Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Australia Booting Infected Computers Off Their Networks

The Australian has a good article describing the efforts some of their ISPs are making in an attempt to clean up their act: the government is encouraging ISPs to detect computers on their network that are infected and part of botnets, and to communicate to the customer that their system is compromised... Unless the customer feels a little bit of pain they will not change their ways. more

The Rise and Rise of Broadband in China

While there are plenty of articles continuously updating us on the incredible social and economic developments that are taking place in China it is still sometimes good to stand still and have a look at some of these developments. It was 15 years ago that the Chinese Government - in its 5-year plan - stated that it wanted to connect all of its half million villages to the telecommunications network. At that point the plan simply called for narrowband telephone connections. more

An Update From CIRA on IoT Security

Last April, I shared information about a multistakeholder process that CIRA is part of, which seeks to identify and guide the development of policy around the Internet of Things (IoT), putting security at the heart of internet innovations in Canada. Since the formation of this process, we've made quite a bit of progress and I'm pleased to share some of that with you. more

Regulating Magic: Why We Need to Establish a Regulatory Framework for Quantum Computing and Artificial Intelligence

The promises of quantum computing, artificial intelligence, and other advancing technologies sound like magic. However, even magic is subject to the laws of economics. And even quantum computers are “legal things…technological tools that are bound to affect our lives in a tangible manner,” as Valentin Jeutner explains in The Quantum Imperative: Addressing the Legal Dimension of Quantum Computers. Analogous to Asimov’s Three Laws of Robotics, Professor Jeutner proposes a three-part “quantum imperative,” which “provides that regulators and developers must ensure that the development of quantum computers. more

Cuba on Advances in the “Computerization of Society”

A recent televised roundtable enumerated advances in the computerization of Cuban society, including: Telephone density is 58% with 6.5 million accounts, 5.2 million of which are cell phones. 1.5 million people access Nauta mail with cell phones. Over 1.7 million have permanent accounts. There are 1,713 public-access spots: 709 WiFi locations, over 700 at ETECSA premises and the same number in third-party locations (but 709+1400 is 2109, not 1,713). more

FCC Chairman Martin a Tireless Consumer Advocate - Who Knew?

In a counter-intuitive move for a Republican free marketeer, FCC Chairman Kevin Martin has sought to impose substantial additional regulations on cable television. Chairman Martin ostensibly can retain his credentials by claiming that a 1984 law requires the FCC to act when cable television systems serve 70% or more of the U.S. population and 70% who can subscribe do so. more

The gTLD Opera

The curtain rises on January 12th 2012 but key players are still singing different tunes. Let's peek into their performance as they start taking center stage. FTC, the Federal Trade Commission, has sent a letter to ICANN on December 16th 2011. Re: Consumer Protection Concerns Regarding New gTLDs. They write; "We write now to highlight again the potential for significant consumer harm resulting from the unprecedented increase in new gTLDs." The following paragraph clearly highlights the lack of information about the ICANN gTLD platform. more

How Will Your Registration Data Be Managed in the Future?

Benjamin Franklin once said, "By failing to prepare, you are preparing to fail." As we consider how Internet domain and address registration data is managed and accessed in a post-WHOIS era, and given the long history of failure in addressing the shortcomings of WHOIS, it is extremely important to start preparing now for the eventual replacement of WHOIS. This is the fundamental purpose of the next Registration Operations Workshop (ROW) that is scheduled for Sunday, July 19, 2015, in Prague, Czech Republic. more

How to Prepare for the Day When Your Domain(s) Are Misbehaving

For a number of years, there have been many different high profile incidents where major websites were defaced, taken offline, or crippled due to issues related to their domain registration. Last night, there was an incident where several high profile domains went offline due to issues at their registrar, and they are now coming back online after what I am sure was a few crazy hours for their operations teams and management. more

Growing Interest Abroad for Cloud-Based Email Infrastructure

Between September of 2015 and May 2016, (last 8 months) Port25 saw almost a 30 percent jump in new cloud-based email infrastructure interest outside the United States... While most of the influential senders are not abandoning on-premises mail transfer agent (MTA) solutions, many are looking to cloud infrastructure for managing higher-volumes by bifurcating individual email streams to the cloud. more

DDI Integration: We Need IPAM

I am a big fan of DDI (DNS, DHCP and IPAM) as magical trio to manage all transactions on network infrastructures... Or to say the least: make it possible. Basically it makes these "Core Network Services" concise, manageable and integrated. It basically makes the network infrastructures of today and the future possible. There is however one thing that continuously seems to irritate when talking about integrating these services on networks. more

The Recent DDoS Attacks on Banks: 7 Key Lessons

Starting in mid-September, one of the largest and most sophisticated DDoS attacks ever targeted the titans of American banking. Initially, victims included Bank of America, JPMorgan Chase, Wells Fargo, PNC Bank, and U.S. Bancorp. In the weeks to come, others would also feel the pain. Websites crashed, customers were unable to make transactions and IT professionals and PR gurus went into panic mode. Leon Panetta, U.S. Secretary of Defense, said the attacks foreshadowed a "Cyber Pearl Harbor." more

Do Trade Names Qualify as Trade Marks for Purposes of the UDRP?

Naming is the first imperative. It precedes the launching of new lives as much as it does new businesses. Names secure a presence, and for businesses in the marketplace names can grow into trademarks, if they function like one. Are we not sometimes made aware that not all names are equally distinctive, and that some of them are distinctly commonplace? more

Reconsideration Request Denied

Having been passed over by the "old guard" Board Governance Committee of ICANN Board of Directors, I took the occasion to speak from my heart to provide the "new guard" with the observations of a 16-year ICANN volunteer. For those of you in the community who are wondering what happened, what follows is word for word what I shared with the Board of ICANN at my closed door proceedings. more

Government of Quebec Ends Its Participation in .Quebec TLD Days Before Launch

According to ici.radio-canada.ca, the Government of Quebec has decided to end its participation in the new gTLD .Quebec, just days before .Quebec launches. According to the story the Government has decided not to change Government websites to .Quebec and will instead retain all of its Website to end in .gouv.qc.ca... "The news will no doubt be received as a cold shower by PointQuébec organization, which is the company that is operating .Quebec registry. more

Topics

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

DNS Security

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days