Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Cybersecurity Considerations in the Work-From-Home Era

Verisign is deeply committed to protecting our critical internet infrastructure from potential cybersecurity threats, and to keeping up to date on the changing cyber landscape. Over the years, cybercriminals have grown more sophisticated, adapting to changing business practices and diversifying their approaches in non-traditional ways. We have seen security threats continue to evolve in 2020, as many businesses have shifted to a work from home posture due to the COVID-19 pandemic. more

The Cock and the Goat: ICANN in the Age of Horrorism

Like everyone else, former ICANN board members have been preoccupied by the horrific November 13th, 2015 attacks on Paris, France, by a bunch of cold-blooded mass murderers. Our email list discussion of the Paris attacks covered a number of issues, including the inevitable question: what, if anything, should ICANN do in response? Some list subscribers concluded that the events had nothing to do with ICANN's mission, and that we should just sigh and move on. Others, on the other hand, said: not so fast, it would serve ICANN well to take a closer look at the matter, and its ramifications on wider world of ICANN.  more

Happy 50th Birthday Ethernet

ome 50 years ago, at the Palo Alto Research Centre of that renowned photocopier company Xerox, a revolutionary approach to local digital networks was born. On the 22nd of May 1973, Bob Metcalf authored a memo that described "X-Wire," a 3Mbps common bus office network system developed at Xerox's Palo Alto Research Center (PARC). more

A Look at Cuba’s Digital Revolution

In spite of having a slow, expensive, government-controlled Internet infrastructure, Cuba is undergoing what Ted Henken and Sara Garcia Santamaria refer to as a digital revolution. The digital revolution might be said to have begun in 2007 when Yoani Sánchez launched her blog "Generation Y." Internet access was difficult -- she would get illegal connectivity at tourist hotels, and the blog was initially hosted in Germany. Soon, the Huffington Post began publishing her posts, and she has subsequently received many international awards, including the Ortega y Gasset Award for Digital Journalism in 2008. more

Abusive Conduct: Domain Name Registrants and Rights Holders

Abusive conduct or cybersquatting is the essence of disputes under the Uniform Domain Name Dispute Resolution Policy (UDRP), usually by domain name registrants violating their warranties of registration but also (in appreciable numbers) by trademark holders overreaching their statutory rights. The UDRP remedies are asynchronous: there is forfeiture of offending domain names; for abusive use of the process there is reverse domain name hijacking (RDNH), essentially a shaming remedy that substitutes for a monetary penalty. more

Response Policy Zones (RPZs): Use as a Blocklisting Process

Gradually it seems the word is spreading about a new blocking methodology to interrupt the ability of end users to click and visit phishing sites - thereby having their personal information/credentials at risk. This is the DNS Response Policy Zones. DNS RPZs allows companies that run recursive resolvers to create a zone that will not resolve specific domains. more

KerryEdwards.com Buyers Get Second Chance

The widely publicized auction of the domain name KerryEdwards.com ended Saturday night, but the search for a new owner continues. According to Matt Bentley, CEO of Sedo.com, the domain name brokerage managing the sale, a key bidder withdrew at a late stage in the auction, leaving the domain up for grabs among the dozen or so parties who had expressed a serious interest in purchasing the domain. more

Rewiring Internet Governance: Step One Is About ICANN (Part 1)

It is time for some straight talk about governance. The word "governance" used here means authority. It does not merely mean rules, or coercion, or any other weasel-worded definitions that deflect our attention from the art of good governance as distinct from self-serving opportunism and illusory power sharing. Politics, as Theodore Lowi reminded us, is ultimately about "who gets what". Quibbling with endless essays about who rules the root is useful, but not demonstrative. more

ICANN Chief Announces Departure Via Twitter

ICANN's CEO and President, Rod Beckstrom, has announced that he will be stepping down in July of next year. The announcement came via Twitter of all places, with a press release, presumably with more details, due sometime soon... With the launch of the new Top-Level Domain (TLD) program scheduled to officially launch early in 2012 maybe Beckstrom feels that his job "is done", or maybe there's another motive behind his departure. more

Satellite Broadband, Stimulus Funds and Network Neutrality

At the IP Satellite Summit in Washington this week, a panel composed of satellite service providers and product vendors discussed whether or not they would pursue the economic stimulus funds set aside for broadband development. While the service providers agreed that there are viable business models for satellite broadband service without the stimulus money – of course, they were delivering service before the current economic collapse and talk of the stimulus money – the consensus seemed to be that they would apply for the grants to further develop, deploy and perhaps even subsidize their service offerings... more

From Net Neutrality to Seizing Opportunity

Network neutrality is important in the context of assuring the opportunity to innovate in how we communicate and connect. We can't define it in terms of specific outcomes but rather in terms of what we enable. The Internet is just one example of what we can do when given the opportunity to use software to fashion our own solutions... I thought about this more when I found myself in my hospital room (after knee surgery) unable to open and close the shades by myself. But yet I could control the lights in my house! more

We Are All Internet Exceptionalists Now

The Stop Online Piracy Act (SOPA) and its defeat call attention to a delicious irony in public discourse on Internet governance. Even those who don't want the Internet to be an exception from traditional forms of regulation and law are forced to admit that something new and exceptional must be done to bring it under control, such as massive departures from traditional concepts of territorially bounded sovereignty through the use of in rem jurisdiction. more

Are You Ready for the Launch of New gTLDs?

It seems as though the inevitable is now upon us, and though there are many that have wished this day never come, the launch of the first new gTLD registries is approaching. Now whether the first new gTLD registry will launch within the next few months or be delayed due to Advice from world governments remains to be seen. However, most companies with which I have spoken desperately need any extra time to prepare for the launch of new gTLDs. more

IPv6 and MEID’s… Stop Choking on 32 Bits

Both the Internet and North American cellphones are choking under a 32 bit limitation and reactions from protagonists involved in both cases offer striking similarities. 1983 saw the debut of IPv4 and North American mobile telephony started in earnest with Bell's analog AMPS (Advanced Mobile Phone Service). Responding to the need to uniquely identify the growing number of mobile devices in order to bill their owner, the FCC ordered that handsets be equipped with a unique identification number embedded on a chip. This became the 32 bit ESN... more

Disruptive Google Fiber Is Shaking up the Telco World

The Google Fiber project is receiving international attention. This in itself is a good thing, since it brings the benefits of high-speed FttH infrastructure to the attention of large numbers of people in business and government who will not have to deal with such developments on a regular basis... At the same time we have to look at Google Fiber from the point of view of operating in the American regulatory environment. Yes, we can all learn from its disruptive model, and particularly when the results of the more innovative elements of the services begin to kick in; but for other reasons there is no way that this model can be replicated elsewhere. more

Topics

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

DNS Security

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days