Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Exploring the Various Options of Private gTLD Auctions

Now that ICANN's Last Resort Auctions are becoming an imminent reality, more and more applicants with gTLDs in contention are coming to the conclusion that they would be better off in a private auction. As a result, there is a renewed discussion of the various approaches that have been proposed. Interesting new suggestions have also been made within the gTLD applicant community. more

Activists for Access to Medicines and Internet Rights Develop Brussels Principles for Online Sales

RightsCon, the world's leading summit on tech, society, and human rights has been called "the Davos of Digital Rights" (www.rightscon.org). At RightsCon 2017, the sixth event of the annual summit series on human rights in the digital age, the global human rights community came together in the heart of European politics and policymaking on March 29-31, 2017. More than 1,500 experts from 105 countries around the world, across diverse geographic and stakeholder lines, joined together to produce measurable outcomes on the most pressing and emerging issues threatening human rights in the digital age. more

Why Overseas Registries Shouldn’t Worry About China’s New Domain Name Regulation

On March 25th, 2016, the Ministry of Industry and Information Technology (MIIT) officially posted its revisions to the "Chinese Measures for the Administration of Domain Names" (2016 edition) for public comment. A decade has gone by since the latest administration measures were introduced in 2004 (2004 edition). Registries and registrars have been longing to see this update for a while, and it is therefore no surprise that the new edition has drawn substantial attention at home and abroad. more

Collisions Ahead: Look Both Ways before Crossing

Many years ago on my first trip to London, I encountered for the first time signs that warned pedestrians that vehicles might be approaching in a different direction than they were accustomed to in their home countries, given the left-versus-right-side driving patterns around the world. (I wrote a while back about one notable change from left-to-right, the Swedish "H Day," as a comment on the IPv6 transition.) more

ICANN’s Positive Affirmation: Good News for Africa and Emerging Markets

Sometimes you get what you are asking for. And this seems to be one of those occasions... and the US government can give itself a pat on the back for having listened to other stakeholder opinions. For years the world of Internet governance has been seen as its own special corner of the technosphere, full of arcane acronyms and quiet power deals. Despite efforts to make ICANN and the broader Internet community more transparent and user-friendly, many observers, including many African governments, still saw the stage as too much of an insider's game -- with the ultimate insider being the US Department of Commerce. more

More on 700 MHz Block C Hits Reserve Price

This is big... For the upper band C Block, the FCC mandated that any winning licensee have in place "no locking" and "no blocking" provisions conditioning its use of this spectrum: "Licensees offering service on spectrum subject to this section shall not deny, limit, or restrict the ability of their customers to use the devices and applications of their choice on the licensee..." The no-locking, no-blocking requirements were hedged in by substantial limitations... But it's still important... Particularly if Google is the winning bidder, something we may not know for a month or so. more

Protecting Brands from Phishers No Easy Task

Just in case you've been out of the country for the last 12 months, a new scourge is hitting the Internet and the world of email and it's called phishing. The Anti-Phishing Working Group defines phishing as identity theft "attacks using 'spoofed' e-mails and fraudulent Websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords..." According to various experts, the incidents of phishing are rising at an alarming rate: there were 13,000 unique phishing attacks in January alone - that's a 42 percent surge over the previous month. The real problem is that phishing works. more

Comparative Broadband Speeds - US Loses Again

Recently Google Labs added the Ookla Speedtest data set to their wonderful Public Data Explorer so I just had to try it out. These are not bogus statistics. These graphs show the average of all the millions of actual speedtests run in the respective countries over the past 4 months. more

One-Click Unsubscription

Unsubscribing from mailing lists is hard. How many times have you seen a message "please remove me from this list," followed by two or three more pointing out that the instructions are in the footer of every message, followed by three or four more asking people to not send their replies to the whole list (all sent to the whole list, of course,) perhaps with a final message by the list manager saying she's dealt with it? more

HBO GO: Forced to Rethink Delivery Method

The granddaddy of Pay TV programmers continues to create ground-breaking content especially with its new series "Veep". The edgy new sitcom produces uninterrupted and raunchy situations for a fictional Vice President who cannot get out of her own way, making it hilarious and award-winning. Yet, HBO GO is tied to Cable TV/Satellite economics by an umbilical cord that will be hard to break. more

Unmet Fundamental Requisites for a Successful gTLDs Program

New pioneering ideas are not always welcomed or requested by consumers... Henry Ford didn't wait until people wanted a mass-market car. Citibank didn't wait until they wanted ATMs, and Jeff Bezos didn't wait until they decided to shop on their computers. But the three innovators did more than follow a vision. Before they made their respective leaps, they pondered what people did want. They asked themselves some hard questions. more

Undesirable Consequences of Empirical Studies on Cybersquatting

Empirical studies on cyber- and typosquatting (for example, Moore and Edelman's "Measuring the Perpetrators and Funds of Typosquatting") may inadvertently encourage bad behavior. People tend to do what most other people are doing, even when the given act is presented to them as something wrong. more

Spam Kings: Book Review (Part 1)

A few months ago, I purchased the book Spam Kings, but only recently managed to get around to reading and finishing it. In case you've never read it, it chronicles the stories of some spammers and the anti-spammers who fought them. These anti-spammers are not people like myself in industry; rather, they are users who have received spam who hunt down the source of the spam and work to bring them down. more

SpaceX Launches “Second Generation” Starlink Satellites

In interviews last Spring, Elon Musk said the data throughput of the next version of Starlink satellite (Gen2) would be almost an order of magnitude greater than that of the first generation and that the new Starship rocket would be needed to launch them. Regulatory and engineering delays slowed Starship's progress, so the Gen2 satellites Musk referred to at the time have not yet been launched. more

Could SNET Become Cuba’s Guifi.net?

In an earlier post, I described Havana's community network, SNET, and wondered what it could become if the government and ETECSA were willing to legitimatize and support it. Spain's Guifi.net provides a possible answer to that question. Guifi.net is said to be the largest community network in the world. It began in 2004 and has grown to have 34,165 nodes online with 16,758 planned, 407 building, 612 testing and 4,043 inactive. more

Topics

DNS Security

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days