Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

First Impression: FCC Rules for the 700MHz Auction

The FCC has issued rules which will govern the auction of valuable radio spectrum which could make a huge difference in the price and quality of communications in America. The glass is definitely half something: I'd say closer to empty than full but there are some things to like and some hope for competition. The decision is a compromise. Republican Chairman Martin was joined by Democrat Commissioners Adelstein and Copps in setting some open access conditions for 22MHz out of the 62MHz which will be auctioned. Republican Commissioner Tate reluctantly went along with these conditions and Republican McDowell voted against them. more

DOTZON Study: Digital City Brands 2024

We've just published the 2024 edition of the DOTZON study "Digital City Brands." After introducing the study in early 2017, DOTZON has mapped how successful cities are using their Digital City Brands for the seventh year in a row. The Digital City Brand is the digital dimension of the City Brand and mirrors the "Digitalness" of a city. The advent of the Internet was why Digital City Brands came into being in the first place. more

The Dangers of Building a Brand on a Tenuous Country Code

About two years ago I wrote with concern about Bit.ly's use of Libya's country code. I noted that It's always important to keep in mind that a company can't "own" a domain the way it owns real estate. Now it appears that companies that have built brand names on Libya's country code are facing difficult times. more

IRMA Threatens Irish ISPs

I don't want to get into the entire Irish Recorded Music Association (IRMA) vs Eircom and IRMA vs ISPs debacle. The only reason I'm even writing this is because I'm getting a bit tired of all the "quotes" of "quotes" and other unclear and misleading things that people have been saying about ISPs over the last few weeks. more

What Domain Names Get Transferred: Why and Why Not?

Think of trademarks situated on a continuum with famous and well-known at one end and less well-known or unrecognized by average consumers at the other. On one end there is certainty of infringement... at the other end, certainty of having the complaint denied either for lack of proof or overreaching... At some point along the continuum, it becomes uncertain whether respondents registered accused domain names in bad faith, and the question has to be answered by examining the facts. more

Automation for Physical Devices: the Holy Grail of Service Provisioning

Software-Defined Networking (SDN) and Network Functions Virtualization (NFV) are finally starting to pick up momentum. In the process, it is becoming clear that they are not the silver bullet originally advertised to be. While great for some use cases, emerging technologies like SDN and NFV have been primarily designed for virtual greenfield environments. Yet large service providers continue to run tons of physical network devices that are still managed manually. more

Cybercriminals Benefitting from Stalled Privacy/Proxy Policy

We've seen alarmingly BIG increases in multiple abusive behaviors – like phishing, hacking and malware – that often leverage the domain name system (DNS) and privacy/proxy services. Cybercriminals capitalize on gaps in DNS security measures, and ICANN is holding the door open for them by failing to implement their privacy/proxy policy. If you are ever targeted, you are not alone. more

Do We Really Need a New BGP?

From time to time, I run across (yet another) article about why Border Gateway Protocol (BGP) is so bad, and how it needs to be replaced. This one, for instance, is a recent example. It seems the easiest way to solve this problem is finding new people - ones who don't make mistakes - to work on BGP configuration, building IRR databases, and deciding what should be included in BGP? more

10 Reasons Why New gTLDs May Not Work For You

World's mega businesses are about to wake up to the domain name expansion reality, where suddenly a name identity's exclusive ownership on global canvas of cyber branding and functionality will be ensured via gTLD. Something that traditional trademark system took years to achieve. A gTLD brand is not for everyone, structurally designed for powerful new ideas and established organizations around the world; however, following are the ten reasons why it may not work for you. more

Large Hadron Collider, Nessus, and the InterWebz

CERN put the Large Hadron Collider through some rigorous tests, and apparently at first some of the Siemens manufactured SCADA systems failed. While they are apparently better now, and I am happy to see how serious CERN is about security, this does beg the question... WAIT! You mean it's connected to the Internet? I suddenly don't feel so safe. more

Why Is the Client-Side Scanning a Concern for Encryption?

As today is the Global Encryption Day, I decided to make my first post here on this topic. About two months ago, Apple caused a controversy by announcing the adoption of a measure to combat the spread of Child Sexual Abuse Materials (CSAM). The controversy was so huge that, a month after its announcement, Apple decided to postpone its plans for the new features to have more time to gather information from the various stakeholders and implement improvements before releasing the measures originally announced. more

Yes, 3 Billion Net Users by End of Year, but What Will the Majority in Emerging Markets Do Online?

The United Nations International Telecommunications Union (ITU) announcement that by end 2014, there will be nearly three billion Internet users -- two-thirds of them from the developing world -- with mobile-broadband penetration approaching 32 per cent. This information is so timely that it needs to be put in proper perspective by asking: What will the majority of these two-thirds do online? And how do we in the ICANN community deliver on our mandate of serving the global public interest? more

Cloud Brokerage and Other Business Opportunities

The market for cloud computing is getting more interesting every day. There is still a long way to go, as the success of cloud computing depends not only on high-speed networks, but also on capacity, robustness, affordability, low latency, ubiquity, security, privacy and reliability. Of course, the ideal infrastructure would be nationwide FttH networks, but obviously we can't wait for that... more

Why the Internet is Not Like a Railroad

When one person transmits the speech of another, we have had three legal models, which I would characterize as Magazine, Bookstore, and Railroad. The Magazine model makes the transmitting party a publisher who is entirely responsible for whatever the material says. The publisher selects and reviews all the material it published. If users contribute content such as letters to the editor, the publisher reviews them and decides which to publish. more

Collecting Cybercrime Data: Can Signal Spam Be a Piece of the Puzzle?

The gathering of coherent data on cybercrime is a problem most countries haven't found a solution for. So far. In 2011 it is a well known fact that spam, cybercrime and botnets are all interrelated. The French database Signal Spam may be a significant part of the solution to gather, analyse and distribute data on spam, phishing, cybercrimes and botnets, but also be a forum in which commercial mass e-mail senders and ISPs can work on trust. more

Topics

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

DNS Security

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days