Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Congress Must Approve Transfer of IANA Function to ICANN

Earlier this year, the Obama Administration announced its plans to turn over the very heart of the Internet to the control of ICANN. On Monday, Republican leaders of the House and Senate Judiciary Committees sent a letter asking the Government Accountability Office to study whether a Congressional vote on the transfer is required under the Constitution's Property Clause because administration of the root zone file is a government asset, created under government contract. Some will no doubt dismiss the letter as Republican obstructionism. more

Is Secured Routing a Market Failure?

The Internet represents a threshold moment for the communications realm in many ways. It altered the immediate end client of the network service from humans to computers. It changed the communications model from synchronized end-to-end service to asynchronous and from virtual circuits to packet switching. At the same time, there were a set of sweeping changes in the public communications framework... more

ICANN’s Trademark Clearinghouse to Provide Unprecedented Protections in the Domain Name Space - HUH?

Really ICANN? The Trademark Clearinghouse provides unprecedented protection. According to your recent announcement it does. Do tell, ICANN -- in what way does the Trademark Clearinghouse protect anything? more

ICANN Chief Announces Departure Via Twitter

ICANN's CEO and President, Rod Beckstrom, has announced that he will be stepping down in July of next year. The announcement came via Twitter of all places, with a press release, presumably with more details, due sometime soon... With the launch of the new Top-Level Domain (TLD) program scheduled to officially launch early in 2012 maybe Beckstrom feels that his job "is done", or maybe there's another motive behind his departure. more

The Disadvantages of Digital Inclusion and the Perils of Non-Universal Access

Many of us are familiar with network effects within telecommunications. Fundamentally, the notion is that as the number of participants in a network increases, the value of that network increases superlinearly. Though many different theories exist about how best to value these networks, the general idea is that the more people on a network, the more benefits accrue to everyone on the network... more

Why Regulate Cable Internet Access

The cable guys have their way of saying it: "What do you want to do, nationalize our businesses?" Another way of seeing this issue is: We have a very few very large providers of highspeed internet access in U.S. They have sufficient market power to decide how and when to prioritize internet communications. And all of these providers are competing with the internet in some way -- they are all (or are becoming) old media and old telecom companies that want to maintain control over their distribution channels. more

Internet Governance After Busan: Playing the Long Game

As you might imagine, I've been following the ITU's Plenipotentiary Conference very closely. It was built up to be the great showdown of our time -- the pro-'free and open' Internet in one corner (comprised for the most part of developed and democratic nations), in the other corner a contingent of totalitarian regimes bent on a fractured, censored Internet -- a near battle royale for control of one of the greatest communications tool the world has ever seen. more

When Businesses Go Dark: A DDoS Survey

In February 2012, Neustar surveyed IT professionals across North America to better understand their DDoS experiences. Most were network services managers, senior systems engineers, systems administrators and directors of IT operations. In all, 1,000 people from 26 different industries shared responses about attacks, defenses, ongoing concerns, risks and financial losses. more

GDPR, ICANN, and Registrar WHOIS

On Friday I was on a surprisingly interesting session at Rightscon 2018 in Toronto about GDPR and WHOIS. The panel consisted of Eleeza Agoopian from ICANN staff; Avri Doria who was recently appointed to the ICANN board; Elliot Noss who runs large registrar Tucows; Stephanie Perrin who has done a lot of privacy work for the Canadian government and as an ICANN volunteer, and me; Milt Mueller, who is now at Georgia Tech, moderated. more

Internet Governance Forum Publishes BPs on Regulation and Mitigation of Unsolicited Communications

The IGF this morning published a number of reports, including the aforementioned one, at the URL provided, titled 'IGF 2015 Best Practice Forum Regulation and mitigation of unsolicited communications.' The reports can be found in the included URLs on the IGF Website. more

Is the WCIT Indeed Wicked?

The traditional network operators see OTT services as a threat, and the companies offering them are perceived to be getting a free lunch over their networks - they are calling for international regulation. In particular, the European telcos (united in ETNO) have been claiming that this undermines their investment in infrastructure and they want to use the WCIT conference in Dubai later this year to lobby for regulatory changes that would see certain levies being levied - something that is strenuously opposed by, among others, the USA and the APAC countries. more

New TLD Applicants: Read This Before Selecting a Registry Provider

As each day passes, I spend more time immersing myself with prospective clients who are weighing up our offering over those of alternative providers. The more I become entrenched in this competitive process, the more it becomes increasingly clear that many of the competing RSPs pitching their wares to hopeful applicants are misleading them by hiding critically important information in fine print disclaimers or feeding them rubbish in order to whittle down the competition. Competition is a great thing; it just needs to be on the same playing field. Make sure you are comparing apples with apples. more

The Design of the Domain Name System, Part VII - Related Names Are Not Related

In previous installments we've been looking at aspects of the design of the DNS. Today we look at the relationship of similar names in the DNS. A poorly appreciated aspect of the DNS is that there is no inherent relationship between similar looking names. more

Google Baloons and Telesat Satellites

Telesat will use Google's network operating system. Telesat is making progress. Within the last month, they announced a launch contract with Blue Origin, a successful antenna test with Ball Aerospace and completion of system requirements reviews, but perhaps more interesting is an agreement to use the software defined network (SDN) platform Google has developed for their Project Loon. more

Protecting Yourself from Spear Phishing

One of the big trends this year is spear phishing. These are phish attacks that are frequently (though not always) against high profile users. The purpose of these attacks is to steal sensitive data or get elevation of privilege inside the service by exploiting a software vulnerability within the user's computer that transmits usernames and passwords back to the phisher. more

Topics

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days