Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Live Today: IXPs and the Relationship Between Geography and Network Topology

Today at 5:10pm EDT the IETF 90 Technical Plenary will be streamed live out of Toronto, Canada... After some initial reports, the technical focus will be on "Network topology and geography." The session will be recorded for later viewing. The slides are online and from what I can see it should be a very interesting talk for those of interested in the underlying infrastructure of the Internet. more

Email Delivery Challenges Increasing

Return Path published their most recent Global Deliverability report this morning. It shows that inbox placement of mail has decreased 6% in the second half of 2011. This decrease is the largest decrease Return Path has seen in their years of doing this report... Filters are getting more sophisticated. This means they're not relying on simply IP reputation for inbox delivery any longer. more

Ethical Hacking: Turning The Tables to Boost Cyber Security

Hacking remains a huge problem for businesses. As noted by MarketWatch, more than 175 data breaches have already happened this year, and in 2015 approximately 105 million adults in the United States had their personal information stolen. For companies, the stakes are huge: Compromised systems not only damage the bottom line but can severely impact public opinion. more

Mega Hacks and the Employees That Lost

When a business gets hacked and its corporate information is dumped on the Internet for all and sundry to see (albeit illegally), the effects of that breach are obviously devastating for all concerned. In many ways it's like the day after a fierce storm has driven a super-cargo container ship aground and beachcombers from far and wide have descended upon the ruptured carcass of metal to cart away anything they think has value or can be sold by the side of road. more

ICANN 48 in Buenos Aires: What Happened and What’s Next?

Last month, some of my colleagues at MarkMonitor and I traveled to Buenos Aires, Argentina for ICANN 48. With the recent delegation and launch of the first new gTLDs, the atmosphere had an air of both excitement and anxiety. In my opinion, there is much to be done before brand owners should begin to feel comfortable in the post-new gTLD Internet environment, which brings a host of new challenges, as companies attempt to scale monitoring and enforcement to the new (huge) domain name space. more

Everything You Ever Wanted to Know About Canadian Anti-Spam Bill C-27

CAUCE just posted a blog entry about C-27; we will be speaking to the Industry, Science, and Technology committee reviewing the bill this afternoon. The meeting will be webcast starting at 15:30 eastern... more

Reselling Domain Names on the Secondary Market: Bona Fide Offering, or Not?

On the question of reselling domain names on the secondary market, a dissenting panelist in a 2005 case observed that "[t]here is no doubt Respondent is in the business of being a reseller of domain names that consist of common English words" and then suggested that the "fundamental question before the Panel is whether or not such a business should be allowed under the UDRP." He concluded that such a business should not be allowed... more

Can Big Companies Stop Being Hacked?

The recent huge security breach at Sony caps a bad year for big companies, with breaches at Target, Apple, Home Depot, P.F.Changs, Neiman Marcus, and no doubt other companies who haven't admitted it yet. Is this the new normal? Is there any hope for our private data? I'm not sure, but here are three observations... This week Brian Krebs reported on several thousand Hypercom credit card terminals that all stopped working last Sunday. Had they all been hacked? more

LTE: Another Way to Estimate when It Will Be Real

Hardly a week goes by without a press release touting how soon we'll be using a Long Term Evolution (LTE) wireless network. Verizon has promised a major commercial launch in 2010 and a two-city trial before the end of 2009. Let me show you a little chart I put together for my 3G Tutorial and have repeatedly updated... more

Dealing With DMARC

DMARC is an anti-phishing scheme that was repurposed in April to try to deal with the fallout from security breaches at AOL and Yahoo. A side effect of AOL and Yahoo's actions is that a variety of bad things happen to mail that has 'From:' addresses at aol.com or yahoo.com, but wasn't sent from AOL or Yahoo's own mail systems. If the mail is phish or spam, that's good, but when it's mailing lists or a newspaper's mail-an-article, it's no so good. more

Bandwidth Needed to Work from Home

The pandemic made it clear that the millions of homes with no broadband or poor broadband were cut off from taking the office or the school home. But the pandemic also showed many additional millions of homes that their current ISP connection isn't up to snuff for working or doing schoolwork from home. Families often found that multiple adults and students couldn't share the bandwidth at the same time. more

When Two Trademarks Aren’t Confusingly Similar to One Trademark

As I've written before, domain name disputes involving multiple trademarks sometimes raise interesting issues, including whether a panel can order a domain name transferred to one entity without consent of the other. While panels typically have found ways to resolve this issue, one particularly troubling fact pattern arises when a panel denies a complaint simply because a disputed domain name contains trademarks owned by two different entities. more

The Trouble with White Spaces

Like several other engineers, I'm disturbed by the white spaces debate because it focuses on what I regard as the wrong question. The White Space Coalition argues that showing that a system can be constructed that prevents interference between White Space Devices and television broadcast signals compels the Commission to offer up the White Spaces for unlicensed use. This is far from obvious. more

Who Makes the Any Apps Any Handset Call?

The Wall Street Journal today reported that FCC Chairman Kevin Martin wants to reject a Petition for Declaratory Ruling filed by Skype that would establish a wireless Carterfone policy, i.e., that wireless carriers must allow subscribers to use any compatible handset to access any application, content or software. Chairman Martin has confidence that the marketplace solutions obviate any necessary FCC intervention. Such optimism must derive in part from the apparently newfound willingness of one major wireless carrier, Verizon, to support aspects of open access. Perhaps Chairman Martin has confidence in the marketplace based on the magnanimous offer of most wireless carriers to pro-rate their early termination penalties by $5 a month. But here's the rub... more

Summary Report Now Posted of W3C/IAB “Strengthening The Internet (STRINT)” Workshop

Given that I've written here about the original call for papers for the W3C/IAB "Strengthening The Internet Against Pervasive Monitoring (STRINT)" Workshop and then subsequently that the STRINT submitted papers were publicly available, I feel compelled to close the loop and note that a report about the STRINT workshop has been publicly published as an Internet-draft. more

Topics

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Threat Intelligence

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days