Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

A Layered Approach to IG: Cooperation or Crisis!

In an Internet governance agenda that treats diversity of addressing issues as the ultimate end at any cost, technology and its end-users are mere means, and much of the work that sustains the Internet is ignored entirely. As a nation, you are free to initiate different regulations, but when you start getting into the world of infrastructure, you are legislating far beyond the nation-state borders. more

Are We Ready to Defend Our Freedom? Book Review: “The Age of Surveillance Capitalism”

It is not often that you read a book where afterward nothing seems the same again. Like Adam Smith's The Wealth of Nations, Shoshana Zuboff's book: The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power,, puts what we do in these times into a context and gives a focus to ongoing issues of privacy and governance with regard to the Domain Name System. This is even more astonishing as the book does not even mention the DNS, the Internet ecosystem or even Internet Governance directly. more

It’s Official: 2016 Was a Record Year for Domain Name Disputes

As I predicted more than three months ago, 2016 turned out to be a record year for domain name disputes, including under the Uniform Domain Name Dispute Resolution Policy (UDRP). That's according to statistics from the World Intellectual Property Organization (WIPO), the only UDRP service provider that publishes real-time data on domain name disputes. WIPO's statistics show 3,022 cases in 2016 -- an increase of almost 10 percent from 2015. The previous most-active year for domain name disputes was 2012... more

IP Addresses Are Not Telephone Numbers - The Fundamental Flaw with the FCC’s Proposed Privacy Rules

Last month the FCC released a Notice of Proposed Rulemaking (NPRM) on Customer Proprietary Network Information (CPNI), the information telcos collect about consumers' phone calls. The Commission's proposed rules would adapt and apply privacy rules that have historically applied to the traditional telephone space to broadband carriers. It would also regulate how broadband providers use and share that data. more

Locking Out Competing Providers is Bad

Today one of the headlines in Computer Sweden was that there is a dispute between Telia and the regulator PTS in Sweden. PTS requires Telia to stop locking out competing TV-distribution companies for IP-TV in the access network (DSL) that Telia runs. Specifically, they lean towards the fact Telia is dominant provider of the copper, and require Telia to competitors give access to the larger frequency band in the copper that they claim is needed for TV distribution. more

U.S. Outgunned in Hacker War

The Wall Street Journal has an interview with the outgoing head of the FBI's cyber crime investigation Shawn Henry. In it, he has a blunt assessment of the US's capabilities when it comes to combatting online crime, especially data theft and hacking... The more I read around the Internet, the more clear it's becoming at how cyber security is becoming a central focus. This has pretty big implications for the cloud. more

ICANN and GAC: A New Role Needed?

Syracuse University professor Milton Mueller published a blog under the title "Will the GAC go away if the Board doesn't follow its advice?". Having been to a number of (very limited) ICANN meetings on behalf of law enforcement cooperation, I would like to share a few - probably thought provoking - observations. The GAC should not leave ICANN but it may be more efficient if its role changed and its efforts were aimed at a different form of output. more

New Report of Afnic on the Global Domain Name Market: Strong Contrasts and Disparate Regional Dynamics

Afnic, the association responsible for several Internet Top Level Domains, including the .fr country-code TLD, shares its annual global domain name market analysis. In this new report, the association deciphers global trends and highlights the specific characteristics of the different segments and the regional particularities. more

Getting on with Digital Transformation: Three Steps to Making Strategic Technology Choices

In a recently published Uptime Institute Survey, Uptime Institute found that organizations operating data centers are finding it increasingly difficult to recruit professionals skilled in security, networking, and hybrid technologies. This realization comes at an interesting time, as the monolithic business infrastructure built over the last two decades is now entering a period of transformation. more

How Do We Get More Network Operator Feedback Into IETF Standards? Please Take This Survey

How do we get more feedback from the operators of networks back into the standards process of the Internet Engineering Task Force (IETF)? How do we help know whether the open standards being developed within the IETF reflect the operational realities of the networks into which those standards will be deployed? If we could get more network operators participating in the IETF standards process, would that result in better standards that are deployed faster? more

Leveraging Traffic Statistics to Manage Corporate Domain Portfolios

Corporate domain name portfolios often consist of domain names that do not resolve to relevant content. In fact, it's not uncommon for less than half of corporate domains to point to live content. Sure there are domains such as those that point to "sucks" sites or those registered anonymously for future use that purposely do not resolve, but those are the exception to the rule. more

Sopho’s Threat Report Focuses on Social Network Spam

The latest Sophos Threat Report shows an upward trend in spam and identity theft through social networks. One of the examples Sophos gives is Facebook. In general Sophos claims that from 2009 to 2010 the spam, phishing and malware containing messages all doubled. more

Whatever Happened with Namespace Collision Issues and the gTLD Round of 2012

The new gTLD program of 2012, based on the Generic Names Supporting Organization (GNSO) policy recommendations of 2007, has been both a success and mess. In terms of its success, many new and innovative names are being introduced on the Internet, more most every day. The mess has involved ad-hoc, independent decisions by the Board and implementation decisions by ICANN staff that have resulted in variety of problems including a broken community evaluation process... more

An Economic Outlook on Information Security

As enterprise information security spending is scrutinized in unprecedented fashion in 2009 Information Technology management will seek to get more for their security dollar. While budgets tighten and risks grow due to the global economic downturn IT departments will be looking for point solutions, not suites of security tools. more

ICANN and the Developing World: Examining The Outreach Program

Shravanti Reddy?s recent piece draws attention to an important issue that has nagged at ICANN ever since the ill-fated at large elections, when participants from the developed world greatly outnumbered those from the developing world. This imbalance was somewhat mitigated by the regional delineation of candidates, but it nonetheless raised two important questions that have yet to be settled:

First, how can ICANN (and, more generally, Internet governance) be more inclusive of developing countries? And second (less often asked, but perhaps even more important): Why should developing countries care about ICANN -- i.e., why does the answer to the first question even matter? This article discusses some recent developments related to the first question; a later article will consider some specific reasons why ICANN matters to the developing world. more

Topics

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days