Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Sovereign Nations on an Unseen Path at WCIT 2012 to Create a Super-Sovereign ITU

It puzzles me to watch Governments introducing or subscribing to proposals that would in effect smoothly concede part their sovereignty to the ITU -- in an area that is central -- Communications. The WCIT 2012, in the middle of its second week, would now discuss Document DT/51-E 11, which is said to be a "package" of not-yet-compromised draft proposal for revisions to the International Telecommunication Regulations, which inevitably makes ITU the control center of all communications in the known Universe. more

Unlimited Bandwidth is Disrupting Infrastructure Models

Over the last ten years we have heard a lot about edge-based services. These were needed to enable the operation of applications at the edge of the network, as the lack of available bandwidth capacity made it difficult to do so over the core network. However, with the prospect of limitless bandwidth the design of the network is changing again. more

What Makes a Good ESP?

There are a number of things that make a responsible Email Service Provider (ESP), including setting and enforcing standards higher than those set by the ISPs. One of the responsible ESPs is Mailchimp. (Full disclaimer, I do consult for Mailchimp.) This ESP focuses on businesses with small to medium sized lists. They screen new customers for source of permission as well as mail content. more

Why Small Businesses Should Start Trusting the Cloud (Reasons to Convince Your Boss)

For small businesses, effectively managing technology comes with a question: Is it better to outsource or stay in-house? Most small and midsize companies can't afford to employ teams of full-time IT staffers. This creates a desire for outsourced solutions. However, opting for a third party means giving up a measure of control. What is best for your business? In this post, we offer a quick rundown of the top five tasks any small business should consider outsourcing. more

3 DNSSEC Sessions Happening At ICANN 50 Next Week in London

As I mentioned in a post to the Deploy360 blog today, there are three excellent sessions relating to DNSSEC happening at ICANN 50 in London next week: DNSSEC For Everybody: A Beginner's Guide; DNSSEC Implementers Gathering; DNSSEC Workshop. Find out more. more

The Advanced Persistent Threats (APT) Deception

Most of the good thrillers I tend to watch have spies and assassins in them for some diabolical reason. In those movies you'll often find their target, the Archduke of Villainess, holed up in some remote local and the spy has to fake an identity in order to penetrate the layers of defense. Almost without exception the spy enters the country using a fake passport; relying upon a passport from any country other than their own... So, with that bit of non-fiction in mind, why do so many people automatically assume that cyber-attacks sourced from IP addresses within China are targeted, state-sponsored, attacks? more

ICANN 53 - Guaranteeing Accountability in Internet Governance

I recently attended the Internet Corporation for Assigned Names and Numbers' (ICANN) 53rd meeting in Buenos Aires to further discuss the Internet Assigned Numbers Authority (IANA) transition process. During the meeting, public and private Internet stakeholders made important strides on a transition timeline, accountability planning and future management of the Internet that supports global creativity and innovation. more

TWC Does the Right Thing - Again!

In response to customer feedback, Time Warner Cable has discontinued its trials of tiered Internet service. [Corporate Announcement here.] It was quite a stuff-storm, but to TWC's credit, they put their finger up, felt the howling gale, and changed course right away. This is in marked contrast to their larger competitor, Comcast... more

Government-Industry Collaboration Is Better than Developing a Surveillance State

President Obama, in March 2016, again stressed the need for better collaboration between the tech industry and the government. He referred to his own White House initiative - this has resulted in the newly-formed US Digital Service, which is trying to recruit the tech industry to work with and for government. One of the key reasons it is so difficult to establish trustworthy, good working relationships is the extreme lack of tech understanding among most politicians and government bureaucrats. more

When Cyber Awareness Is Fundamentally Lacking

"Smartphones (and tablets, WdN) are invading the battlefield", reports the Economist on its website of 8 October 2011. On the same day the hacking of U.S. drones is reported on by several news sites. ("They appear friendly". Keyloggers???) Is this a coincidence? more

The Dotcom Kingdom

What will happen to dotcom once a thousand generic Top-Level Domain (gTLD) applications were approved and start to skate around on global cyber platforms? Nothing, firstly, there are over 200,000,000 dotcoms while these 1000 exotic high profile gTLD will not even make a scratch to the dotcom market. Secondly, a dotcom is about $10 plus while gTLD is $500,000 plus... After all gTLD are never supposed to be for everyone, as they can only be fitted to right and very special combinations. more

Balancing Rights: Mark Owners, Emergent Businesses, and Investors

Is there any act more primary than naming? It comes before all else and makes possible what follows. For the most part, names are drawn from cultural assets: collections of words, geographic locations, family names, etc. They can be valuable, which is why they are guarded, protected, and hoarded. The balancing of rights among those competing for names is a deliberate feature of the Uniform Domain Name Dispute Resolution Policy (UDRP). more

Looking Internally for the Success of Your TLD Strategy

Last week, I had the privilege of presenting at the Digital Marketing & gTLD Strategy Congress in London on how to create a TLD strategy and activate your path to market for launch. Some of the best and brightest minds in the industry attended and it was encouraging to hear from major brands such as Phillips, Microsoft, Google and KPMG, as well as a variety of other applicants. While in my previous blog I discussed why a .brand TLD strategy is important, let's now delve deeper into engagement strategies and why this is the key to a successful .brand. more

Seeing the Opportunity for IP Communications Within the Smart Grid Space

Having followed IP communications as an analyst since 2001, I've seen a few cycles come and go, and Smart Grid reminds me a lot of VoIP. Telcos and utilities both operate large, complex and costly networks, and prior to 1984, both were heavily regulated. Following the deregulation of telecom came a wave of unprecedented innovation and disruption built largely around IP technologies. We all know what that's done for telcos -- and communications in general. more

Retrograde Inversion of Telecommunications Policy

Going backwards upside down. That's what we're doing with telecommunications policy in the U.S. The Comcast affair should prompt a re-examination of many decisions the FCC, Congress, and the courts have made over the last few years. When the FCC reports on its reactions to Comcast's activities, the right response will be "You're asking the wrong question." "What is reasonable network management" isn't the question we should be asking... more

Topics

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

DNS Security

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days