Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

How Will the New .AU Domain Licensing Rules Impact You?

The .AU Domain Administration (auDA) will soon implement new .AU domain administration licensing rules either late this year or early next year. These rules apply to new registrations and around 3 million existing domain names in the com.au, net.au, org.au, and more .AU namespaces... Previously, an Australian trademark application or registration may constitute the required Australian presence for an .AU domain name, but the domain name need not match the trademark. more

The Trembling Trademark Owners

Why is so much fear being created in the name of protecting trademark owners? Say, if ICANN allowed some third party a generic Top-Level Domain (gTLD) called .panasonic will the sky fall? No, not at all, as Panasonic, the true and rightful TM holder will hit the unauthorized gTLD with a 2x4 and no judge would oppose issuing a cease-and-desist order. Now the other question is... more

The Mission Has Already Crept

ICANN's mission, and the avoidance of "mission creep", is currently the subject of intense debate in the Internet community. Multiple cross-community working groups are dealing with the proposal by an agency of the United States government, NTIA, to give up the last vestiges of its control of the IANA function. Many of the new organizational structures under consideration purport to deal with ICANN's expanding mission. more

Why Registry Service Providers Should be Accredited by ICANN

The merits of a Registry Service Provider accreditation programs have been debated across the Domain Industry since the most recent round of Domain Name Registries were introduced starting in 2012. This post discusses the early reasoning in support of an accreditation program; changes in the policy considerations between 2012 and now; the effects of competition on the landscape; a suggestion for how such a program might be implemented; and why such a program should be introduced now. more

What Should PGP Look Like?

Those who care about security and usability - that is, those who care about security in the real world - have long known that PGP isn't usable by most people. It's not just a lack of user-friendliness, it's downright user hostile. Nor is modern professional crypto any better. What should be done? How should crypto in general, and PGP in particular, appear to the user? I don't claim to know, but let me pose a few questions. more

Susan Crawford to the White House on Ada Lovelace Day

Just in time for Ada Lovelace Day comes the news that Susan Crawford (Wikipedia, CircleID) is headed to the White House as special assistant to the president for science, technology, and innovation policy... more

One Good Outcome from the Wall Street Journal: Google Flap

On Monday the Wall Street Journal published an article alleging that Google was trying to arrange a "fast lane for its own content" with telecom carriers and contending that Google and Professor Lessig were in the midst of changing their position on network neutrality policy. The WSJ reporters received a lot of flak for the piece -justifiably so. There was no real "news" in this news article. more

ICANN Paints Itself Into a Corner

ICANN recently commissioned a report from a domain auction company to see whether it would be a good idea to auction Top-Level Domains (TLDs) that have multiple applicants. Remarkably, the domain auctioneers came to the conclusion that auctions are a great idea, which they surely are for some people. But are they a good idea for ICANN? And if ICANN admits they can't evaluate competing applications on their merits, how can they keep the process from turning into another speculative land grab? more

“Objective” and “Objectivity” in UDRP Decision Making

No one will disagree that disputes before arbitral tribunals and courts should be determined on the merits. I have noticed that some Panels appointed under the Uniform Domain Name Dispute Resolution Policy (UDRP) have employed the words "objective" and "objectively" in their recent decisions. In pondering these linguistic choices, it seems to me that there are two possible reasons for their use; the first is more acceptable than the second. more

A Report on the OECD/BEREC Workshop on Interconnection and Regulation

I presented at a OECD/BEREC workshop that was held on the 20th June in Brussels, and I'd like to share some personal impressions and opinions from this workshop. The OECD/BEREC workshop was a policy-oriented peering and exchange forum. It was not a conventional operational peering forum where the aim is to introduce potential peers to each other and facilitate peer-based interconnection of network operators, but a workshop that involved both network operators and various national and EU regulators, as well has having inputs from the OECD. more

How to Increase Broadband Competition

Susan Crawford, seeking to learn from Korea and Japan, identifies three routes towards broadband competition... Facilities based competition: Still waiting for that mythical third wire, or perhaps some unused, unlicensed TV spectrum, but not holding my breath. (Broadband over powerline? It is such an encumbered technology that it is its own barrier to entry.) Wholesale access: Been there, tried that, but the Bells wouldn't unbundled elements... more

Verisign Expands MANRS Relationship to Strengthen Global Routing Security

Verisign has been involved with an initiative known as Mutually Agreed Norms for Routing Security, or MANRS, since its inception. MANRS, which is coordinated by the Internet Society, focuses on strengthening the security and resiliency of IP networks throughout the world by identifying and providing best practices for mitigating common routing security threats. MANRS began as a collaboration among network operators and internet exchange providers, with Verisign formally becoming a participant in its Network Operator Program in 2017. more

Top Six IT Trends Impacting Business Networks

For decades, IT followed business. Even the development of the World Wide Web didn't move this development much beyond the four walls of corporate offices -- outside connections were essential but never informed the growth of business-critical technology. Now the growth of public clouds, enterprise-grade social networking and mobile device use in the workforce is creating a new paradigm, one where business networks are reactive to IT trends -- here are six that are set to impact companies this year. more

Why 5G Is in Trouble (and How to Fix It)

I have a somewhat unconventional view of 5G. I just happen to believe it is the right one. It is trapped inside a category error about the nature of packet networking, and this means it is in trouble. As context, we are seeing the present broadband Internet access model maturing and begin to reach its peak. 5G eagerly anticipates the next wave of applications. As such, 5G is attempting to both extend and transcend the present "undifferentiated data sludge" model of mobile broadband. more

Comments on the National Strategy for Trusted Identities in Cyberspace

The White House has recently released a draft of the National Strategy for Trusted Identities in Cyberspace. Some of its ideas are good and some are bad. However, I fear it will be a large effort that will do little, and will pose a threat to our privacy. As I've written elsewhere, I may be willing to sacrifice some privacy to help the government protect the nation; I'm not willing to do so to help private companies track me when it's quite useless as a defense. more

Topics

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

DNS Security

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days