Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Transfers of Domain Names Contemporaneous with Complaint: Cyberflight?

Cyberflight (defined as strategically transferring accused domain names to another registrar or registrant upon receipt of a complaint) was a sufficient irritant by 2013 for the ICANN to adopt recommendations to amend the Rules of the Uniform Domain Name Dispute Resolution Policy (UDRP). Effective July 1, 2015 the Rules now include a requirement for locking the domain as well as a change in the timing of transmitting the complaint to respondents. Before the amendment there had been no uniform approach to locking. more

The Sportsmanship of Cyber-warfare

As a bit of a history buff I can't avoid a slight tingling of déjà vu every time I read some new story commenting upon the ethics, morality and legality of cyber-warfare/cyber-espionage/cyberwar/cyber-attack/cyber-whatever. All this rhetoric about Stuxnet, Flame, and other nation-state cyber-attack tools, combined with the parade of newly acknowledged cyber-warfare capabilities and units within the armed services of countries around the globe, brings to the fore so many parallels... Call me a cynic if you will, but when the parallels in history are so evident, we'd be crazy to ignore them. more

Five Reasons to Avoid Using Maps on Websites

Robert Frost wrote that good fences make good neighbors. Yet when it comes to virtual fences, visualized as maps, I'm not sure there is any way to create "good fences." So many regions around the world are under dispute. And even regions that may appear settled may be anything but. I've long written about the problems of using flags on your website, particularly for navigation. But maps often present a much larger geopolitical challenge. If you can avoid using them, do so. more

The Global Internet Through a Local Lens

As the Internet grows, those countries and societies with mature systems of content development, innovation and entrepreneurism will continue to be better positioned to meet these needs. At the same time, such countries are also better positioned to take advantage of the efficiency, and capacity of the Internet to amplify and extend their cultural reach and economic capacity. The implication of this amplification and extension of cultural reach and economic capacity from developed markets, is that it can drown out indigenous content and restrict local economic opportunities in developing and under-developed markets. more

A Layered Approach to IG: Cooperation or Crisis!

In an Internet governance agenda that treats diversity of addressing issues as the ultimate end at any cost, technology and its end-users are mere means, and much of the work that sustains the Internet is ignored entirely. As a nation, you are free to initiate different regulations, but when you start getting into the world of infrastructure, you are legislating far beyond the nation-state borders. more

Some Thoughts on the ICANN EWG Recommended Registration Directory Service (RDS)

It has been my distinct pleasure to serve on ICANN's Expert Working Group on gTLD Directory Services (EWG). We put in many long months and what seemed like countless hours of research, discussion, meetings, and deliberations on how to tackle a clean-slate approach to gTLD directory services, popularly known as "WHOIS". In our Final Report, the Expert Working Group (EWG) recommended a Registration Directory Service (RDS) to replace today's WHOIS, providing a next-generation system to better meet the needs of the evolving global Internet with greater accuracy, privacy, and accountability. more

Domain Name Resale Market a Haven for Phishers?

In a recent article at TechWeb, the following observations were made: "Internet addresses that appeal to identity thieves eager to rip off consumers are being posted by major domain resellers... Finnish-based F-Secure has identified more than 30 registered domain names for resale that would be of interest only to the legitimate holder of the trademark or to phishers..." more

How Not to Stop Spammers

Spam Arrest is a company that sells an anti-spam service. They attempted to sue some spammers and, as has been widely reported, lost badly. This case emphasizes three points that litigious antispammers seem not to grasp: Under CAN SPAM, a lot of spam is legal; Judges hate plaintiffs who try to be too clever, and hate sloppy preparation even more; Never, ever, file a spam suit in Seattle. more

The Journey of IPv6 Implementation 9 Months Later

ICANN 43 in Costa Rica was in the heart of IPv6 implementation with everybody touching on how much it was needed as part of the internet ecosystem to fully utilize the ICANN expansion of the new gTLD namespace from 21 to the maximum number that will manage to get delegated at the beginning of 2013. more

Keeping Cyberspace a Public Space

I recently had an opportunity to re-read a pamphlet I wrote in 2000 for a series on new thinking about mutualism published by the Co-operative Party. In 'e-Mutualism, or the tragedy of the dot.commons' I talked at length about the co-operative basis of the Internet, the need for online public spaces which are not controlled or dominated by commercial interests, and the opportunities that the network offers for mutual organisations of all sizes, from small co-operatives to retailers like John Lewis... Re-reading it now I wasn't too embarrassed by my ten-year old analysis. more

Wireless VoIP: Loss Leader or Upselling Strategy?

Verizon Wireless' decision to allow their subscribers to access Skype raises a question about strategy. Is Verizon leveraging Skype access as an inducement for subscribers to upgrade to smartphones and commit to $30 a month data plans, has the company acknowledged that its future marketplace success lies in data and not voice services, and how will the company prevent a substantial reduction in plain old voice subscriptions priced above the $30 data plan benchmark? more

Ladies and Gentlemen, China’s Netizen Day…

Just after the government announces a crackdown on Internet smut. Yesterday, they announced plans for "Netizen Day" on September 14th, which apparently marks 15 years since the first e-mail message was sent from China in 1987. The new celebratory day (I don't think it's an official holiday) was unveiled at an official ceremony presided over by Chinese government officials and Internet execs, many of whose companies - including Google, Sina, and Sohu, who were named in the smut crackdown just 24 hours before. more

Four Critical IT Elements for a More Productive Business

IT is now a boardroom discussion. Beyond troubleshooting server issues and maintaining network security, IT initiatives must provide company-wide ROI and work in unison with other department objectives. But the link between corporate efficiency and technology spending isn't always obvious -- here are four critical IT elements your business needs to improve productivity. more

Mac Hit by Another Wave of Malware… Users in Denial?

In case you haven't been watching cyber news recently, last week various security researchers published that Macs were infected by the Flashback Trojan and that the total number of infections worldwide was 600,000. This number was published by a couple of blogs. I debated writing about this topic since we had a previous Mac outbreak last year that initially spiked up, caused Apple to go into denial about the affair before issuing a fix, and then the malware kind of went away. Will this follow the same pattern? more

MySpace Wins Big Against Richter?

News rumblings are that MySpace is celebrating its $6mm award against Scott Richter and his entities... Who Won? ...I'm not sure what MySpace asked for (their complaint is probably not a reliable barometer) but the overall tone of the document written by the arbitrator is that Richter's companies shouldn't be held entirely liable for all damages to MySpace. (In fact, the arbitrator's decision takes pains to show both sides of Richter. Some would say this is typical in arbitration.) more

Topics

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days