Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Which Way Does Your Data Flow?

Data may be moving to the cloud, but understanding the physical geography underlying the cloud is becoming increasingly critical. October's decision by the European Court of Justice, striking down key portions of the Safe Harbor rules that some companies had relied on to legally transfer personal data between Europe and the U.S., was only the latest example of the regulatory uncertainty involved in cross-border data flows. While Internet companies have begun to address challenges at the static geographic points where data is resident, understanding the actual paths that data travels is an important and sometimes overlooked part of the compliance analysis. more

Touching Enhanced Cooperation

A concrete plinth was lain at the foundation of durable Enhanced Cooperation this week when ISOC unveiled its IXP toolkit and portal. In simple English (which no doubt will be expanded to other languages) the soft launch modestly seeks feedback, corrections, and further input to the already pithy and instructive content. More to the point, this resource responds to one of the principle demands of those who do not recognize themselves in the multistakeholder model: how do we get our own IXP? more

Setting ICANN’S Governmental Advisory Committee Up to Succeed

ICANN's Governmental Advisory Committee (GAC) - the special stakeholder group responsible for providing government advice to ICANN on issues of public policy - has an important role to play in the remaining evaluation and delegation phases of the new Top-Level Domain (TLD) program. For some applicants, the future of their new TLD projects may rest on the decisions of the 50 or so national government representatives that are active members of the GAC. more

Why Cancel a Domain Name in a UDRP Case?

While the most common results of a UDRP proceeding are either transfer of a disputed domain name to a complainant or denial (that is, allowing the respondent to retain it), there is another possible outcome: cancellation. I'm always surprised to see a UDRP decision in which a domain name is cancelled. True, many trademark owners don't really want to obtain control of a disputed domain name (and, instead, they simply want to get it taken away from a cybersquatter). more

Likely Timeline to New gTLD Delegation With Batching

Today, the team at ARI Registry Services decided to tread where no-one has tread before and map out the likely timeline to new gTLD delegation with batching. The exercise took some time, given that the information provided in the Applicant Guidebook is limited and there hasn't been any specific public data made available. However, we have presented what we believe to be the likely scenario should ICANN proceed under the current batching model, assuming a first batch of 500 applications. more

U.S. National Cybersecurity Strategy and Its Impact on Domain Security

Last month, the U.S. National Cybersecurity Strategy was launched, providing a new roadmap for stronger collaboration between those operating within the digital ecosystem. The strategy calls on software makers and American industry to take far greater responsibility to assure that their systems cannot be hacked while accelerating efforts by the Federal Bureau of Investigation and the Defense Department to disrupt the activities of hackers and ransomware groups around the world. more

Paths of Glory: Privacy Still Matters

The world has changed dramatically for the better over the last 15 years, mainly due to the commercialization of the Internet. That is what I would like to believe. Unfortunately, I am no longer sure. True, the Internet connects all of us with every corner of the world... For the rest, the times may be changing, because there are those who believe that the Internet should be molded to fit those same old bureaucracies and corrupted institutions that have plagued humanity for decades, if not centuries. The solution, many times, feels far out of reach. more

Net Neutrality Advocates: Wireless Carriers’ Network Management Must Be ‘Reasonable’

Emboldened by their summertime victory against Comcast, advocates of network neutrality said Thursday that the next front in battle for the principle would be against wireless carriers who make "unreasonable" network management decisions. In a panel discussion on managing wireless networks at the Wireless Communications Association conference here, Free Press Policy Director, Ben Scott and Google Telecom Counsel, Richard Whitt said that the FCC's Net neutrality principles would bar discrimination over wireless networks -- while conceding that the networks are, for the time being, more bandwidth-constrained than wired-based network. more

Cruz and Co Send ICANN Another Letter

Republican Presidential hopeful Ted Cruz (and others) has sent yet another letter to ICANN. This time round, the letter is addressed both to the Chairman of the ICANN Board, Dr Steve Crocker, as well as to former CEO Fadi Chehadé. The letter repeats some of the questions previously put to ICANN, though the wording is much blunter this time round. Cruz' office issued a press release with details of the letter under the title of "ICANN Is Stonewalling the U.S. Congress". more

Broadband in Emerging Markets

Today, over half the world's population now has access to a mobile phone, with 5.37 billion mobile subscriptions and over two billion internet users worldwide by the end of 2010. However, these are more than just bald statistics -- today, modern ICTs are genuinely changing people's lives for the better. more

Searching for Truth in DKIM: Part 5 of 5

Throughout this series of articles we've been talking about DKIM, and what a valid DKIM signature actually means. .. What this means for senders (of any type) is that with DKIM, you’re protected. On the internet, your domain name is a statement of your brand identity – so by signing messages with DKIM, you can finally, irrevocably tie those messages to your brand. more

Unregistered Gems Part 3: Keeping Your -ize on the Prize

The previous two articles in this series have outlined techniques for 'mining' brandable domain names -- that is, domain names of potential interest to entities looking to launch a new brand name and associated website -- from the enormous dataset of unregistered names (determined via zone file analysis). The key element of the identification process is the implementation of filtering techniques to identify... more

Landing Sites, Internet’s Achilles Heel of the Internet?

For a student final dissertation TV documentary short, 10 minutes, I have ended up choosing to investigate whether the landing stations for trans-atlantic cables are the achilles heel of the internet. As an outsider to the world of internet infrastructure I have been struck by how easy it has been to identify the landing stations in Cornwall and the cables that enter them. (Thank you Google for the aerial photographs) more

M-Government Requires Mobile ID

More and more governments are now looking at electronic ways to deliver services to their citizens. With the enormous growth in mobile penetration this infrastructure is now becoming a viable alternative in the delivery of services. But personal authentication is required to make this happen. This is recognised throughout the industry for a range of services and the GSMA has launched a project 'Mobile Contact' aimed at developing a standardised mobile ID. more

ACMA: 30,000 PC’s Infected in Australia Per Day

Anti-spam and malware enforcement agency ACMA reports on this (shocking high?) figure. Keep this up and ca. 50% of the Australian population is infected within a year. I remember a presentation from Sweden only a few years ago, that there were only a little over a thousand infected pc's in Sweden. (Reactions were: that can't be correct. Too low) Do you know what the numbers are for your country and maybe more importantly what your government and/or Industry is/are doing about it? more

Topics

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

DNS Security

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days