Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

How To Build A Cybernuke

The Internet infrastructure has been having a bad month. Not as bad as, say, the world's aviation infrastructure, but bad enough. First, Chinese Internet censorship leaked out to a few massively unlucky users of the I root server. Then China Telecom failed to filter someone who leaked thousands of hijacked routes to other people's networks through them, probably by accident. And then, inexplicably, Forbes went where no one had gone before... more

DOTZON Study: Digital City Brands 2023

We've just published the 2023 edition of the DOTZON study "Digital City Brands." After introducing the study in early 2017, DOTZON has mapped how successful cities are using their Digital City Brands for the seventh year in a row. The Digital City Brand is the digital dimension of the City Brand and mirrors the "Digitalness" of a city. The advent of the Internet was why Digital City Brands came into being in the first place. more

Using AM Radio Towers in Designing Wireless Networks

One existing resource that is often overlooked in designing wireless networks is AM radio towers. For the most part, companies deploying fixed wireless and microwave antenna have avoided these towers. This is due to the nature of AM radio, which transmits at such a low frequency that the entire tower is effectively used as the transmitting antenna. The entire tower is energized with the AM signal, and the typical AM tower sits on a base insulator that blocks the tower from being grounded.  more

Thoughts About U.S. Government’s Decision on IANA Transition

Last week the government of the United States made an announcement that sent shockwaves through the Internet governance world. The National Telecommunications & Information Administration (NTIA), a division of the Department of Commerce, publicly stated that it will not be renewing its contract with the Internet Assigned Numbers Authority (IANA) past its September 2015 expiry date. The importance of this announcement cannot be underestimated. more

More on Private Auctions for New gTLDs

My recent post on private auctions for new gTLDs under contention generated many responses from applicants. Here I follow-up with answers to the questions raised... Many, but certainly not all, applicants have a strong motivation to participate in a private auction. This incentive is especially strong for domains for which the community, geographic, and other factors are not compelling. more

The Commonest Domain Features: Constructing Look-Up Tables for Use as Part of a Domain Risk Scoring System

Many previous pieces of research have focused on the desirability of a comprehensive scoring system, to be used for ranking results identified as part of a brand-protection solution, according to their potential level of threat. Such scoring systems offer the capability for identifying prioritised targets for further analysis, content tracking or enforcement actions. more

Aligning Broadband and Healthcare

For many years I have been saying that in order to generate business cases that will support the developments of national broadband networks it is necessary to take into account the social and economic benefits of such investments. The reality is that these benefits do not show up on the balance sheets of the traditional telecoms infrastructure companies and this is a key reason they are reluctant to make such investments. more

FCC’s McDowell Warns of “Irreversible International Regulation”

The stakes of the U.S. communications policy debates are larger than many assume. Subjecting broadband to new and extensive regulation in the U.S., says FCC Commissioner Robert McDowell in today's Wall Street Journal, could invite a regulatory ripple effect across the globe. more

Trademark Registrations on the ‘Supplemental Register’ Don’t Count (in Domain Name Disputes)

The Uniform Domain Name Dispute Resolution Policy (UDRP) has never required that a complainant own any trademark registrations to succeed in a domain name dispute, given that common law trademark rights (if properly established) are sufficient. But, as a pair of recent UDRP decisions reminds us, even some registrations are inadequate. The issue relates to the first element of every UDRP complaint, which requires the party seeking relief to prove that the "domain name is identical or confusingly similar to a trademark... more

New Standard for Reverse Domain Name Hijacking

Uniform Domain-Name Dispute-Resolution Policy (UDRP) Rule 1 defines Reverse Domain Name Hijacking (RDNH) as "using the Policy in bad faith to attempt to deprive a registered domain name holder of a domain name"... There has been a mixed history in granting and denying this remedy for overreaching rights. Some Panels consider RDNH regardless whether it has been requested (even if respondent defaults in responding to the complaint); others will only consider the issue if requested. more

The Next Development in Wireless Broadband

In the USA the FCC has started the discussion on the next level of telecoms in the wireless market, aimed at making spectrum in bands above 24GHz available for flexible-use of wireless services, including next-generation, or 5G networks and technologies. New technologies such as massive-MIMO are going to make it possible to deliver 'fibre-like' speeds over short distance wireless networks operating in the 24+GHz bands. This will make the technology especially useful for high-speed broadband services in densely populated areas. more

New EU WHOIS Verification Recommendations Take Center Stage

The EU has once again turned its attention to domain name registration data (WHOIS) -- this time reinforcing requirements to collect, maintain, verify, and disclose WHOIS for IP enforcement purposes through its "Commission Recommendation" on measures to combat counterfeiting and enhance the enforcement of IP Rights. Published last month, this regulatory action demonstrates the EU's commitment to restore WHOIS despite... more

Global Surveillance: Towards Convergence?

Built for the most part during the Cold War, surveillance systems on a global scale were considered a vital necessity with the onset of nuclear weapons, if only to keep Mutually Assured Destruction at bay. Today, these systems are also used for domestic surveillance and universal data harvesting, including on one's own citizens. Should we still consider these systems with the same reverence as if we were, say, in the midst of some Cuban Missile Crisis? more

Donuts and Efficiency: Ways to Recover Time and Money Lost to TAS

On April 12, ICANN closed the TLD Application System (TAS) to ensure security of applicant data. For more than a month, the system outage has cost applicants and others millions of dollars. Here's how to make up for lost time and money. Donuts supported ICANN's decision to close TAS when it realized there was a data security risk. At a critical moment, ICANN made the right choice... However, now that staff has communicated to affected applicants (including Donuts) and is preparing to re-open the TAS system, efficiency has grown to become a crucial element of the process. more

Why Domain Security Is Your First Line of Defense to Mitigate Phishing Attacks

According to the Cybersecurity and Infrastructure Security Agency (CISA), most cyberattacks, including ransomware and business email compromise, begin with phishing. Although losses due to ransomware now exceed billions annually, most ransomware protection and response measures don't protect against the most common phishing attacks. Established research shows that phishing attacks most commonly occur from a maliciously registered, confusingly similar domain name, a compromised or hijacked legitimate domain name, or via email header spoofing. more

Topics

Cybersecurity

Sponsored byVerisign

DNS Security

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days