Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

ICANN Openness and Transparency: Actions Speak Louder than Words

ICANN has announced that they will be having a Special Meeting of the ICANN Board on 19 February 2010 (3:00 UCT) to discuss the "upcoming ICANN International meeting." It is reasonable to assume that the 17 February 2010 security update will be a topic of discussion... I trust that the ICANN Board will make the right decision balancing the obligations that ICANN has to the global Internet community, with the safety and security of those ICANN stakeholders that participate in person at these ICANN events. However, the ICANN Board needs to gain the trust of the global community in connection with this and other important decisions that it will be making. more

Credibility and Disbelievablity as it Affects Outcomes in UDRP Proceedings

"Credibility" in English comes through Middle French from a Latin word signifying trustworthiness and reliability in business and personal transactions (allegations, contentions, statements, promises, etc.). Where the goal is persuasion, exaggerating, embellishing, withholding, and falsifying evidence or accusing the adverse party of some heinous crime is not a winning strategy for proving claims or defenses. more

The Christmas Goat and IPv6 (Year 6)

When I last year failed to take a picture of the Christmas goat before it was taken down, I decided this year to take a pic every minute, just to be on the safe side. A shortened movie based on these pics of the 2015 Christmas Goat can be find on YouTube. The clip on YouTube also shows that in the early morning of December the 27th the goat was set on fire and burned down in minutes. more

Canadian Government Quietly Pursuing New ISP Code of Conduct

If approved, the code would technically be voluntary for Canadian ISPs, but the active involvement of government officials suggests that most large providers would feel pressured to participate. The move toward an ISP code of conduct would likely form part of a two-pronged strategy to combat malicious software that can lead to cybercrime, identity theft, and other harms. First, the long-delayed anti-spam legislation features new disclosure requirements for the installation of software along with tough penalties for non-compliance. more

Broadband Technology Improving - Faster, Smarter, and More Versatile Connectivity

Broadband infrastructure is advancing rapidly, from multi-gigabit cable and fiber networks to next-generation fixed wireless and satellite systems. With speeds reaching up to 25 Gbps for consumers and 1 Tbps in orbit, these developments mark a pivotal shift in connectivity, setting the stage for more scalable, flexible, and high-capacity networks. more

ICT Sectors Are Merging Into a New Wholesale Platform for the Networked Economy

There certainly is a lot of interest in the IoT (personal devices) and M2M (industrial applications) market. But what we are seeing is only what is happening on the surface. Most of the IoT and M2M activities are taking place unseen. For example, all new electronic devices (smartphones, tablets, set-top boxes, game consoles) are now IoT devices. Wearable technology has also become a thriving part of the IoT industry, with an ever-broadening range of possible uses and devices, including smart watches, glasses, clothing items, skin patches, and even implants for health monitoring. more

Privacy and Security - Five Objectives

It has been a very busy period in the domain of computer security. With "shellshock", "heartbleed" and NTP monlink adding to the background of open DNS resolvers, port 445 viral nasties, SYN attacks and other forms of vulnerability exploits, it's getting very hard to see the forest for the trees. We are spending large amounts of resources in reacting to various vulnerabilities and attempting to mitigate individual network attacks, but are we making overall progress? What activities would constitute "progress" anyway? more

ICANN Mission Creep is Becoming Mission Leap

Under the leadership of Fadi Chehade and Steve Crocker, ICANN finally runs like an organization that has grown up. When it comes to process, accountability, and transparency, this is excellent news for the Internet. But it also raises a new question: how far will we let ICANN grow "out" of the limited technical mission for which it was created? In his opening remarks here in Durban, Chehade announced the expansion of local engagement centers and significant expansion of ICANN staff - for the second straight year. more

The ‘Domain Rights Dozen’ - ICA’s RPM Revision Review Principles

As the fall of 2012 begins the implementation of rights protection mechanisms (RPMs) for new gTLDs is reaching a critical stage... Given the half year interval between the upcoming Toronto ICANN meeting and the following Beijing meeting in April 2013, it is highly desirable, and perhaps essential, that community discussion in Toronto result in a clear consensus on how RPM implementation should proceed if new gTLDs are to launch without further delay and if potential registrants are to perceive them as acceptable platforms for speech and commerce. more

Mobile: The Major Battleground

Interesting developments in the USA, Australia and New Zealand are giving some insight into the future direction of the mobile industry. In May BuddeComm reported proposed merger between AT&T and T-Mobile as a major threat to competition in the USA. This was viewed as a very obvious issue, and that under normal circumstances such a deal would be rejected by the FCC. But circumstances are no longer normal... more

Slippery Slope

Last week, I visited Budapest to deliver a speech at the ICANN Studienkreis, an annual conference where experts study and address some current issues relating to Internet governance. I discussed how the Internet is on a slippery slope. Starting with the legitimate concern over how to deal with cybersquatters, we have moved to an unreasonable focus on legal control of Internet content and the domain name system. more

Sopho’s Threat Report Focuses on Social Network Spam

The latest Sophos Threat Report shows an upward trend in spam and identity theft through social networks. One of the examples Sophos gives is Facebook. In general Sophos claims that from 2009 to 2010 the spam, phishing and malware containing messages all doubled. more

Domain Transfers… Domain Hijacking… Make Your Voice Heard

ICANN's Generic Names Supporting Organisation (GNSO) has formed a working group to consider changes to the domain transfer process to enhance security and reduce hijacking. The working group consists of registrars, aftermarket players, domainers and other members of the ICANN Community. The group published its preliminary recommendations at the ICANN meeting in Brussels two weeks ago and the 20-day comment period has just begun. more

GDPR and What Comes Next: The Parade of Horribles

The compliance deadline for the European Union's General Data Protection Regulation (GDPR) is nearly upon us, the unveiling of a proposed model to bring WHOIS into compliance is said to come from ICANN next week, and everyone is scrambling to understand all that's involved. Implementation of a revised WHOIS model is clearly on the horizon, but what comes after may be the real story! Specifically, if WHOIS information becomes more than nominally restricted, what's the consequence to the data controllers (ICANN and the contracted parties) who implement this revised model? more

ICANN Board Retreat Results in Specific New gTLD Directives

Over the weekend, ICANN's Board of Directors met in Norway to discuss the fate of new generic Top-Level Domains (gTLDs). As a result of the meeting, two resolutions were passed related to new gTLDs. First, the Board resolved to recommend further actions based on comments recently submitted by the Governmental Advisory Committee. The second resolution directed the ICANN CEO to incorporate a number of items into the fifth version of the Guidebook including... more

Topics

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

DNS Security

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days