Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

ICANN Proceeds With Batching… For Now

Yesterday, ICANN released a statement to confirm its intention to evaluate new Top-Level Domain applicants in batches using the proposed timestamp system (digital archery) to determine the batches. Whilst this is not the result I was hoping for, I was not surprised by this move. more

Where is the Standard ‘Socket’ for Broadband?

When you plug into a broadband socket, what you are accessing is a distributed computing service that supplies information exchange. What is the service description and interface definition? For inspiration, we can look at the UK power plug. One of the great unsung fit-for-purpose innovations in British society is the BS1363 13 ampere power plug and socket. This is superior to other plugs by virtue of its solid construction and safe design. more

Streaming Video Continues to Grow

I saw recent headlines that claim that the time people watch streaming content is now greater than all of the time spent watching content from cable companies. A deeper look at the underlying statistics shows that this isn't entirely true, but it makes for a great headline. But it's still news that the percentage of viewing done through streaming continues to grow while the number of traditional cable customers continues to plunge. more

The FBI and the iPhone: Important Unanswered Questions

As you probably know, the FBI has gotten into Syed Farook's iPhone. Many people have asked the obvious questions: how did the FBI do it, will they tell Apple, did they find anything useful, etc.? I think there are deeper questions that really get to the full import of the break. How expensive is the attack? Security - and by extension, insecurity - are not absolutes. Rather, they're only meaningful concepts if they include some notion of the cost of an attack. more

Hyperties: “Travel Adaptors” for the Cloud?

I have spent the day here in Berlin attending my second advisory board meeting for the EU research project reTHINK. I'm chewing over what I learnt about the possible future of the telecoms and cloud industry. There has been a decades-long tussle between the communications and computing parts of the ICT industry. Both sides wish to exert power over the digital economy. Sometimes this tussle works for the common good, sometimes not. more

Fixed Wireless in Cities

I am often asked by cities about the option of building a municipal fixed wireless broadband network. As a reminder, fixed wireless, in this case, is not a cellular system but is the point-to-multipoint technology used by wireless Internet service providers (WISPs). My response has been that it's possible but that the resulting network is probably not going to satisfy the performance goals most cities have in mind. more

A Note to PhDs Transferring From Academia to the ML Industry

Congratulations. You have successfully defended your PhD dissertation, and it was a defining moment in your life. Your professorial experience and teaching assistant credentials are finally going to pay off. Further, you might have hundreds of citations, and PhDs are sought after because of their subject matter expertise. Well, that is OK. All that hard work and discipline allows you to use your newly earned moniker and seek out additional opportunities, either within the scope of academia or corporate options. Wait, Wait, Wait, not so fast. If you are thinking of just strolling into the industry and immediately begin earning a six-figure salary, think again, my friend. more

M3AAWG Offers Some Sensible Password Advice

M3AAWG is a trade association that brings together ISPs, hosting providers, bulk mailers, and a lot of infrastructure vendors to discuss messaging abuse, malware, and mobile abuse. (Those comprise the M3.) One of the things they do is publish best practice documents for network and mail operators, including two recently published, one on Password Recommendations for Account Providers, and another on Password Managers Usage Recommendations. more

Cloud Marketplaces Help Cut Through Confusing IaaS Pricing

A recent study from 451 Research reveals some interesting facts about the nature and complexity of cloud pricing. In theory, one of the major benefits of using the cloud is that on-demand pricing makes it easy to know exactly how much a company will be spending and avoid large-scale capital expenditure. That's certainly true, but the cloud space has yet to develop into a fully mature market, which means that companies have to tangle with wildly different pricing models and the cost itself can vary between vendors. more

Good Samaritans with Network Visibility

In a big open office 30 feet from me, a team of US Veterans speak intently on the phone to businesses large and small, issuing urgent warnings of specific cyber security threats. They call to get stubborn, confused people to take down hidden ransomware distribution sites. They call with bad news that a specific computer at the business has malware that steals login credentials. more

Google Claims It Fixed the Security Holes the CIA Exploited

WikiLeaks shook the internet again on March 7, 2017, by posting several thousand documents containing information about the tools the CIA allegedly used to hack, among others, Android and iOS devices. These classified files were obtained from the CIA's Center for Cyber Intelligence, although they haven't yet been verified and a CIA official declined to comment on this incident. This isn't the first time that the U.S. government agencies were accused of crossing the line and undermining online security and civil liberties, as it's been only a year since the infamous FBI-Apple encryption dispute. It's like "1984" all over again. more

Community New gTLD Applications: The Wrong Choice

Community new gTLD applications were one of the three options offered by version one of ICANN new gTLD applicant guidebook. It was also possible to submit a "generic" or a "geographic application." I dug the ICANN website and found out that, in the end - and according to me only - it was a bad choice to submit such application...
I went through the 52 delegated applications to investigate which ones have lots of domain name registrations and which ones don't. more

“In the Public Interest”

Prior to November 30th of this year, the National Telecommunications and Information Administration (NTIA) must decide whether to renew or allow to expire its Cooperative Agreement with Verisign, the private-sector corporation that operationally controls the root of the Internet.. The Cooperative Agreement is unusually obscure, especially considering its central role in the operation of the Internet's Domain Name System (DNS). more

A Better PIR Deal – Maintaining Trust Is Good Business

I run a business. For years I've been in the ICANN Business Constituency, holding a series of different positions including Chair. Suffice it to say, I'm absolutely ok with making money and generally speaking, letting markets work. I also care about NGOs. For years our firm worked with PIR on the .NGO project. We got to see up close the role PIR has played as a supporter of NGOs online -- encouraging best practice, helping push out DNSSEC to a global audience, working on DNS abuse issues, supporting the sector. more

What is a Security Mechanism?

Orin Kerr recently blogged about a 9th Circuit decision that held that scraping a public web site (probably) doesn't violate the Computer Fraud and Abuse Act (CFAA)... On its surface, it makes sense – you can't steal something that's public – but I think the simplicity of the rule is hiding some profound questions. One, I believe, can most easily be expressed as "what is the cost of the 'attack'"? That is, how much effort must someone expend to get the data? Does that matter? Should it? more

Topics

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

DNS Security

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days