Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Who Played a Major Role in Advancing the Internet? Nominations Open for 2019 Internet Hall of Fame

Do you know someone who has played a major role in the development and advancement of the Internet? Now is the time to recognize their contribution. Nominate them for the 2019 Internet Hall of Fame. With more than 100 inductees, the Internet Hall of Fame celebrates Internet pioneers and innovators who have pushed the boundaries to bring the Internet to life and make it an essential resource for billions of people today. more

Rapidly Changing Triple and Quadruple Play Business Models

It is interesting to follow what is happening with triple and quadruple play broadband prices in competitive markets. Through triple and quadruple play, customers are increasingly getting more services for the same money. As most fixed telecoms markets are still largely monopolistic in nature, basic access charges remain high; but good prices are even available in markets with healthy wholesale competition, if one shops around. more

Bandwidth Needed to Work from Home

The pandemic made it clear that the millions of homes with no broadband or poor broadband were cut off from taking the office or the school home. But the pandemic also showed many additional millions of homes that their current ISP connection isn't up to snuff for working or doing schoolwork from home. Families often found that multiple adults and students couldn't share the bandwidth at the same time. more

When Two Trademarks Aren’t Confusingly Similar to One Trademark

As I've written before, domain name disputes involving multiple trademarks sometimes raise interesting issues, including whether a panel can order a domain name transferred to one entity without consent of the other. While panels typically have found ways to resolve this issue, one particularly troubling fact pattern arises when a panel denies a complaint simply because a disputed domain name contains trademarks owned by two different entities. more

Restricting Anti-Virus Won’t Work

In a blog post, Stewart Baker proposed restricting access to sophisticated anti-virus software as a way to limit the development of sophisticated malware. It won't work, for many different and independent reasons. To understand why, though, it's necessary to understand how AV programs work. The most important technology used today is the "signature" - a set of patterns of bytes - of each virus. Every commercial AV program on the market operates on a subscription model... more

DOTZON Study: Digital Company Brands 2023

DOTZON presents the sixth edition of the Digital Company Brands study. After having introduced the study in 2018, DOTZON continued to expand and enhance the underlying data to display how companies successfully use their Digital Company Brands. The Digital Company Brand is the digital dimension of a company brand and mirrors the "digitalness "of a company. more

Spectrum Key to Broadband Utility

The explosion in mobile communications in the developing world has created social and economic changes that have exceeded all expectations and predictions -- even those made as recently as five years ago. There are still countries lagging behind, but now is the time to move on to the next stage -- and that means broadband. Already the developed world is showing an enormous appetite for mobile broadband, so the demand is most certainly there. The rapid development of low cost Smartphone, projected to approach $50 soon... more

ICANN 47: Policy Debates and Cautious Optimism

A strange feeling came over me after I got home from ICANN 47 in Durban, something I haven't felt after an ICANN meeting before. The feeling? Optimism. I'm optimistic, albeit cautiously so, about the future of ICANN and by extension, hopefully that of Internet governance in general. If the meeting in Durban is any indication, we've come a long way in the past year. There were no indicted war criminals invited to dinner. And though it may be too soon to say for sure, I don't think a letter will be sent to the government of South Africa about the quality of the hotel. more

Report On National Online Cybercrime and Online Threats Reporting Centres

Today I released a report on 'National cyber crime and online threats reporting centres. A study into national and international cooperation'. Mitigating online threats and the subsequent enforcing of violations of laws often involves many different organisations and countries. Many countries are presently engaged in erecting national centres aimed at reporting cyber crime, spam or botnet mitigation. more

African Union Commission Formally Objects Through GAC to DotConnectAfrica’s Application for .africa

This is the African Union Commission's formal objection, through the ICANN GAC Early Warning Process, to the DotConnectAfrica Trust's amended application 1-1165-42560 for the .africa TLD. Here, it objects to the DCA .africa bid as not having the requisite government support for a Geographic name, and further characterizes DCA's bid as an "Unwarranted Interference and Intrusion" more

Neustar and Afilias Jump on the No-Tasting Bandwagon

In a message posted to the ICANN GNSO list, Avri Doria forwarded along a most interesting document from Neustar, who runs the .biz domain... Neustar proposes to change their registrar agreement so that each registrar will only get credit for deletions of 10% of their new domains, with a few minor exceptions for tiny registrars and bulk registrations due to one-time mistakes. They say they expect Afilias to propose the same change for .info.  more

Is Cybersecurity a Priority? You Wouldn’t Know It If You Go by Top Level Defections

In the US administration, we see important people like incoming Secretary of Defense Leon Panetta say at his Senate confirmation hearing that "a strong likelihood that the next Pearl Harbor" could well be a cyberattack that cripples the U.S. power grid and financial and government systems. He also said that cybersecurity will be one of the main focuses of his tenure at the Pentagon. But when you look at what is actually happening in cyber security, there is more position jockeying than there is real progress. more

18 TLD Applications Withdrawn to Date

A total of eighteen applications for new Top Level Domains (TLDs) have been withdrawn by the applicants. Of the 18 applications that have been withdrawn so far, just five were applications for generic terms, and the remaining thirteen withdrawn applications were for branded Top Level Domains. In the case of the branded TLDs, it may be that the applicant originally only filed what has been called a "defensive application", meaning that the company applied for the Top Level Domain to prevent its falling in the hands of a competitor. more

Beyond Telco 2.0 and Quadruple Play

One of the great challenges has been to conceive a business model for next generation telephone companies. This is constrained by their limited core competences which do not match well with many of the opportunities that lie in entertainment and complex/customised bundles for consumers. Frost & Sullivan, a leading firm of industry analysts, notes the enthusiasm of service providers to offer connectivity, entertainment and information services, within a digitally connected world... more

Regulation and Reason

Imagine living in a country where it was necessary to register with your community government by providing a copy of one of the following... This may be necessary in perhaps a large number of nations. However, as a United States citizen and resident, I was quite surprised when my local community issued the request. I investigated and found much to my dismay, that my community in fact was required by regulation to survey its residents on a biennial basis. more

Topics

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

DNS Security

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days