Thinking Outside The ICANN Box: Creating A Prototype Based On Internet Experience - Part I

In research, one of the important steps is to identify the problem that needs exploration. Another step is to identify how to find a solution. Once it is possible to agree on the nature of the problem, then it begins to be a matter of how to approach the problem. more

Is Proprietary Dead?

A new age of openness is coming upon us. At least that's what we're being told. For instance -- "The reign of closed solution suites is over, shifting to the rise of open, heterogeneous software ecosystems." Maybe it's my 30 years in the information technology business (how many people remember Thomas-Conrad ARCnet hardware?), but I'm not convinced. It's worth taking a moment to consider the case. more

House of Cards

Time flies. Although it was over 18 months ago, it seems just like yesterday that a small Czech provider, SuproNet, caused global Internet mayhem by making a perfectly valid (but extremely long) routing announcement. Since Internet routing is trust-based, within seconds every router in the world saw this announcement and tried to pass it on. Unfortunately, due to the size of this single message, quite a few routers choked -- resulting in widespread Internet instability. Today, over a year later, we were treated to a somewhat different version of the exact same story. more

Filtering Spam at the Transport Level

An interesting new paper from the Naval Postgraduate School describes what appears to be an interesting new twist on spam filtering, looking at the characteristics of the TCP session through which the mail is delivered. They observe that bots typically live on cable or DSL connections with slow congested upstreams. ... This paper tries to see whether it would be practical to use that info to manage spam in real time. more

ICANN May Not Be Perfect, But It Is Working

Though I have been critical of some of ICANN's shortcomings, I remain a strong supporter of ICANN's role as a private sector-led, multi-stakeholder global regulator for the Internet's core addressing systems. My recent blog post about my concerns with the communications processes relating to the addition of the first Arabic script IDN ccTLDs has been quoted in an ITU Staff Paper prepared for the ITU Council Working Group on the World Summit on the Information Society, to be held in Geneva tomorrow. This document seems to suggest... more

First Leap to Secure Linguistic Internet - Arabic SSL Certificates Launched

Linguistic Internet is becoming stronger with the first leap to develop non-Latin applications, as Arabic Language SSL Certificates has been launched by M/s ArabicSSL with the support of Live Multilingual Translator and The Multilingual Internet Group. This step is highly appreciable because this will ensure the security and stability and develop trust over new Internet layers of Internationalized Domains (IDN TLDs). more

Clues about the Future of TV

A recent article chronicles the telcos' slow start in cable TV. I don't think the telcos stand a chance of succeeding in cable TV. Instead, if they're to succeed at all, they'll probably buy or form alliances with existing cablecos... But they'd better start swimming, because the times are a changing.. more

The Role of a Cybersecurity Czar

For years now, there have been calls for a high-level cybersecurity official, preferably reporting directly to the president. This has never happened. Indeed, there is a lot of unhappiness in some circles that President Obama has not appointed anyone as "czar" (or czarina), despite the early fanfare about the 60-day cybersecurity review. There are many reasons why nothing has happened... more

More on Portable Email Addresses

Last month a bill in the Israeli Knesset would have required ISPs to provide portable e-mail addresses, analogous to portable phone numbers that one can take from one phone company to the other. As I noted at the time, e-mail works differently from telephone calls, and portability would be difficult, expensive, and unreliable. So I was wondering, idly, if we really wanted to provide portable e-mail addresses, how hard would it be? more

New gTLDs: Let the Gaming Begin (Part I - TLD Front Running)

A series of recent applications for national trademark rights in terms that correspond to likely strings for new top-level domain names, or TLDs, (e.g., ".BLOG") highlight just one way in which ICANN's new generic TLD (gTLD) application process is likely to be "gamed." But it is also a strategy to which some trademark holders may feel compelled to resort to defend their rights to that string. Unfortunately, it does not appear that ICANN is addressing these important public policy considerations. more

ICANN Paints Itself Into a Corner

ICANN recently commissioned a report from a domain auction company to see whether it would be a good idea to auction Top-Level Domains (TLDs) that have multiple applicants. Remarkably, the domain auctioneers came to the conclusion that auctions are a great idea, which they surely are for some people. But are they a good idea for ICANN? And if ICANN admits they can't evaluate competing applications on their merits, how can they keep the process from turning into another speculative land grab? more

Topics

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Threat Intelligence

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days