Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Corporate TLDs - Why Keeping Mum Seems to Be the Order of the Day

Global brand protection powerhouse MarkMonitor recently released survey results revealing the intentions of their corporate clients with respects to new gTLDs. After reading the report, it's fair to say that I'm not surprised by the results, but continue to be frustrated by them. Where are all of these forward thinking and revolutionary online marketers and brand managers? Are they so unaware of the opportunity that has been placed before them or are they just being very savvy? more

Worming Our Way Out of Trouble

The Conficker worm will be active again on April 1st, according to an analysis of its most recent variant, Conficker.C, by the net security firm CA. This malicious piece of software, also known as Downup, Downadup and Kido, spreads among computers running most variants of the Windows operating system and turns them into nodes on a multi-million member ‘botnet’ of zombie computers that can be controlled remotely by the worm’s as yet unidentified authors. more

One Year Later: Lessons Learned from the Target Breach

As the autumn leaves fall from naked trees to be trampled or encased in the winter snow, it reminds us of another year quickly gone by. Yet, for organisations that were breached and publicly scrutinised for their security lapses, it's been a long and arduous year. It was about this time last year that the news broke of Target's mega breach. Every news outlet was following the story and drip feeding readers with details, speculation and "expert opinion" on what happened, why it happened and who did it. more

Know Someone Who Has Made the Internet Better? Postel Award Nominations Deadline May 18

Do you know of someone who has made the Internet better in some way who deserves more recognition? Maybe someone who has helped extend Internet access to a large region? Or wrote widely-used programs that make the Internet more secure? Or maybe someone who has been actively working for open standards and open processes for the Internet? more

INET New York - Remote Participation Details

The Internet Society (ISOC) will present an INET Regional Conference today June 14 2011 at the Sentry Center in NYC. The theme is "It's your call. What kind Of Internet do you want?". The distinguished line up of speakers will include 'Father of the Internet' Vint Cerf, World Wide Web inventor Sir Tim Berners Lee, and Assistant Secretary for Communications and Information at the U.S. Department of Commerce Lawrence Strickling. more

More Privacy for Domain Registrants – Heightened Risk for Internet Users

A recent exchange on CircleID highlighted a critical need for data to inform the debate on the impact of ICANN's post-GDPR WHOIS policy that resulted in the redaction of domain name registrant contact data. A bit of background: in my original post, I made the point that domain name abuse had increased post-GDPR. A reader who works with a registrar (according to his bio) commented: "Can you back up that statement with data? Our abuse desk has actually seen a reduction in abuse complaints." more

“Restoring” Internet Freedom for Whom?

Recently, a colleague in the Bellisario College of Communications asked me who gets a freedom boost from the FCC's upcoming dismantling of network neutrality safeguards. He noted that Chairman Pai made sure that the title of the FCC's Notice of Proposed Rulemaking is: Restoring Internet Freedom. My colleague wanted to know whose freedom the FCC previously subverted and how removing consumer safeguards promotes freedom. more

Obama’s Tech Stimulus Plan: Health IT, Broadband, and Smart Grid

Steve Lohr has a nice piece in the New York Times ('Technology Gets a Piece of Stimulus,' 26 Jan 2009, p. C1) this morning about the role that technology and innovation will play in the economic recovery (aka stimulus) bill supported by the Obama Administration. In the past, health IT deployment has been approached as an engineering problem: what computers have to be part of which networks exchanging which types of data? This loses sight of the purpose of electronic medical records... more

Bypassing Geo-Locked BYOD Applications

In the wake of increasingly lenient bring your own device (BYOD) policies within large corporations, there's been a growing emphasis upon restricting access to business applications (and data) to specific geographic locations. Over the last 18 months more than a dozen start-ups in North America alone have sprung up seeking to offer novel security solutions in this space - essentially looking to provide mechanisms for locking application usage to a specific location or distance from an office, and ensuring that key data or functionality becomes inaccessible outside these prescribed zones. more

Who Cares About 50,000 .CAT’s?

This past May 19th, 5 years after its sunrise, puntCAT arrived at the 50,000 domain names landmark. We know that, nowadays, 50,000 domain names may hardly be described as shocking news, and, certainly, this is not our limit, and we believe there's still plenty of room for .cat to grow. Then, who and why should care about this number? more

Who Is Sending Email As Your Company?

You might expect that the IT department or security team knows who's sending email using your company's domains. But for a variety of reasons these groups are often unaware of many legitimate senders -- not to mention all the bad actors. Fortunately you can get a more complete view by using DMARC's reporting features. How does it happen? Product teams managing a new product launch or customer survey hire marketing consultants and Email Service Providers (ESP)... more

Set-Top-Box Revisited: How Does the Gateway Solution Increase Competition?

The FCC seems determined in revisiting and repairing the current CableCard rules fiasco in which it chose to mandate a universal Set-Top-Box for Cable, Telco, and DBS providers. Where does a solution lie, and is the FCC going down another road of improbable acceptance? The problem with a CableCard solution, in an attempt to create more competition, was the opening of current provider STB's to access other venues, which turned out to be both technically and business concept unfriendly. more

The Start of Something Big: ICANN Announces Planning for Round Two of New gTLDs

ICANN has published a short paper in advance of its 65th meeting in Marrakech which starts on 23 June 2019. Entitled, "ICANN Org's Readiness to Support Future Rounds of New gTLDs," it describes ICANN's working assumptions for "policy implementation and operational readiness for a subsequent round of new gTLDs". The document is necessary for ICANN to move forward with essential preparations for the next round. more

White Spaces: Timing

Last week's emergency petition by the broadcasters to delay the FCC's Nov. 4 vote is just part of the white spaces atmosphere right now. Ars Technica reports that the mud is really flying -- the broadcasters are accusing proponents of white space use of wanting to kill off television. It's a familiar argument -- "If you do Y, broadcast television as we know it will be destroyed." more

Battling Over Clouds

More than 40 years ago, the FCC was worried about telephone companies using their power over communications to control the then-nascent (and competitive) data processing marketplace. The Bell System at that point was already banned from providing services that weren't common carriage communications services (or "incidental to" those communications services)... In a 1999 article in the Texas Law Review, Steve Bickerstaff pointed out that Computer 1 meant that no one could provide a "computer utility" service... Today, we'd call the "computer utility" something different -- we'd use the term "cloud computing." more

Topics

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

DNS Security

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days