Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

ARIN Increases Support for Caribbean Internet Development

For anyone wondering how Internet development is evolving in the Caribbean, an international conference held in Bridgetown, Barbados, hosted by the American Registry for Internet Numbers (ARIN), provided more than a few positive clues. The second annual ARIN Caribbean Forum attracted Internet policymakers, computer networking and cybersecurity experts and law enforcement officials from across the Caribbean, North America and Europe for high-level talks under the theme "Caribbean priorities for the global Internet." more

Role of Finance Leaders is Specialized in TLD Launches

When I first entered the domain industry as head of finance and operations at .MOBI, the company had just acquired its licence from ICANN. I did a quick overview of the business environment through a financial lens. My first impressions were predominantly positive. Sales were generated up front on a cash basis, which put registry operators in an enviable operational cash flow position... Outsourcing the back-end registry operations meant that we could tie cost of goods sold (COGS) to activity. But I had a steep learning curve... more

Going Dark: How the Increasingly Dark Network Is Creating Some Pretty Ugly Choices for Site Security Administrators

I'd like to reflect on a presentation by Dr. Paul Vixie at the October 2022 meeting of the North American Network Operators Group (NANOG) on the topic of the shift to pervasive encryption of application transactions on the Internet today. There is a view out there that any useful public communications medium needs to safeguard the privacy and integrity of the communications that it carries.  more

Enabling Privacy Is Not Harmful

The argument for end-to-end encryption is apparently heating up with the work moving forward on TLSv1.3 currently in progress in the IETF. The naysayers, however, are also out in force, arguing that end-to-end encryption is a net negative... The idea of end-to-end encryption is recast as a form of extremism, a radical idea that should not be supported by the network engineering community. Is end-to-end encryption really extremist? Is it really a threat to the social order? more

How the NSA is Threatening the Future of Google, Facebook, Amazon and Others

When I read government arguments in defense of the NSA, an oft-repeated line was: We're not targeting Americans. We're targeting foreigners. Foreigners. I really dislike that word. And I'm sure companies like Apple, Google and Facebook do as well. Why? more

The World of the Subdomain

A web domain name is the foundational piece of internet property allowing its owner (registrant) to construct and host an associated website. On a domain, the owner is also able to construct whatever subdomains they wish -- a process that is technically achieved via the configuration of records on the authoritative domain name system (DNS) server. more

China: We Lead 3GPP Wireless Standards

In 2018, nothing can get approved in 3GPP that China strongly opposes. In the past, 3GPP often was a battle between a few American giants and their European peers. A Qualcomm or a Nokia will still be heard, but the power has shifted. I haven't seen evidence that the Chinese influence has made for better or worse standards. There are now over a billion 4G subscribers at the big 3 Chinese telcos, by far the largest equipment buyers. Nokia, Ericsson, and the other vendors do not dare oppose their largest customers. more

Canadian Marketing Association Attacks Anti-Spam Bill

With the final Industry Committee review of C-27, Canada's anti-spam legislation, set for Monday afternoon, lobby groups have been increasing the pressure all week in an effort to water down many of the bill's key protections. Yesterday, the Canadian Marketing Association chimed in with an emergency bulletin to its members calling on them to lobby for changes to the bill. While the CMA was very supportive of the bill when it appeared before the committee in June, it now wants to kill the core protection in C-27 - a requirement for express opt-in consent. more

Re-Examining the Domain Name Registry-Registrar Split

ICANN has released to the public a report they commissioned called "Revisiting Vertical Separation of Registries and Registrars," written by CRA International. It is being referred to as the "CRAI Report." Readers in the U.S. and the U.K. may not know it, but most top-level (TLD) domains in the world don't have registrars-you go straight to the registry and buy your domains from the source. more

Whatever Happened with Namespace Collision Issues and the gTLD Round of 2012

The new gTLD program of 2012, based on the Generic Names Supporting Organization (GNSO) policy recommendations of 2007, has been both a success and mess. In terms of its success, many new and innovative names are being introduced on the Internet, more most every day. The mess has involved ad-hoc, independent decisions by the Board and implementation decisions by ICANN staff that have resulted in variety of problems including a broken community evaluation process... more

New gTLD Availability Inching Closer to Reality

As many in the ICANN community prepare to depart for the sunny beaches of Cancun, Mexico, it appears the ICANN 76 meeting could be significant when it comes to the long-awaited next application window for gTLDs. It's been over 11 years since applicants were last able to apply for a gTLD (and some of those strings are still launching into the marketplace all these years later), and the community work to review that initial process has never really stopped. more

Surveillance Capitalist in Chief

Surveillance capitalism monetizes private data that it collects without consent of the individuals concerned, data to analyze and sell to advertisers and opinion-makers. There was always an intricate relationship between governments and surveillance capitalists. Governments have the duty to protect their citizens from the excesses of surveillance capitalism. On the other hand, governments use that data, and surveillance capitalism's services and techniques. more

Happy 50th Birthday Ethernet

ome 50 years ago, at the Palo Alto Research Centre of that renowned photocopier company Xerox, a revolutionary approach to local digital networks was born. On the 22nd of May 1973, Bob Metcalf authored a memo that described "X-Wire," a 3Mbps common bus office network system developed at Xerox's Palo Alto Research Center (PARC). more

Cisco Collaboration Summit - Where Unified Communications Could Be Going

This year's Cisco Collaboration Summit was a step up from last year, and I say that for good reason. Last year's event was good -- all of Cisco's events are good -- but the venue was too small and it took away from the messaging. For 2010, Cisco went out of town to the classy and classic Arizona Biltmore in Phoenix. They don't build them like this anymore, and to me, this setting did far more justice for what Cisco has to say about collaboration. more

When is Similarity Confusing? Cybersquatting and Abusive Registration

The case I'm reporting on today has garnered attention from a number of quarters. One commentator, Andrew Allemann tells us that "[he's] struggling with this UDRP decision" and Nat Cohen of Telepathy Inc. in a couple of Tweets and a private conversation is concerned that the holding could be a Trojan Horse by erasing the distinction between merely confusing and confusingly similar. The problem centers on the Panel's holding that everyfamily.org is confusingly similar to EVERYTOWN... more

Topics

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

DNS Security

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days