Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Net Neutrality - A Good Step Forward But There Is More to Come

The recent decision taken in the USA makes total sense. It has been ridiculous that the incumbent telecoms operators there could present themselves as ISPs and claim that broadband was a content service rather than telecoms infrastructure - by doing this successfully for 20 years, they have not been subject to a range of telecoms regulations. This in turn has stifled competition, innovation, good quality customer services and the development of fibre optic networks in the USA. more

Who Owns Your Connected Device?

It's been clear for years that IoT companies gather a large amount of data from customers. Everything from a smart thermometer to your new car gathers and reports data back to the cloud. California has tried to tackle customer data privacy through the California Consumer Privacy Act that went into effect on January 1. Web companies must provide California consumers the ability to opt-out from having their personal information sold to others. more

Business Logic Vulnerabilities Are the Hidden Menace in Modern Software

The first things that usually come to mind when talking about software development risks are bugs and security issues that have not been detected or those that have been discovered but left unaddressed. Some may also point out poor code quality reviews and the use of third-party components and dependencies laced with malicious code. more

ICANN vs. the Federal Reserve

The Internet is about to go independent. After years of support and supervision, the U.S. Government is about to irrevocably relinquish its control over the Internet by transferring its authority to an independent corporation named ICANN. As part of this push, the current chairman of ICANN posted this article to the Wall Street Journal... What's truly amazing about this piece, is how well it's done... It was only after digesting this piece, that I remembered we are talking about ICANN here. more

Doing Crypto

The recent discovery of the goto fail and heartbleed bugs has prompted some public discussion on a very important topic: what advice should cryptologists give to implementors who need to use crypto? What should they do? There are three parts to the answer: don't invent things; use ordinary care; and take special care around crypto code. more

Rewiring Internet Governance: Summing up ICANN Policy Walking Backward Into the Future (Part 4)

So-called "globalization" and its corollaries which are trade policy and, thus, foreign policy intersect with telecommunications. This ought to be obvious and it is not new. For example, in December 2011, OECD adopted its "Recommendation of the Council on Principles for Internet Policy Making", the latter which apparently connects with an earlier U.S. cyberspace strategy based on something called the "Internet Freedom Agenda" dated 21 January 2010... more

Designing for RealTimeML

The steepening trajectory towards event-driven and real-time API architecture is imminent. This means incorporating event-based APIs into a technology strategy and leveraging existing API legacy systems that may have incurred a fair amount of technical debt, especially for historically progressive organizations. more

Can ICANN Survive Today’s Global Geo-Political Challenges Under Its Existing Narrow Mandate?

Recently, the Presidents of four Latin American countries slammed ICANN over its .amazon domain name decision. This added to a long list of geo-politically infused challenges which ICANN needed to render final decisions on after all delay tactics or deferments had already been fully exhausted. It is clear that ICANN is facing unprecedented challenges as it tackles issues that go beyond its current narrow mandate. more

New Ad Fraud Schemes Utilize Alpha-Numeric Domains

The breach of the Democratic National Committee e-mail system and a massive digital advertising fraud believed to be run by alleged actors in Russia share a common thread beyond their ability to capture the news cycle. Although each event targeted a different weakness in brand/online security platforms, the common denominator is the use of fraudulent domain names. more

Curious Statement About 2012 gTLD Round Name Collision Fears at IGF

During his presentation at IGF on 7 December in Guadalajara, Akram Atallah, President of ICANN's Global Domain Division, said the following: So when you look at that, you'll see that we are left with only 20 to go. There are a few that need to be withdrawn that haven't withdrawn... This surprised me, but since the meeting was about possible new application procedures and not the handling of the last round's persistent problems, I decided not to ask at that point. more

Authentication Methods Used in the RIPE Database

Objects in the RIPE Database can only be modified by those authorised to do so. For instance, an object representing a certain range of IP addresses assigned to an organisation by the RIPE NCC or a Local Internet Registry (LIR) can be modified by the organisation holding that address space. Each database object contains one or more attributes referencing the maintainer(s) of that object. In a maintainer (MNTNER) object, credentials are listed for those who are authorised to modify any object referencing that MNTNER object. more

Is Australia a Hot-Bed of Zombie Activity?

About a week ago, I posted that Australia was getting ISPs to boot infected computers off of their network. I commented on whether or not this was a good policy. However, there was one thing in that article that I wanted to comment on but didn't... more

Understanding the Brazilian Court Decision to Arrest Google’s Representative

Brazil has been on the news lately, and not for good reasons: an electoral judge order the arrest of Google's Director in Brazil for not complying with a court decision that ordered the removal a YouTube video with allegedly defamatory content. A lot has been said about this, but it seems that many people got it wrong, so let's recap some of the misinterpretations that circulated, specially those at the EFF website. more

US Telcos Withdrawing from DSL and Telephony Markets - A Case of Lobbying Power and Poor Regulation

During the last few months the US's main DSL providers AT&T and Verizon have begun retracting from the DSL and landline market in many rural and less commercially viable areas while concentrating on their wireless LTE ambitions. DSL and voice telephony provide relatively low returns, which can be whittled away through network maintenance costs, while LTE promises to deliver proportionately higher profits, based on exorbitant charges by data volume.  more

Can the US Deliver on the President’s ‘Sputnik’ Vision?

In general I think this was another good political speech from the President. However, as we have seen in the past, skilled rhetoric doesn't necessarily give rise to action. If Congress reflects the mood of the American people then the nation is not yet ready to change - or, as the President said, to embark on a new 'Sputnik' vision. The fact that the word 'Internet' was used several times (in absolutely the right context - and often teamed with 'innovation') clearly shows that the President understands the importance of the digital infrastructure. This has not changed since his original campaign in 2008. more

Topics

DNS Security

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days