Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

The Case for Hot Swappable Nameservers

Earlier this week we announced our "Proactive Nameservers", which is just marketing speak for what it really is: hot swappable nameservers or nameserver fail over. What is it? ... It's basically what every webmaster, IT department and CTO wishes they had set up before... more

Stop Using the Term “Open Internet”

Over the past few years, the term "open internet" has become popular among politicians in Washington and Europe. It is bandied about in political pronouncements that assert that everyone needs to somehow support the open internet without ever actually defining it. It is sometimes used as a synonym for Net Neutrality. In fact, it is a bogus public relations term that is rather like saying you believe in the Tooth Fairy. more

Google’s China Troubles Continue; Congress Examines U.S. Investment in Chinese Censorship

In his latest blog post, Google's Chief Legal Officer David Drummond reports that Chinese authorities aren't happy with the automatic redirection of Google.cn to Hong Kong. They are threatening not to renew Google's Internet Content Provider license, which is required to legally operate any kind of Internet business in China. more

The Limits of Notice and Takedown

In The Limits of Filtering, Evan Engstrom and Nick Feamster argue eloquently that the costs of a "takedown-staydown" system to defend against copyright infringement would be prohibitive for online service providers (OSPs) and therefore deprive OSPs of otherwise interested investors. I agree that Engstrom and Feamster raise some valid points, particularly including that content recognition technologies are not perfect... However, we must also remember that the current DMCA regime imposes significant costs... more

Typosquatting Claims Against Security Researcher Are Legally Complicated - Gioconda v. Kenzie

Kenzie is a security researcher who has registered numerous domain names that are typographic errors of well-known trademarks (e.g., rnastercard, rncdonalds, nevvscorp, rncafee, macvvorld, rnonster, pcvvorld). He points the domain names to the actual sites in question (e.g., rncdonalds points to mcdonalds.com), but he is looking to demonstrate how these typo domains are used for "social engineering" attacks. more

The Changing Mobile World

Today's Internet is undoubtedly the mobile Internet. Sales of all other forms of personal computers are in decline and the market focus is now squarely on tablets, "smart" phones and wearable peripherals. In 2014 these providers sold 1.5 billion such devices into the global consumer market, and doubtless 2015's numbers will be greater. Half of all Internet-visible devices are now mobile devices and they generate 75% of all access provider revenues. more

Luddites of the 21St Century Unite?

In the past few weeks doom and gloom stories about the future were printed, discussed and opined in the press. The down and out of the message of futurists is that the middle class is going to be swept away in the coming years because of software and robotic solutions (from here on: automated processes), making humans redundant... Do Luddites of the 21st century need to rise? I want to look at the topic from a few angles. more

What ICANN Participants Have in Common with (and Could Learn from) Quakers

Throughout my childhood, I was a practicing member of the Religious Society of Friends (the 'Quakers'). Now, for the first time, I am participating in an ICANN meeting (specifically, the 34th in Mexico City). While at first blush these to two experiences seem to have little in common, it is actually striking how much they are alike... more

Interest in Cloud-Based Email Infrastructure Grows by 35% in 3rd Quarter of 2016

Cloud-based interest in email infrastructure trended up this past quarter. Port25, a Message Systems Company, tracks cloud-based interest (CBIs) among large volume senders based on evaluation and purchase requests received, in conjunction with overall site engagement. In Q3, CBIs on Port25's website grew by 34.97% over Q2, to a total of 48.2% of unique evaluation and purchase requests. more

Digital Rights Management or Digital Restrictive Management?

We are all accustomed to purchasing and/or using copyrighted material in one fashion or another. From music, movies-(BluRay), e-books-(Kindle), computers-(software), mobile phones-(iPhone) and games; the umbrella of companies wanting to restrict access to its products continues to grow and become increasingly restrictive. more

Synacor Provides a New Complaint Feedback Loop Service to the Internet Community

Last week, Synacor joined other major mailbox providers by introducing a complaint feedback loop service -- powered by ReturnPath. This increases the number of public complaint feedback loops available today across the internet. more

RealTimeML:  Email Send Time Optimization for Supply Chain Bottlenecks

Look for this trio of email-related organizations MessageGears, Validity, Vidi-Emi, to become trailblazers in the RealTimeML Email landscape. This article will examine the nascent concept of utilizing RealTimeML to optimize for open rates and ultimately engagement rates by using a SendTime Email Optimization model. The model will infer RealTimeML predictions for optimal engagement rates, which provides enormous value throughout your current supply chain. Additionally, we will share ongoing time trials to serve the model efficiently. more

Investing in Rural Broadband

There was a headline in a recent FierceTelecom article that I thought I'd never see - Jeffries analyst says the rural broadband market is ripe for investment. In the article, analyst George Notter is quoted talking about how hot rural broadband is as an investment. He cites the large companies that have been making noise about investing in rural broadband. Of course, that investment relies on getting significant rural grants. more

Disruptive Google Fiber Is Shaking up the Telco World

The Google Fiber project is receiving international attention. This in itself is a good thing, since it brings the benefits of high-speed FttH infrastructure to the attention of large numbers of people in business and government who will not have to deal with such developments on a regular basis... At the same time we have to look at Google Fiber from the point of view of operating in the American regulatory environment. Yes, we can all learn from its disruptive model, and particularly when the results of the more innovative elements of the services begin to kick in; but for other reasons there is no way that this model can be replicated elsewhere. more

Oil and Gas Cyber Security Forum

A reader recently brought to my attention an upcoming conference in London in the UK -- The Oil and Gas Cyber Security Forum. Here's a little blurb: "Despite investments into state of the art technology, a majority of the oil and gas industry remain blissfully unaware of the vulnerabilities, threats and capability of a malicious cyber attack on control systems..." I bring this up because it is relevant to the trends in cyber security that we see this year - that of the Advanced Persistent Threat. more

Topics

Domain Names

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days