Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Achieving a Cyber-Reliant Infrastructure

Don't worry about the bad guys turning out the lights. Worry about everything they're stealing while the lights are still on. The theft of intellectual property ranging from Hollywood films to defense secrets is underway by cyber-criminals of various stripes. Maintaining control over intellectual property may be the single most important challenge to American economic security. Implementing a cyber-reliant infrastructure is a national challenge which crosses the traditional boundaries between economic sectors and between public and private domains. more

IPv6 Shows a Pulse

On World IPv6 Day IPv6 showed a pulse! However faint that global pulse may have been, our network showed at least some form of IPv6-life occurred on that day. Long supporters of IPv6, with a significant global DNS footprint handling extremely large volumes of global traffic we, at CommunityDNS, were curious on what may result through an organized focus on the use of IPv6. more

Five Security Blind Spots from Prolonged Implementation of a Business Continuity Plan Amid COVID-19

The novel coronavirus outbreak (COVID-19) has prompted many organizations in Mainland China and Hong Kong to execute their business continuity plan (BCP). During the last epidemic in 2003, the SARS outbreak lasted for nine months – and with an infection rate that is increasing rapidly, this new coronavirus has the potential to cause prolonged periods of commercial disruption, and heavy reliance on BCPs. more

The Future Internet I Want for Me, Myself and AI

Artificial Intelligence has the potential to bring immense opportunities, but it also poses challenges. Artificial intelligence (AI) is dominating the R&D agenda of the leading Internet industry. The Silicon Valley and other startup hubs are buzzing about artificial intelligence and the issue has come at the top of policymakers' agenda including the G20, the ITU, and the OECD, where leaders gathered this week in Paris. more

Net Neutrality Reflection

So this afternoon my charge is to lay out all the Net Neutrality (NN) issues to a bar association that doesn't have a telecom subcommittee... Cringely says that "In the end the ISPs [network providers] are going to win this [network neutrality] battle, you know. The only thing that will keep them from doing that is competition, something it is difficult to see coming along anytime soon..." more

Putin’s Iron Firewall Is Porous

In 1946 Winston Churchill declared that Russia had lowered an iron curtain across Europe, and in 2022 Vladimir Putin created an iron firewall between the Russian Internet and media and the rest of the world, but, like its precursor, it is porous. Information wants to be free. more

Out of .Africa - Process Failures Don’t Change the Facts

I've heard a lot of discussion of the .africa controversy of late -- from conspiracy theories to questions about staff competence to concerns about the role of the GAC. And it's hard not to find faults galore in the way this process and the IRP reporting has played out. But before we get too lost in the weeds of procedure or the future of ICANN, lets not lose track of what this debate was first and still is fundamentally about: a string. more

ICANN’s WDPRS Report and Plan to Clean Up Whois Records

ICANN's recently released report, ICANN's Whois Data Accuracy and Availability Program: Description of Prior Efforts and New Compliance Initiatives [PDF], is a summary of the Whois Data Problem Report System's (WDPRS) reports spanning a one-year period that concluded at the end of Fenruary 2007. In case you're not familiar with the WDPRS, it's system that tracks complaints about inaccurate or incomplete whois entries. Notable facts from the report include: There were 50,189 reports for which ICANN received follow-up responses during the year... more

Meeting Report: ICANN’s Registration Data Request Service Requestor Experiences

During CSG Open Working Session at ICANN79, Members from the ICANN Community were invited to an open meeting to share their experiences with Registration Data Request System (RDRS) from the Requestor side. As President of the Edgemoor Research Institute (ERI), I had the honor to present the keynote address and I am pleased to be able to provide you with ERI's report of the meeting. more

WSJ on Wireless Network Neutrality

Today's Wall Street Journal had an interesting article (subscription required) on the current state of the wireless walled garden. It cites several recent clashes between handset vendors and cellcos over the extent to which consumers can use their phones to access non cellco content. From the article: "At stake for consumers are what services will be available on their mobile phones and whether they're free or cost a monthly fee. The wireless Web is taking off more slowly in America than overseas, and one reason is that U.S. carriers tightly control what applications are available on mobile devices..." more

Update on AS Path Lengths Over Time - How Interconnected is the Internet?

With the number of ASes connected to the Internet constantly increasing, one could expect that the length of the AS paths would also increase as the network as a whole gets wider. However, this doesn't seem to be the case. Also, with IPv6 being more widely deployed, how does the interconnectedness of the IPv6 portion of the Internet compare to IPv4? more

Domain Registrar Hide and Seek

In the past year ICANN has been putting a lot more effort into its compliance activities, which is a good thing, since the previous level was, ah, exiguous. That's the good news. The bad news is that while they're paying more attention to misbehaving registrants, the registrars, gatekeepers to the world of domains, have serious issues that ICANN has yet to address. more

Telecom Policy Review Panel Calls For Net Neutrality Legal Safeguards

The Telecommunications Policy Review Panel report [Canada] was released yesterday and while the immediate reaction will no doubt focus on the recommendations for a market-oriented approach with significant changes to the CRTC, I would call attention to three other recommendations gleaned from reading the executive summary (the full document is nearly 400 pages). more

Remembering the Good Times

The most effective early email-borne viruses didn't need botnets. They didn't change your computer settings, or steal your login credentials. And they somehow convinced regular users to help them spread. The first warnings about the Good Times virus began to appear in November of 1994, and by December the warnings were seen all over as people did what the warning said, and forwarded it to all their friends. There was another outbreak the following March... more

The Future of Religions on the Internet

Internet is facing the biggest change in its history. New brands, ideas, groups, communities,... have now found the chance to apply for their own specific space on internet naming system through ICANN's new gTLD program. One of the most interesting points of this courageous program was the motivation it created among communities to try to represent their specific webspace on the internet by applying for their own TLD; and among them were the religious communities as well. more

Topics

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

DNS Security

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days