Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

The Dangers of Building a Brand on a Tenuous Country Code

About two years ago I wrote with concern about Bit.ly's use of Libya's country code. I noted that It's always important to keep in mind that a company can't "own" a domain the way it owns real estate. Now it appears that companies that have built brand names on Libya's country code are facing difficult times. more

Thinking of Applying for a Truly Generic TLD, but Restricting Ownership to a Single Registrant?

As it's coming down to brass tacks and companies are now seriously considering applying for their own .Brand Top-Level Domain (TLD), questions about whether to also apply for a truly generic TLD keep popping up. Many large corporations want to know whether it's even possible to apply for something like .Shoes AND to restrict registrations so that only a single specified registrant is allowed. After all, for the right company it seems that something like .Shoes could be a valuable namespace -- short, easy to remember, and easy to spell. more

State of Broadband Report 2014

Last Sunday I attended the 10th meeting of the UN Broadband Commission for Digital Development in New York, where we launched this new report -- State of Broadband Report 2014. Here are some of the highlights of the report. Over 50% of the global population will have Internet access within three years' time, with mobile broadband over smartphones and tablets now the fastest growing technology in human history, according to the 2014 edition of the State of Broadband report. more

Does Apple’s Cloud Key Vault Answer the Key Escrow Question?

In a recent talk at Black Hat, Apple's head of security engineering (Ivan Krsti?) described many security mechanisms in iOS. One in particular stood out: Apple's Cloud Key Vault, the way that Apple protects cryptographic keys stored in iCloud. A number of people have criticized Apple for this design, saying that they have effectively conceded the "Going Dark" encryption debate to the FBI. They didn't, and what they did was done for very valid business reasons -- but they're taking a serious risk... more

Round Two of New gTLDs: No Crap

So you're still lost, wondering where to start and what to do to submit your application in the next round of new top-level domain application? Well, you can attend webinars and listen to service providers telling you what you have to do with them "to be prepared"... but please... pay no one for this. Here is why. There are two things to know and one thing to do first. more

Trying to Predict Miguel Diaz-Canel’s Internet Policy

I recently gave a short talk that concluded with some speculation on the attitude of Miguel Diaz-Canel, who is expected to replace Raúl Castro next year, toward the Internet. I searched online and came up with three clues -- two talks he has given and one act. In May 2013, Diaz-Canel gave a speech at an educator's conference in which he anticipated today's preoccupation with fake news. He acknowledged the futility of trying to control information. more

How Safe is FttH?

My blog 'What PRISM, credit card hacking and Chromecast have to do with FttH' led to some very interesting discussions all around the world. One of issues that was discussed was that the sheer capacity of FttH will also allow hackers, criminals and others to use that massive capacity for the wrong reasons. Its volume will make it increasingly difficult to police. more

IANA: A Tale of Two Fails

The IANA -- Internet Assigned Numbers Authority -- is, functionally, the boiler room of the Internet. Every protocol in use to shovel data from Tallahassee to Timbuktu? Listed there. IP addresses? They are the root from which all addresses flow. Domain names? They are the Source. The entire operation is chock-full of magic numbers, numbers that form and fuel the digital world we use daily. But there are other, lesser-known numbers... It is of PENs that I write today... more

Is It Time to Supplement Desktop Security Protections?

Internet users are acutely aware of their exposure on the Internet and clearly concerned about their safety. Increased downloads of scareware as Conficker made headlines in the mainstream media are only the latest evidence. Desktop software is often viewed as a one-stop shop for fighting Internet threats such as viruses, worms and other forms of malware and phishing. These solutions have served us well but more protections are needed to address the dynamic and increasingly sophisticated web based exploits being launched... more

The Internet of Things and User-Generated Internet Energy

One of the key factors in the transformation of the telecommunications industry was the fact that, thanks to the internet, end-users were suddenly able to become active participants in generating content for both private and public use. Companies such as Google, Amazon, eBay, Skype and Apple, followed by a number of national and international social media companies, all became involved in these new developments, and they became the great game-changers of the industry. Telecoms companies were caught off guard... more

Disappearing Telephony

I'm just stepping back a minute to think about what Emerging Telephony actually is. You might have seen my earlier musings on the different philosophical underpinnings of "Western" telephony and "Eastern" thought. In an oversimplified nutshell, the Western approach puts the individual in the centre of the universe. The Eastern idea is to put the group in the middle. more

US Election-Related Web Properties Prone to Fraud and Misinformation Due to Lack of Domain Security

The risks of fraud and disinformation in the U.S. election process have been hiding in plain sight. CSC's new research finds that a large majority of web domains closely linked to the campaign websites for Joe Biden and Donald Trump lack basic domain security protocols and are prone to domain spoofing tactics. This makes them a potential target for hackers looking to spread disinformation ahead of the election, and criminals who want to take advantage of voter intentions... more

May 31 Deadline for $517,000 US in Internet-related Grants in Africa and Asia Pacific

If you are located in Africa or the Asia Pacific region, this coming Tuesday, May 31, is the application deadline for an excellent series of grants related to Internet infrastructure, development, security and education. I just wrote about the Internet Society Cybersecurity Grant for up to $56,000 AUD (roughly $40K USD) in the Asia Pacific region... but it is part of a larger set of grants that all have a deadline of May 31. more

On the Question of Closed Generic Top-Level Domains

The debate over so-called "closed generic" top-level domains has revealed that rarest of semi-mythical beasts, a creature often emblazoned in ICANN heraldry but as elusive as the unicorn on the UK royal coat of arms: an argument on principle. Occasionally an issue arises out of the muck of self-interested manoeuvring to reveal the deep idealism that moves most ICANN participants. You can see it by how it divides camps that usually march along in lock-step, and by how the predictable murmur of shopworn cliches is replaced by arguments of clarity and resonance. more

Comcast Xfinity App Argument: Risking Divestiture of Cable or Broadband

This sounds extreme, but Comcast continues to push the boundaries in separation of its broadband service with its cable service. It is walking a thin line between being a broadband provider, offering fast Internet access to millions of subscribers, and treating its Xfinity Xbox 360 App as a priority over customers not having its cable service. Saying the Xbox 360 is just another set-top-box for its own customers is just a complex way of undermining Net Neutrality rules as defined by the FCC upon the companies purchase of NBCU. more

Topics

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

DNS Security

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days