Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Content - The Next Regulatory War Zone

At the 2014 TelSoc Charles Todd Oration the former Chair of the ACCC, Graeme Samuel, warned against the looming content monopoly... "There is a constant risk that the exclusive tie-up of rights to content for new and emerging markets will allow the right holders to shut out competition across a wide range of services delivered over new networks." He didn't think that the current telcos have the right expertise to enter the content market... more

Using Dot Brand Domains in Brand Communication

A certain number of brands are using a dot brand domain as their main actual website. The following analysis looks at how dot brands are used in brand communication. Are brands communicating about their domain names, or are domain names supporting brand communication? Dot brand corresponds to the ability, for a certain number of pioneering brands, to use their brand name at the top level of the naming system for their own purpose, in parallel to a dot com or a country code. more

Trusting Zoom?

Since the world went virtual, often by using Zoom, several people have asked me if I use it, and if so, do I use their app or their web interface. If I do use it, isn't this odd, given that I've been doing security and privacy work for more than 30 years, and "everyone" knows that Zoom is a security disaster? To give too short an answer to a very complicated question: I do use it, via both Mac and iOS apps. Some of my reasons are specific to me and may not apply to you... more

IGF2019 Observation: Compare Chancellor Merkel’s Digital Sovereignty with Chinese and U.S. Version

The 2019 UN IGF is right now being held in Berlin and entering the last day. There has been a wide range of exciting discussions. It is a huge step forward that this year's IGF has been able to bring a plethora of topics together under a framework of thinking after the efforts done by the UN Secretary-General António Guterres' High-Level Panel on Digital Cooperation (The Age of Digital Interdependence) and by German scholars' engagement with all the stakeholders... more

Creating, Protecting and Defending Brand Equity - Part 1

Trademark laws exist around the world to facilitate the use, registration and protection of your brand. With the incredible growth of the internet and the surge in global commerce it has helped produce, the importance of having a recognizable name has grown. In tandem, the risk of infringement, the threat of someone else trading on or benefiting from someone else's brand equity, has also grown. While it is easier than ever to create a global brand, the challenges involved in protecting the equity it creates have increased. more

Explaining Growth in Broadband Demand

I haven't talked about the growth of broadband usage for a while. However, I was explaining the exponential growth of broadband usage to somebody recently, and I suddenly realized an easy way for putting broadband growth into context. The amount of data used by the average broadband user has been doubling roughly every three years since the advent of the Internet. This exponential growth has been chugging along since the earliest dial-up days, and we're still seeing it today. more

Bridging the Gaps: MAAWG, IETF, and BITS Establish Formal Relationships

As announced this morning, the Messaging Anti-Abuse Working Group (MAAWG) has established formal relationships with the Internet Engineering Task Force (IETF) and the BITS/Financial Services Roundtable... It's often said that there are too many different organizations working on the overlapping areas of abuse, trust, and related issues. I believe the collaborative approach MAAWG has chosen will bridge these gaps. more

CNN.Com, Politically Motivated DDoS, and Asymmetric Warfare

Once again I find myself thinking about the nature of the asymmetric warfare threat posed by politically motivated DDoS (Estonia in 07, Korea in 02, and now China vs. CNN in 08). I keep thinking about it in terms of asymmetric warfare, a class of warfare where one side is a traditional, centrally managed military with superior uniformed numbers, weaponry, and skill. On the other we have smaller numbers, usually untrained fighters with meager weapons, and usually a smaller force. Historical examples include the North Vietnamese in the 20th century and even the American Revolution in the 18th century. Clearly this can be an effective strategy for a band of irregulars... more

Scaremongering from Spy Agents

In an article for the Financial Times, Mr Hannigan -- the chief of the British spy agency GCHQ said: "I understand why they [US technology companies] have an uneasy relationship with governments. They aspire to be neutral conduits of data and to sit outside or above politics." "But increasingly their services not only host the material of violent extremism or child exploitation, but are the routes for the facilitation of crime and terrorism."... more

Can the Internet Work Across Borders?

On the face of it, the answer is a rather obvious and simple "yes"! The Internet obviously works across borders. Technically, it is a global network servicing its users wherever they may be on the planet. But it is this very nature -- the fact that the Internet is not bound to a specific country or territory -- which has more and more people asking themselves whether it can really work across borders. more

Pre-Registrations of .NYC Domain Names and the Shattered Dream

In response to United Domains pre-registration of .nyc domain names, we posted the below on our blog and the NARLO sites yesterday. While United Domains pre-registration service is free and non-binding, the North American Regional At Large Organization, part of the ICANN governance ecology, is concerned that "the offer of such a service could create artificial demand..." more

Why 5G Won’t Be Here Tomorrow

I just saw another article yesterday written by a major-city newspaper telling the public that 5G is coming in 2020. I hate to see reporters who have accepted the nonsense being peddled by the carriers without digging a little deeper to find the truth. At some point in the near future, the public will finally realize that the 5G talk has mostly been hype. more

Federal Data Crisis: Unreliable Federal Databases are Destroying Opportunities for Small Businesses

Databases are the infrastructure of the modern administrative state and data is its lifeblood. When the data is contaminated with errors, federal agencies have difficulty performing even the most basic administrative functions such as managing its inventory of office space and protecting the personally identifiable information (PII) of social security number holders. The federal dissemination of unreliable data doesn't just waste money; it undermines public trust in government and leaves it unmanageable. more

Mid-Year .brands Review: 2017 Off to a Brilliant Start

If you've read my blogs in the past, you'll know that I'm really passionate about the benefits that .brands can deliver to organizations and their customers. We are now half way through 2017 which provides us with an opportunity to have a good hard look at the data and reflect on the last six months in the .brands space. Here is the punchline -- it's pretty damn impressive, and for a variety of reasons. more

CES 2013 Dazzling Innovations - Why Cablecos Should Care

This year, I joined the crowd in Las Vegas for the all-important event that kicks off everything tech for the year - the 2013 International CES. It's a week where geeks and geek-wannabes from around the world seek inspiration and recharge their creative juices. Consumer brands of all types came out in full force, even with the noticeable absence of Apple and Microsoft's presence. More than 150,000 attendees made the trek to what became a technology mecca for the week... But why should MSOs care about a "consumer" electronics show? more

Topics

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

DNS Security

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days