Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

An ITU Cut and Paste Job for New TLDs Could Cost $150k

It was with great interest that I read a recent announcement about a plan by the International Telecommunications Union (ITU) to publish template answers on a wiki for the 22 questions relating to registry technical operations contained within ICANN's new Top-Level Domain Applicant Guidebook. As someone who has spent the best part of six years following the development of the program (witnessing first-hand each evolution of the Applicant Guidebook) my first thought was one of bemusement... more

Centralizing DNS Data for Security, Compliance, and Performance

Private DNS data lakes consolidate fragmented logs into a centralised platform, improving visibility, security, and compliance. They enable advanced analytics, strengthen threat detection, and help organisations optimise network performance in increasingly complex IT environments. more

Big Regional Network Outages

T-Mobile had a major network outage last week that cut off some voice calls and most texting for nearly a whole day. The company's explanation of the outage was provided by Neville Ray, the president of technology... In plain English, the electronics failed on a leased circuit, and then the backup circuit also failed. This then caused a cascade that brought down a large part of the T-Mobile network. more

Digital Identity and Branding: The Five Most Common Mistakes in Naming

The U.S. is a total hotbed for Startups. Over the course of the last year, venture capital firms invested $69.11 billion in U.S. startups. Now is an exciting time where there is more ingenuity and entrepreneurial efforts than ever before. And of course every entrepreneur's dream is to have a successful idea and "make it". However, a startup's name and its associated digital identity are often not as thought out as they should be. more

Spotlight on African Contributions to Internet Governance Discussions (Part 1: NETmundial)

The internet affects every individual in this world whether directly or indirectly. For example, a medical professional somewhere in Goma, Congo might access the internet to read and post reviews to current medication available and this might have an impact on the kind of medication that he/she recommends to the patient, whether the patient has access to affordable internet or not. Since the internet affects everyone, Africans citizens who are aware of internet governance discussions, expect African stakeholders to engage in these discussions. more

Supporting New DNS RR Types with dnsextlang, Part II

Previous article introduced my DNS extension language, intended to make it easier to add new DNS record types to DNS software. It described a new perl module Net::DNS::Extlang that uses the extension language to automatically create perl code to handle new RRTYPEs. Today we look at my second project, intended to let people create DNS records and zone files with new RRTYPEs. more

A Bend in the River: ICANN Should Prepare for a 2 °C World

Toward the end of last week, the world waited with bated breath for the outcome of the 21st annual meeting of the Conference of the Parties (COP) of the UN Framework Convention on Climate Change (UNFCC). The meeting, commonly called COP 21, was held in Le Bourget, Paris, from November 30 to December 12; a bit too soon after the terrorists attacks on Paris earlier in November. COP 21 was important because COP 15 in Copenhagen (2009) failed to arrive at a global consensus... more

Amazon’s Huge IoT Network

In a recent blog post, Amazon invited developers to test drive its gigantic IoT network. This network has been labeled 'Sidewalk' and was created by tying together all of Amazon's wireless devices like Amazon Echos and Ring cameras. Amazon claims this huge wireless network now covers 90% of U.S. households. Amazon created the network by transmitting Bluetooth and 900 MHz LoRa signals from its various devices. more

Registry Lock - or EPP With Two Factor Authentication

For the last couple of years, the most common attack vector against the DNS system is the attack against the registrar. Either the attack is on the software itself using weaknesses in the code that could inject DNS changes into the TLD registry, or social engineering the registrar support systems and the attacker receives credentials that in turn allows the attacker to perform malicious changes in DNS. DNSSEC is the common security mechanism that protects the DNS protocol, but by using the registrar attack, any changes will result in a proper working DNS delegation. more

EU Rulings on Geo-Blocking in Digital Storefronts Will Increase Piracy Rates in the Developing World

For the longest time, it was an insurmountable challenge for those in the developing world to be able to afford to legally consume multimedia products. Prices originally set in Dollars, Euros or Yen often received insufficient adjustments to compensate for lower incomes, something that was compounded by local import or manufacture taxes that did little to alleviate matters. more

Can We Really Blame DNSSEC for Larger-Volume DDoS attacks?

In its security bulletin, Akamai's Security Intelligence Response Team (SIRT) reported on abuse of DNS Security Extensions (DNSSEC) when mounting a volumetric reflection-amplification attack. This is not news, but I'll use this opportunity to talk a bit about whether there is a trade-off between the increased security provided by DNSSEC and increased size of DNS responses that can be leveraged by the attackers. more

Is Defining Broadband by Speed a Good Policy?

I’ve lately been looking at broadband policies that have shaped broadband, and I don’t think there has been any more disastrous FCC policy than the one that defines broadband by speed. This one policy has led to a misallocation of funding and getting broadband to communities that need it. The FCC established the definition of broadband as 25/3 Mbps in 2015, and before then, the definition of broadband was 4/1 Mbps, set a decade earlier. The FCC defines broadband to meet a legal requirement established by Congress and codified in Section 706 of the FCC governing rules. more

Moving Towards a Better (Not Just a Bigger) Internet

Those of us who have been working on IPv6 for over 15 years know what it means to be an advocate for an infrastructure technology that cannot be easily tied to new revenue or short-term risks. It is a battle on an icy uphill slope with head winds and a gallery of skeptics who call themselves realists and cheer your every bruise. This has often made us cheer any news of a new IPv6 deployment, as a means to keep faith. However in doing so, it sometimes made us overlook the substance of that news... more

Navigating the .brand Delegation Process

Today marks a major milestone for .brand Top-Level Domain applicants, as we pass the deadline set by ICANN for them to sign their Registry Agreement (RA). For those who have knuckled down over the last few weeks and months to meet this deadline, congratulations -- for many, this was no mean feat and the effort should be acknowledged. more

Hello World

I've been threatening to blog for several years now. I can't recall for how many years I've left the threat open, but hopefully you'll understand given the title of this piece, that I'm prone to senior moments. For the past two years I've been immersed in Internet Governance, an area I knew precious little about before being tossed into the deep end of the pool... My current employer, PayPal (eBay), recognizes the importance of cat herding, and has formed a group that I am fortunate to be part of, that specializes in Internet Standards and Governance. more

Topics

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

DNS Security

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days