Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

The Real Work Starts After WCIT12

The really important part of the World Conference on IT (WCIT) is not the internet battles that have caught the interest of the press - it is what will happen after the conference has ended. Membership of WCIT is on a per-country basis... Each country is free to make up its own delegation and these delegations can therefore represent a large variety of social, economic, business, legal, technical and other interests - as large and as wide as each country decides its delegation will be. more

Why ICANN Needs Fresh Blood: A Deeper View

I grew up in a utopian community in India.

I make this statement -- which may seem at best tangential to an article on the DNS -- at the outset because it suggests that I know something about ideology and ideologically charged debates.

Like the town where I grew up, the Internet was the product of dreamers, people who believed in the possibility of surmounting reality. In Code, Lessig compared early Internet euphoria to the euphoria that met the downfall of communism. He could just as well have compared it to the utopianism that accompanied the birth of communism. The point is that Internet pioneers were inspired by ideology, by a fervor to change the world. more

The Start of Something Big: ICANN Announces Planning for Round Two of New gTLDs

ICANN has published a short paper in advance of its 65th meeting in Marrakech which starts on 23 June 2019. Entitled, "ICANN Org's Readiness to Support Future Rounds of New gTLDs," it describes ICANN's working assumptions for "policy implementation and operational readiness for a subsequent round of new gTLDs". The document is necessary for ICANN to move forward with essential preparations for the next round. more

GAC Empowerment in Post-Transition ICANN

On March 20th, Wall Street Journal (WSJ) Op-ed writer L. Gordon Crovitz published an article titled "Stop Obama's Internet Giveaway". In his opinion piece Mr. Crovitz opposed any near-term transition of the IANA functions... In the course of his article Mr. Crovitz also stated, "Icann already has been kowtowing to authoritarian regimes," alluding to former CEO Fadi Chehade's December 2015 decision to become a Co-Chair of the Advisory Committee to China's World Internet Conference... more

Broadband Challenge Isn’t About Plumbing

It seems to me that too many people have focused government attention on intervening in the supply of broadband facilities. Let's face it, it is easier to look at a dozen or so suppliers to gather information and figure out who should receive a cheque to help direct their investment in broadband facilities. On the other side of the equation, it is hard work to stimulate demand. But this is precisely where our efforts should be focused, as was recommended by the recent report... more

The New ICANN Emerges in Seoul

With the loud crashing of a traditional drum ceremony and an impromptu electric guitar performance by a young Korean whose rendition of Pachabel has been downloaded sixty million times on YouTube, the 36th meeting of ICANN was kicked off this morning (Korean time) by new CEO Rod Beckstrom and his fellow Directors and assembled one thousand or so participants. ICANN has always been about change, but the atmosphere in Seoul this week is charged with a sense of new challenges and new opportunities. more

Worming Our Way Out of Trouble

The Conficker worm will be active again on April 1st, according to an analysis of its most recent variant, Conficker.C, by the net security firm CA. This malicious piece of software, also known as Downup, Downadup and Kido, spreads among computers running most variants of the Windows operating system and turns them into nodes on a multi-million member ‘botnet’ of zombie computers that can be controlled remotely by the worm’s as yet unidentified authors. more

Apple iPhone Apps Store: Refreshing Openness or Walled Garden?

Apple Computer has received high praise for the diversity of applications available for the iPhone. The company shows great willingness to accept third party software innovations. But Apple also solely decides whether to accept and make available any application. Rejected software vendors for the most part do not exist if they do not have shelf space at the Apple store. more

NTIA & You: NTIA’s Intention to Transfer IANA Functions to the Global Community Is Welcome, But…

It is no secret that both the US government, ICANN, and the global Internet community have argued and worked tirelessly for the past 15 odd years on the vexing issue of globalizing the US government's role in the IANA function. Despite the desire, long-held by many, for the US to relinquish its control of the IANA function, it is clear that getting to full multistakeholder control of the function is not going to be easy. more

Who Is Responsible for Your Application’s Security?

The dividing line between developers and IT operations used to be distinct. Developers were responsible for adding new features securely, but it was IT operations who had responsibility for infrastructure and network security. For the most part, developers didn't have to think too much about the wider security context. With the advent of the cloud, and of devops, things changed radically. more

Who Is Sending Email As Your Company?

You might expect that the IT department or security team knows who's sending email using your company's domains. But for a variety of reasons these groups are often unaware of many legitimate senders -- not to mention all the bad actors. Fortunately you can get a more complete view by using DMARC's reporting features. How does it happen? Product teams managing a new product launch or customer survey hire marketing consultants and Email Service Providers (ESP)... more

Mass Surveillance: A Turning Point in Internet History

So far, the debate on mass surveillance has dwelt on the immense resources made available to the agencies (NSA in the US, GCHQ in the UK), on the technological advantage that enables them to access any data and bypass encryption, and on the lack of proper oversight in those two countries. But in order to make their voices heard by their elected representatives, Internet users around the world need to have an even more complete view of the emerging reality. more

Making Multi-Language Mail Work (Part 2)

In the previous instalment we looked at the software changes needed for mail servers to handle internationalized mail, generally abbreviated as EAI. When a message arrives, whether ASCII or EAI, mail servers generally drop it into a mailbox and let the user pick it up. The usual ways for mail programs to pick up mail are POP3 and IMAP4. more

Omnibus Cybersecurity Bill May Not Go Where Original Authors Intended

In an interview with GovInfoSecurity, Sen. Thomas Carper said that the U.S. Senate is considering attaching cybersecurity legislation to a defense authorizations bill. Though clearly a ploy to be able to say "we did something about those evil hackers" before the elections, CAUCE applauds the attempt. There can be no doubt that the United States (and many other countries) sorely needs better laws to deal with these threats. more

Who Will Crack Cloud Application Access SLAs?

The broadband industry doesn't have an agreed-upon unit of supply and demand that meaningfully "adds up". This is rather odd for a service that aspires to be a utility. It is also a barrier to a much-needed transformation from "bit pipes" to "digital supply chain management". The chart here ought to be in every basic undergraduate textbook on packet networking and distributed computing. That it is absent says much about our technical maturity level as an industry. more

Topics

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

DNS Security

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days