DOTZON's 2025 study analyzes over 410 corporate dotBrands to reveal how companies strengthen digital identities through custom top-level domains. Audi retains first place, while newcomers like CRS and rising performers such as Schwarz demonstrate growing strategic use. more
Last fall, when we put forth our bid to acquire the Public Interest Registry (PIR), our announcement - made jointly with PIR and its parent, the Internet Society - was met with questions. We took them seriously and made a conscious effort to engage with representative members of the .ORG community to deepen our understanding. We found that a consistent message was that the commitments made by Ethos since this fall addressed most of the community's issues, but there was a question as to whether they were enforceable and if so, how? more
On 11 February, I participated in a discussion about the pending sale of PIR at American University Washington College of Law, appropriately titled, The Controversial Sale of the .ORG Registry: The Conversation We Should Be Having. It was great to have a balanced discussion, free of some of the emotions that have often made it hard to discern the realities of the transaction. Certain misapprehensions arose in the discussion that we lacked the time to explore fully, so I want to take those up here. more
In response to Russia's horrific invasion and war against the Ukrainian nation ordered by Dictator Putin that will live in infamy, an array of nations, organizations, and companies have responded to shun and shut off Russia in every possible manner. The actions include no-fly zones, removal from ICT network services, and essentially universal declarations of condemnation. For the first time ever, all Russian proposals to the International Telecommunication Union (ITU) quadrennial standards body plenary known as the WTSA have been "bracketed"... more
Efforts to combat online piracy are pushing courts to weaponise the Internet's naming system. Turning DNS operators into enforcement agents may deliver quick takedowns, but risks collateral damage, jurisdictional conflict and long-term fragmentation of the Internet. more
Dinni Jain, the CEO of Google Fiber, posted a blog last week that talks about dramatically increasing the top speeds available on fiber. He says the specific announcement will come in the coming months to dramatically expand Google Fiber's gigabit offerings. The blog gives a hint at what might be coming. Included in the blog is a speed test from the home of a Google Fiber employee in Kansas City who is receiving 20.2 Gbps. more
Diverging policies and fee structures among Regional Internet Registries are reshaping the global IPv4 market. RIPE has emerged as a liquidity hub, while others leak resources, risking long-term instability and financial fragility. more
In 2021, the story was price. In 2022, the story was price and large block supply. Spurred by unprecedented unit pricing, the IPv4 market in North America experienced its second-best year ever in market history. Nearly double the number of IPv4 addresses were traded in 2022 compared to 2021, predominantly due to the increased flow of large block supply from twelve sellers, five of whom were first-time market participants. more
A few good questions have circulated in response to my recent blog post seeking clarity around the following: 1) what we mean with respect to adhering to Public Interest Registry's (PIR) historic practices on pricing, and 2) our interpretation of how the new co-operative proposal would reward speculators. With regard to Ethos' pricing commitments: we are not saying that we will raise prices 10% every year -- our commitment is that any price increase would not exceed 10% per year on average, if at all. more
The information security industry, lacking social inhibitions, generally rolls its eyes at anything remotely hinting to be a "silver bullet" for security. Despite that obvious hint, marketing teams remain undeterred at labeling their companies upcoming widget as the savior to the next security threat (or the last one -- depending on what's in the news today). I've joked in the past that the very concept of a silver bullet is patently wrong... more
Expanding on a framework for quantifying word mark similarity by examining algorithms and proposing enhancements. This article assesses consistency with UK trademark case decisions and a search tool, explores subsequence analysis for similarity, and suggests using IPA phonetics to measure aural likeness. The objective framework could improve consistency in trademark assessments, despite the inherent subjectivity of legal tests. more
The Bug Bounty movement grew out a desire to recognize independent security researcher efforts in finding and disclosing bugs to the vendor. Over time the movement split into those that demanded to be compensated for the bugs they found and third-party organizations that sought to capitalize on intercepting knowledge of bugs before alerting the vulnerable vendor. Today, on a different front, new businesses have sprouted to manage bug bounties on behalf of a growing number of organizations new to the vulnerability disclosure space. more
The number of 'things' connected to the internet is already bypassing the number of people on the planet. This Internet of 'things' is changing the way we live and work: from the way food is grown and produced on farms through automated temperature and feeding controls, to the way we check prices and buy through connected terminals, to the vehicles we drive, the security cameras at work, and automated gates at the entrance. Connected 'things' are everywhere. All these 'things' are helping us to be more productive and efficient while also offering more and more convenience. more
At a staggering $100 billion dollar valuation and reported 900 million users, Facebook represents a massive presence in the global economy. From an Internet infrastructure perspective, Facebook also ranks amongst the largest of the "hyper giants" generating a significant share of daily global Internet traffic. This blog explore Facebook's size in terms of its Internet traffic contribution. more
Last month, application security provider Veracode came out with a study that stated that more than half of all enterprise applications aren't secure. The company tested approximately 2,900 applications over an 18-month period, and 57 percent failed to meet Veracode's "acceptable levels" of security. While this study gained a tremendous amount of traction in the media... it does not focus on the bigger issue... more
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byWhoisXML API
Sponsored byCSC
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byRadix