Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Domain Registrar Hide and Seek

In the past year ICANN has been putting a lot more effort into its compliance activities, which is a good thing, since the previous level was, ah, exiguous. That's the good news. The bad news is that while they're paying more attention to misbehaving registrants, the registrars, gatekeepers to the world of domains, have serious issues that ICANN has yet to address. more

Interplanetary Internet

We had a very interesting presentation and discussion regarding the topic of interplanetary internet with my international colleagues, of which Vint Cerf – one of the “fathers of the internet” – is also a member. As a partner of the Interplanetary Networking Special Interest Group (IPNSIG), he took us on a journey that he has been involved with over the last 20 years regarding communication networks in space. A true mind-broadening experience. more

Rewiring Internet Governance: Choice and Control (Part 2)

It is tempting to write off ICANN as a U.S. foreign policy lackey and that's all there is to say about ICANN. However, if the mantra for rewiring governance means "lets get ICANN" we risk missing forest for trees. ICANN is merely the symptom of a dysfunctional governance predicament that somehow (despite best efforts) skews oversight. Shapiro, for example, regards oversight as a "game" (1994). His "delegation dilemma" or "agency problem" stems from two options, neither of which are attractive vis-á-vis governance. more

Online Critics and Unlawful Harassment from Trademark Holders

The following is based on my experience and interpretation of the UDRP and the relevant laws of the United Kingdom and European Union. This is not legal advice but just my own experience and interpretation. How does a UK citizen create a non-commercial trademark.tld parody criticism website and avoid harassment from the trademark holder? Here are the steps... more

ICANN Board Selects 2014 Nominating Committee Leadership Team

The ICANN Board has just announced its selections for the next Nominating Committee's leadership. As a reminder, the Nominating Committee (NomCom) is designed to ensure skilled individuals go into key ICANN leadership position. Every year, its recruitment and selection process leads to appointments for positions on the GNSO (Generic Names Supporting Organisation - ICANN's policy-making body for generic domains), the ccNSO (country code Names Supporting Organisation) and ALAC (At Large Advisory Committee). more

Preparing DNSSEC for the Post-Quantum Era

To prepare DNS security for a post-quantum future, Verisign and partners are testing new cryptographic strategies that balance security, performance, and feasibility, especially through the novel Merkle Tree Ladder mode for managing large signatures. more

Debugging Legislation: PROTECT IP

There's more than a hint of theatrics in the draft PROTECT IP bill that has emerged as son-of-COICA, starting with the ungainly acronym of a name. Given its roots in the entertainment industry, that low drama comes as no surprise. Each section name is worse than the last: "Eliminating the Financial Incentive to Steal Intellectual Property Online" (Sec. 4) gives way to "Voluntary action for Taking Action Against Websites Stealing American Intellectual Property". more

Net Neutrality Reflection

So this afternoon my charge is to lay out all the Net Neutrality (NN) issues to a bar association that doesn't have a telecom subcommittee... Cringely says that "In the end the ISPs [network providers] are going to win this [network neutrality] battle, you know. The only thing that will keep them from doing that is competition, something it is difficult to see coming along anytime soon..." more

The East Asia Telecommunication Union

That's what Europeans are now calling the venerable old International Telecommunication Union -- EATU for short. In fact, based on current metrics, this transformation is exactly what has occurred. The shift began occurring almost a decade ago, and has dramatically accelerated in recent years. At the ITU-T's key Study Group 17 meeting on security now underway, fully 90% of the input contributions and more than half of those participating are from only three countries -- China, Japan, and Korea. Indeed, there has long been a semi-formal organization known as CJK that has been manifested here. more

As a Service?

I'm happy to have the option of buying services. It's easier to eat at a restaurant than to do my own cooking, and I'm happy to pay for a ride rather than fighting traffic on my own. However, I'm not happy if I don't have the option of cooking for myself or of taking a stroll. I used to be willing to pay for all of my phone calls but today I know that, thanks to VoIP, there is no need to. But the phone companies are attempting to wrest back control with their wider 5G agenda. more

If Compliance Were an Olympic Sport

It probably won't raise any eyebrows to know that for practically every penetration tester, security researcher, or would-be hacker I know, nothing is more likely to make their eyes glaze over and send them to sleep faster than a discussion on Governance, Risk, and Compliance (i.e. GRC); yet the dreaded "C-word" (Compliance) is a core tenet of modern enterprise security practice. more

The Madness of Broadband Speed Tests

The broadband industry has falsely sold its customers on "speed", so unsurprisingly "speed tests" have become an insane and destructive benchmark... marketing departments at ISPs refuse to define what experience that actually intends to deliver (and what is unreasonable to expect), the network engineers are left with a single and simple marketing requirement: "make it better than it was". more

Ossification and Fragmentation: The Once and Future ‘net

Mostafa Ammar, out of Georgia Tech recently posted an interesting paper titled The Service-Infrastructure Cycle, Ossification, and the Fragmentation of the Internet. I have argued elsewhere that we are seeing the fragmentation of the global Internet into multiple smaller pieces, primarily based on the centralization of content hosting combined with the rational economic decisions of the large-scale hosting services. The paper in hand takes a slightly different path to reach the same conclusion. more

WSJ on Wireless Network Neutrality

Today's Wall Street Journal had an interesting article (subscription required) on the current state of the wireless walled garden. It cites several recent clashes between handset vendors and cellcos over the extent to which consumers can use their phones to access non cellco content. From the article: "At stake for consumers are what services will be available on their mobile phones and whether they're free or cost a monthly fee. The wireless Web is taking off more slowly in America than overseas, and one reason is that U.S. carriers tightly control what applications are available on mobile devices..." more

Demystifying ISP Oversubscription

I think the concept that I have to explain the most as a consultant is oversubscription, which is how ISPs share bandwidth between customers in a network. Most broadband technologies distribute bandwidth to customers in nodes. ISPs using passive optical networks, cable DOCSIS systems, fixed wireless technology, and DSL all distribute bandwidth to a neighborhood device of some sort that then distributes the bandwidth to all of the customers in that neighborhood node. more

Topics

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

DNS Security

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days