Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

How Do You Turn a Typesetting Language Into an Identifier System? (Not Easily)

Unicode's goal, which it meets quite well, is that whatever text you want to represent in whatever language, dead or alive, Unicode can represent the characters or symbols it uses. Any computer with a set of Unicode typefaces and suitable layout software can display that text. In effect, Unicode is primarily a typesetting language. Over in the domain name system, we also use Unicode to represent non-ASCII identifiers. That turns out to be a problem because an identifier needs a unique form, something that doesn't matter for typesetting. more

Alliance for Safe Online Pharmacies to Recognize Contribution from Internet Industry

ASOP (Alliance for Safe Online Pharmacies) is often seen as taking a rather confrontational stance towards domain name registrars, registries and hosting providers. However both ASOP and others, including LegitScript, often cite the assistance they've received from internet industry players in their work. This year ASOP has decided to take this a step further... more

New Book Released: International Domain Name Law, ICANN and the UDRP

A new book by David Lindsay, an academic at Monash University's Law School and a widely published expert on internet law, intellectual property law and privacy, has recently been published. ...In this path-breaking work the author examines the extent to which principles of national trade mark law have been used in UDRP decisions. It will be essential reading for anyone, whether academic or practitioner, interested in internet law, intellectual property, and e-commerce law. more

In Praise of ICANN

ICANN comes in for a lot of criticism. That's because people care very deeply about it. The multi-stakeholder model, of which ICANN is the exemplar, is such a radical and revolutionary departure from how global affairs have been managed in the past that many of us are constantly on guard lest ICANN degrade into the command-and-control structure that characterizes other global regulatory bodies. At ICANN, it's the volunteers, those who care (as well as, yes, those who are paid to pretend to care) who set policy more

How to Make DNS Green

The Dutch Internet registry SIDN has launched a unique program in partnership with CleanBits to identify what proportion of .nl domain names were hosted on a green or CO2-neutral basis. The results show a strong trend towards the 'greening' of the .nl internet zone. Nearly 30 per cent of .nl names were found to have green hosts. more

Cuba Reaches Five Million Mobile Accounts

Cubans now have 5 million mobile accounts. The five-millionth account was recently opened Guanabacoa, in the eastern part of Havana and we see here that growth slowed last year, but has resumed -- perhaps due to increased 3G availability. Most Cubans have 2G phones, which are used primarily for making calls and sending text messages that may have attached images. more

Q&A With Rami Schwartz, Founder and CEO of .tube

After its initial launch in 2016 and with over 1,800 domains registered, the .tube TLD recently released over 25,000 previously reserved domains as part of a broader re-launch of its business and brand. I spoke with Rami Schwartz, Founder and CEO of .tube about the journey so far and about what's in store for .tube in the New Year... "We're used to fighting against companies much larger than us and prevailing - our history has seen us come up against the likes of the Mexican Government and Google..." more

Is It Time for a Breakthrough in Securing Cyberspace?

This year in July gen. Keith Alexander, director of the National Security Agency and head of the US Cyber Command participated at DefCon, the hackers conference in Las Vegas. In his address, gen. Alexander said, among other things, "This is the world's best cybersecurity community. In this room right here is the talent our nation needs to secure cyberspace."... As someone, who is regularly meeting the top Russian cyber folks, I already know (unofficially, of course) how the words of gen. Alexander were met in Moscow. more

How Open Cloud Could Have Saved Sidekick Users’ Skins

The cloud computing scandal of the week is looking like being the catastrophic loss of millions of Sidekick users' data. This is an unfortunate and completely avoidable event that Microsoft's Danger subsidiary and T-Mobile (along with the rest of the cloud computing community) will surely very soon come to regret. There's plenty of theories as to what went wrong -- the most credible being that a SAN upgrade was botched, possibly by a large outsourcing contractor, and that no backups were taken... more

Are You Getting Your News From Spam? My Mother Does

This is a story about my mother and Obama. My mother: "Have you heard about Obama? Really impressive guy." Me: "What about him?" My mother: "x, y and z." Me: "Where did you hear about this?" My mother: "I read email too, you are not the only one who is into technology." Luckily, my mother bases her opinion on more than just spam messages... more

Have You Reviewed Your Domain Lock Portfolio?

Domain names give your intellectual property visibility, as well as provide function for your company's infrastructure. Vital domain names are simply too important to be left exposed. To protect them, you can add extra layers of security to your digital brand with easy, secure, server-level protection in addition to multi-level locks that combat domain name system (DNS) hijacking and protect against unauthorized changes and deletions to your critical domain names. more

Home Broadband and the Cloud

I'm not sure that most people understand the extent to which our online experience has moved to the cloud -- and this movement to the cloud means we're using a lot more bandwidth than in the recent past. A huge number of online functions now reside in the cloud, when only a few years ago, a lot of processing was done on our computers. Take the example of Twitter, where I keep an account to upload a copy of my blog every day. more

M3AAWG & i2Coalition Collaborate on Best Practices on Anti-Abuse in Hosting & Cloud Environments

I am excited to announce the recent release of the industry first Best Common Practices document for Cloud and Hosting providers for addressing abuse issues that was created by M3AAWG and the i2Coalition. M3AAWG has been collaborating with the Best Practices Working Group of the i2Coalition over the past 2 years to discuss ways to solve malicious activity within hosting and cloud ecosystems.  more

What Will Shape the Internet in 2026: Power, Politics, and Infrastructure

In 2026, internet infrastructure will be reshaped by geopolitics, grid constraints, and regulatory shifts. Firms that treat data location, power access, and legal compliance as strategic priorities will gain competitive advantage. more

Privacy Getting a Reboot

Anyone old enough to remember when cross-border data flows were limited to what could be put in a DHL box in New York and sent directly to Milan for the next day? Or when MIPS were so costly and centralized that batch processing was the norm? The world has changed, but the rules governing data protection and privacy haven't (much). Today technology allows and users demand that data flow without the drag of political boundaries or national borders, yet we still want assurances that our information will be protected and respected.  more

Topics

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

DNS Security

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days