Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Corporate TLDs - Why Keeping Mum Seems to Be the Order of the Day

Global brand protection powerhouse MarkMonitor recently released survey results revealing the intentions of their corporate clients with respects to new gTLDs. After reading the report, it's fair to say that I'm not surprised by the results, but continue to be frustrated by them. Where are all of these forward thinking and revolutionary online marketers and brand managers? Are they so unaware of the opportunity that has been placed before them or are they just being very savvy? more

Cuba Testing 3G Internet Access

ETECSA, Cuba's monopoly ISP, has been running free tests of their forthcoming mobile access. It seems that the latest test is over for now, but Andy Garcia (@Dancuba96) ran a speed test before it ended... ETECSA has not announced when commercial 3G service will commence, where it will be available at first and what it will cost, but the following image at the start of the @ETECSA_Cuba Twitter page suggests that service will begin soon they are serious about mobile #Internet access. more

Registering and Monetizing Personal Names

At the top of WIPO's list of the most cybersquatted trademarks for 2015 (issued on March 18, 2016) is "Hugo Boss" with 62 complaints. The report also reveals that the fashion industry led other commercial sectors with 10% of complainant activity. Not surprisingly, in this sector companies (couturiers extending their services to the general public) are branded with the personal names of their founders. Why any registrant would intentionally target well-known personal names in the fashion industry is a mystery because there's no future in it. In fact, complaints are never answered and always successful. more

Facebook vs Google: The Pot Calling the Kettle Black

In case you missed it a few days, a story broke that said that Facebook was caught hiring a PR firm to spread stories about Google about how they invade people's privacy... Even though I work for Microsoft and therefore can hardly be considered unbiased, I think Microsoft would be in a position to call out others for lack of privacy protection. I say this based on the fact that in my division, every new feature that we implement has to go through Privacy reviews... more

How Will Banks Ensure the Safety of Our Money? DDoS Attacks on NL Banks

This week bank costumers of The Netherlands were shocked when they realised that online banking may not be as safe as they thought. Perhaps some were surprised to hear that what they think is money, is nothing but digits, something that does not exist. Their money only exist because we all act as if it exists and accept transactions between each other aided by software run by banks, if they haven't outsourced that function. more

Are We Giving Up On Broadband Equality?

One of the worldwide challenges in relation to the development of national broadband networks is equality. Broadband is critical for the digital infrastructure and it is essential that everybody enjoys the same level of quality and affordability. This is a major challenge and as a rough measuring stick approximately one-third of the people in developed economies would miss out if there were not a requirement for equality. We see some of the problems related to this issue arising in other countries. more

Is 47 USC 230(c) an Immunity or an Affirmative Defense (Does it Matter?)

Procedure matters. It matters whether a defendant can dispose of a litigation right out of the gate, or whether the defendant must suffer the slings and arrows of discovery, motions, and trial before presenting a successful defense. Procedurally, once a litigation has been initiated, defendant has a chance to say, "hey, wait a minute, there isn't actually a cause of action here." It's like someone suing me for being tall. Well, yeah, but there is no recognized cause of action against being tall. more

Minding the GAC and the Heckler’s Veto

ICANN meetings sometimes congeal around a single theme. In San Francisco the theme was captured on clever t-shirts bearing the iconic symbol of the London Underground with the words, "Mind the GAC." Here was a succinct and timely plea for the ICANN Board to pay serious attention to the Governmental Advisory Committee (GAC)'s concerns about new generic Top-Level Domains (gTLDs), rather than to risk undermining the long-term viability of the multi-stakeholder model. more

The ITU Busan Plenipotentiary

The ongoing ITU Plenipotentiary Conference in Busan South Korea is the quadrennial gathering where its Nation State Members gather to elect new leadership of its four permanent secretariats and populate a few other of its assorted bodies. The next two weeks are spent in endless sessions where several regional blocs of Members still enamored with pre-liberalization telecom models complain about the new world of telecommunications that they did not invent -- while engaging in copious use of their new smart phones and online services. more

Summary of the Registration Operations Association Workshop

The first Registration Operations Association Workshop took place on Thursday, 16 October 2014, at the Los Angeles Hyatt Regency Century Plaza Hotel. I'd like to thank the 64 people that took the time to attend and participate in the discussion, both in-person and remote. I started the workshop with an introduction to some of the technical challenges being faced by the domain registration industry. more

What Ever Happened to the Closed Local Internet Registries?

Since the establishment of the RIPE NCC, 5,000 Local Internet Registries (LIRs) have closed. We wanted to find out why. Many of them were probably victims of the burst of the dotcom bubble. But how many? And which countries were mostly affected? How many closures were the results of mergers? We've got answers. more

The Issue Is the Digital Economy, Not Broadband

After some five years of public debate on the national broadband network it is heartening to see that more and more people are getting the message that the network means more than just fast internet access. Increasingly key decision-makers in business and government are reaching an understanding of the transformation that is underway in the economy. more

This Week in the White Spaces

Every once in a while I look in on the white spaces, to see how things are going. You'll recall that the white spaces are unused, non-contiguous ("swiss cheese" ) frequencies between broadcast stations around the county. Commr. McDowell of the FCC has said that initial rules for the white spaces will be released sometime this fall. If the white spaces are made available on an unlicensed basis for use by opportunistic, "smart," low-power mobile devices, entrepreneurial engineers will think of ways to use this wealth of spectrum (300 MHz wide, if fractured) to provide mobile connections to whatever fiber installations are nearest. more

The Distribution of Botnets Since Rustock Went Down

I pulled together some statistics on my collection of botnet statistics for the period of time between Rustock being shut down and Wednesday, April 6. I wanted to see the distribution of botnets per country - now that Rustock is down, which country has the most botnet infections (as measured by unique IP addresses that send us spam)? more

Caidagram: Visualising Geographically Annotated Internet Measurements

With measurement networks rapidly evolving up to hundreds of nodes, it becomes more and more challenging to extract useful visualisations from tons of collected data. At the same time, geographical information related to Internet measurements (either known or inferred with state-of-the-art techniques) can be exploited to build tools based on geography as a common knowledge base. We wanted to develop a tool to visualise different classes of geographically annotated Internet data, e.g., topology, address allocation, DNS and economical data. more

Topics

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days