Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

P2P: Boon, Boondoggle, or Bandwidth Hog? (The Dark Side)

Yesterday's post explained how peer-to-peer (P2P) applications use the processing power, bandwidth, and storage capacity of participants in a service rather than centralized resources. This makes such applications generally less subject to catastrophic failure, much less subject to running out of resources (since each new user brings new capacity as well as new demand), and much cheaper FOR THE PROVIDER of the application in terms of hardware and bandwidth required. It's the FOR THE PROVIDER part that's the rub. Let's consider the case of BBC's iPlayer service... more

The ‘Domain Rights Dozen’ - ICA’s RPM Revision Review Principles

As the fall of 2012 begins the implementation of rights protection mechanisms (RPMs) for new gTLDs is reaching a critical stage... Given the half year interval between the upcoming Toronto ICANN meeting and the following Beijing meeting in April 2013, it is highly desirable, and perhaps essential, that community discussion in Toronto result in a clear consensus on how RPM implementation should proceed if new gTLDs are to launch without further delay and if potential registrants are to perceive them as acceptable platforms for speech and commerce. more

.WTF Domain Being Used In Privacy Campaign

ICANN comment periods on policy proposals don't normally garner much attention. In the case of the current comment period on proxy/privacy services, however, things are very different. To date several thousand comments have been filed, while the topic of the policy proposals has received media attention across hundreds of outlets. more

Is LTE Going to Impact Free WiFi?

Developments in LTE are also going to have a significant impact on the unlicensed spectrum, which is currently used by billions of people through their WiFi modems and WiFi services in cities, cafes, airports and other venues. Known as LTE Unlicensed (LTE-U) or Licensed-Assisted Access (LAA), this technology can also ride on top of WiFi networks (without utilising the mobile service), providing high-speed broadband access to users. more

Protecting Yourself from Spear Phishing

One of the big trends this year is spear phishing. These are phish attacks that are frequently (though not always) against high profile users. The purpose of these attacks is to steal sensitive data or get elevation of privilege inside the service by exploiting a software vulnerability within the user's computer that transmits usernames and passwords back to the phisher. more

Drawing Inferences from the Record: UDRP/URS Decision-Making

The weighing of evidence involves the connecting of dots, which involves drawing inferences. However, just as there can be false positives, there can be false inferences. The tendency may be to think of inferences as coming in one size, but not all inferences are logically correct. Some are weak and others strong. The reason for talking about both kinds is that so much depends on the quality of their making. more

Afilias’ Rule Violations Continue to Delay .WEB

As I noted on May 26, the final decision issued on May 20 in the Independent Review Process (IRP) brought by Afilias against the Internet Corporation for Assigned Names and Numbers (ICANN) rejected Afilias’ petition to nullify the results of the public auction for .WEB, and it further rejected Afilias’ demand to have it be awarded .WEB (at a price substantially lower than the winning bid). Instead, as we urged, the IRP Panel determined that the ICANN Board should move forward with reviewing the objections made about .WEB, and to make a decision on delegation thereafter. more

Consumers Are the Serfs of the Feudal Internet Companies

In one of the email conversations with my expert colleagues from around the globe, an interesting article was discussed written by Bruce Scheier in Wired: When it comes to security, we're back to feudalism. An interesting aspect of the discussion was the conclusion that Google's and Facebook's consumers are not their customers. The distinction is important, because consumers are the product being sold to their actual customers who are their advertisers. more

dot DO or dot DIE?

ICANN has started dot name evaluations and charging ahead at their full speed. Mathematically it can be proven that any reasonable success of the current 1500 proposed dot names will result in tens of thousands of additional applications in the subsequent rounds. It is estimated that by the year 2020 there will be 10,000 dot names in operation and by 2025 the number would easily double. Such forecasts are not based on technological advances more

An Open Letter to ICANN’s New CEO, Fadi Chehadé

Congratulations on your appointment as the next CEO of ICANN, and welcome to our little rogues' gallery. Some denizens of this domain (your humble author included) may strike you as a little odd at first, but we're mostly harmless. We usually steer first-timers onto the Newcomers track, but in your case, that may be... inadequate. And while we would never presume to tell you how to do your job -- which may be one of the world's hardest - we thought we might offer a few pieces of friendly advice, based on our time here. more

Spammers’ Aid Program

A couple of months ago, Microsoft Sweden launched a program called Spammers' Aid. This is a program (created and provided by Microsoft?) that is designed to help spammers reform their ways. The idea is that since spam is continually decreasing in email and spammers are finding it more and more difficult to get their mail delivered into the inbox, why not use the skills they acquired while spamming (sales and marketing, tech skills) and apply it for good? This program teaches them how. more

Internet Governance After Busan: Playing the Long Game

As you might imagine, I've been following the ITU's Plenipotentiary Conference very closely. It was built up to be the great showdown of our time -- the pro-'free and open' Internet in one corner (comprised for the most part of developed and democratic nations), in the other corner a contingent of totalitarian regimes bent on a fractured, censored Internet -- a near battle royale for control of one of the greatest communications tool the world has ever seen. more

The Disadvantages of Digital Inclusion and the Perils of Non-Universal Access

Many of us are familiar with network effects within telecommunications. Fundamentally, the notion is that as the number of participants in a network increases, the value of that network increases superlinearly. Though many different theories exist about how best to value these networks, the general idea is that the more people on a network, the more benefits accrue to everyone on the network... more

Five Reasons to Avoid Using Maps on Websites

Robert Frost wrote that good fences make good neighbors. Yet when it comes to virtual fences, visualized as maps, I'm not sure there is any way to create "good fences." So many regions around the world are under dispute. And even regions that may appear settled may be anything but. I've long written about the problems of using flags on your website, particularly for navigation. But maps often present a much larger geopolitical challenge. If you can avoid using them, do so. more

Kenya’s .KE Domain Registrations Nearing 100,000 Mark, but It Can Do Better – Here’s Why

Over the years, the Kenyan Network Information Center (KeNIC) has struggled to reach the 100,000 mark in .ke Kenya country code domain registrations. Many reasons have been given for this shortfall, among them pricing, competition from generic Top-Level Domains (gTLDs) like .com and .org, and also competition from Geographic domains like the new .africa. Also, not opening up the second level for registration has been cited as one of the reasons for the low number. more

Topics

DNS Security

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days