Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Emerging Cyber-Security Threats and Implications for the Private Sector

The new gTLD program will have a profound impact on the private sector's increasing dominance over Internet information resources and ownership of critical registry technical infrastructure assets. It is already anticipated that only the private sector will take full advantage of the commercial possibilities... However, the successful introduction of new gTLDs will also create new challenges of security for the private sector. more

ICANN Slaps Joker.com and DNS.com.cn

If you have rules and regulations but don't enforce them then there's little point in having any rules or regulations in the first place. One of the criticisms that is often leveled at ICANN is with regard to compliance issues. There are a number of areas where ICANN accredited registrars may be flounting the rules, but if nobody does anything about it then none of the registrars will have any incentive to actually comply. more

Would the Real Network Neutrality Please Stand Up?

I'm sure this is something that's been raked over before, but I don't see a common understanding of what 'Net Neutrality' actually is. Despite many of the Internetorati demanding it by law. There appear to be several different camps, which you could paint as "bottom of IP", "middle" and "top". The bottomistas would see enforced Internet Protocol itself as a premature optimisation and violation of the end-to-end principle. Unhappy that you only get IPv4 or IPv6? Still grumpy that you only have IPv4 and not even IPv6? Really miserable that your VoIP packets are staggering under the poisonous load of IPv6 headers? You're a bottomista. more

Freedom of Expression Part 2: Blocking, Filtering and Removing Online Content

The Internet is a catalyst for what has revolutionised and transformed human societies in giving extraordinary access to information that has catapulted development and economic growth. It also comes with threats of exploitation by those who wish to do harm. In Part 1 of these series, we looked at how Twitter banned Graham Linehan for his tweet where we saw that to an extent, it was justifiable under Californian law but that a Judge in the Fiji courts would disagree with. more

Dr. Peering Commits Malpractice on Net Neutrality

At Tier1 Research, we hate to call out individuals for wrongdoing, but once in a while, it's absolutely necessary. At the moment, the Federal Communications Commission (FCC) is in the middle of the rulemaking process for network neutrality, a complex endeavor. While Tier1 is against interference from regulators as a concept, the proposed rulemaking document from the FCC, while vague, is not completely unreasonable... more

Information and Communication Technologies (ICT) Industry Soon to Be Largest Source of Co2 Emissions

Although on the production side the tar sands are one of the biggest sources of CO2 emissions, the Information and Communication Technologies (ICT) industry, globally is the fastest growing and soon will be the largest source of CO2 emissions on the consumption side of the equation. ICT emissions are produced indirectly from the coal generated electricity that is used to power all of our devices. Currently it is estimated that ICT consumes around 10% all electrical power growing at about 6-10% per year. more

When Will Google™ Become Generic?

Today, there are hundreds of once highly protected famous name brands, which were backed by multi-million dollar promotional budgets, now commonly used in daily lingo as generic names, as it was their huge popularity that made them lose their trademark protection. So why is the use of famous trademarked names as 'verbs' in our daily language feared by the attorneys representing that mark? Now this calls for a closer look... more

Business Model Canvas for Cloud Providers

Cloud Computing is not so much about technology but more about the new business models that this technology enables. The question then is, how do these business models look? One of the most inspiring ways of looking at business models is through the so-called "Business Model Canvas". This article explores the basics of cloud computing business models as drawn out on such a canvas. more

UDRP Dilemma In Proving Bad-Faith Domain Registrations - Part III

In the final part of this 3-part series article, the issue of UDRP in proving bad-faith domain registrations that are held passively is examined with respect to the trademark's characteristics. The registrant's attitude could in some circumstances also be regarded as evidence of bad faith use of a domain name that is held passively. Panels often infer evidence of bad faith of the registrant from an unsatisfactory response or an absence of response to the complainant or if it is impossible to contact the respondent. more

IPv6 Security Myth #5: Privacy Addresses Fix Everything!

Internet Protocol addresses fill two unique roles. They are both identifiers and locators. They both tell us which interface is which (identity) and tell us how to find that interface (location), through routing. In the last myth, about network scanning, we focused mainly on threats to IPv6 addresses as locators. That is, how to locate IPv6 nodes for exploitation. Today's myth also deals with IPv6 addresses as identifiers. more

Domain Owners Lose Privacy

As facts unfold, and the NTIA's decision to take away our privacy comes to light, it is interesting to see the NTIA struggling to explain its decision. Keep in mind that an "as yet to be identified" bureaucrat made this decision to take away your privacy, did it without notice, and without holding hearings. Those affected were not given an opportunity to explain how the loss of privacy would negatively affect them. Quite simply, this is NOT how our government is supposed to work. We should be outraged... more

2021 Domain Name Year In Review

Is it really 2022? Is it? Although many might view 2021 as another "lost" year due to the pandemic, filled with Zoom™ meetings, virtual conferences, working from home and restricted travel - there were a number of notable domain name stories which deserve to be highlighted. So, without further ado, here are the top 10 biggest domain name stories of 2021 - let's go! more

Success Drivers of New gTLD Applications

Being approved by the Internet Corporation for Assigned Names and Numbers (ICANN) as the owner of a new generic top-level domain (gTLD) extension requires considerable analysis before the application is submitted. You must understand the sources of risk, gauge your risk tolerance, and you must obtain an estimate of the value of your proposed TLD's future revenues (with the effects of potential competitors factored in, a step too many applicants ignore). more

Commercial DNSSEC?

Seems that DNSSEC is being subjected to what an old boss of mine used to call the "fatal flaw seeking missiles" which try to explain the technical reasons that DNSSEC is not being implemented. First it was zone walking, then the complexity of Proof of Non-Existence (PNE), next week ... one shudders to think. While there is still some modest technical work outstanding on DNSSEC, NSEC3 and the mechanics of key rollover being examples, that work, of itself, does not explain the stunning lack of implementation or aggressive planning being undertaken within the DNS community. more

Two Years Later Dozens of Registrars Still in the Shadows

In June of 2008 KnujOn reported that 70 Registrars did not have a business address listed in the InterNIC Registrar Directory. Only after reporting a month later that little had changed did ICANN perform a mass update of the directory. On further inspection we found many of the newly disclosed addresses were phantom locations, false addresses, and PO boxes. more

Topics

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

DNS Security

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days