Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

A Link to Eternity

While Google is as secretive about its internal processes and systems as Apple is about product development, every now and then senior people post articles on the official Google blog and offer their thoughts on the development of the web. In the latest posting, two Google engineers, Alfred Spector and Franz Och, look at how search strategies will benefit from the faster computers, greater volumes of data and better algorithms we are likely to see in the next decade, speculating that "we could train our systems to discern not only the characters or place names in a YouTube video or a book, for example, but also to recognise the plot or the symbolism." more

The Journey of IPv6 Implementation 9 Months Later

ICANN 43 in Costa Rica was in the heart of IPv6 implementation with everybody touching on how much it was needed as part of the internet ecosystem to fully utilize the ICANN expansion of the new gTLD namespace from 21 to the maximum number that will manage to get delegated at the beginning of 2013. more

Five Reasons to Avoid Using Maps on Websites

Robert Frost wrote that good fences make good neighbors. Yet when it comes to virtual fences, visualized as maps, I'm not sure there is any way to create "good fences." So many regions around the world are under dispute. And even regions that may appear settled may be anything but. I've long written about the problems of using flags on your website, particularly for navigation. But maps often present a much larger geopolitical challenge. If you can avoid using them, do so. more

The Sportsmanship of Cyber-warfare

As a bit of a history buff I can't avoid a slight tingling of déjà vu every time I read some new story commenting upon the ethics, morality and legality of cyber-warfare/cyber-espionage/cyberwar/cyber-attack/cyber-whatever. All this rhetoric about Stuxnet, Flame, and other nation-state cyber-attack tools, combined with the parade of newly acknowledged cyber-warfare capabilities and units within the armed services of countries around the globe, brings to the fore so many parallels... Call me a cynic if you will, but when the parallels in history are so evident, we'd be crazy to ignore them. more

Transfers of Domain Names Contemporaneous with Complaint: Cyberflight?

Cyberflight (defined as strategically transferring accused domain names to another registrar or registrant upon receipt of a complaint) was a sufficient irritant by 2013 for the ICANN to adopt recommendations to amend the Rules of the Uniform Domain Name Dispute Resolution Policy (UDRP). Effective July 1, 2015 the Rules now include a requirement for locking the domain as well as a change in the timing of transmitting the complaint to respondents. Before the amendment there had been no uniform approach to locking. more

In Defense Of Face To Face

I recently caused a stir in a small but passionate community. I was speaking about a topic I've discussed many times before: the need for more effective public input into the Internet Corporation for Assigned Names and Numbers, the nonprofit corporation that controls the Internet's protocols, addresses and domain name system. "We want public input into ICANN," I had said at a conference at Oxford University. Then, I referred to ICANN's new At-Large Advisory Committee, set up to foster public input and on which I sit: "We've got a mechanism where (the public) can have a seat on the task forces, liaisons to working groups, be part of the policy making process -- I see that in many ways as more important than having a seat on the board." more

The Global Internet Through a Local Lens

As the Internet grows, those countries and societies with mature systems of content development, innovation and entrepreneurism will continue to be better positioned to meet these needs. At the same time, such countries are also better positioned to take advantage of the efficiency, and capacity of the Internet to amplify and extend their cultural reach and economic capacity. The implication of this amplification and extension of cultural reach and economic capacity from developed markets, is that it can drown out indigenous content and restrict local economic opportunities in developing and under-developed markets. more

Internet Continues to Grow at Astonishing Pace (Perspectives from RIPE NCC Membership Stats)

We are at the height of vacation season here in the Netherlands, and the RIPE NCC headquarters in Amsterdam are quieter than usual. The downtime has given me a chance to reflect on how the recent economic downturn has affected our membership growth. The good news is that it hasn't. more

Some Thoughts on the ICANN EWG Recommended Registration Directory Service (RDS)

It has been my distinct pleasure to serve on ICANN's Expert Working Group on gTLD Directory Services (EWG). We put in many long months and what seemed like countless hours of research, discussion, meetings, and deliberations on how to tackle a clean-slate approach to gTLD directory services, popularly known as "WHOIS". In our Final Report, the Expert Working Group (EWG) recommended a Registration Directory Service (RDS) to replace today's WHOIS, providing a next-generation system to better meet the needs of the evolving global Internet with greater accuracy, privacy, and accountability. more

How Not to Stop Spammers

Spam Arrest is a company that sells an anti-spam service. They attempted to sue some spammers and, as has been widely reported, lost badly. This case emphasizes three points that litigious antispammers seem not to grasp: Under CAN SPAM, a lot of spam is legal; Judges hate plaintiffs who try to be too clever, and hate sloppy preparation even more; Never, ever, file a spam suit in Seattle. more

Internet Governance and the Universal Declaration of Human Rights, Part 3: Article 6-12

Internet Governance like all governance needs to be founded in guiding principles from which all policy making is derived. There are no better fundamental principles to guide our policy making than the Universal Declaration of Human Rights, (UDHR). This article is Part 3 of a series exploring the UDHR as a guide and template for the digital governance and digital citizenship. We discuss UDHR Articles 6 through 12 and address topics such as fundamental digital values, cyberlaw, policymaking and the role of tribunals in digital governance. more

China: We Lead 3GPP Wireless Standards

In 2018, nothing can get approved in 3GPP that China strongly opposes. In the past, 3GPP often was a battle between a few American giants and their European peers. A Qualcomm or a Nokia will still be heard, but the power has shifted. I haven't seen evidence that the Chinese influence has made for better or worse standards. There are now over a billion 4G subscribers at the big 3 Chinese telcos, by far the largest equipment buyers. Nokia, Ericsson, and the other vendors do not dare oppose their largest customers. more

Domain Name Resale Market a Haven for Phishers?

In a recent article at TechWeb, the following observations were made: "Internet addresses that appeal to identity thieves eager to rip off consumers are being posted by major domain resellers... Finnish-based F-Secure has identified more than 30 registered domain names for resale that would be of interest only to the legitimate holder of the trademark or to phishers..." more

Is LTE Going to Impact Free WiFi?

Developments in LTE are also going to have a significant impact on the unlicensed spectrum, which is currently used by billions of people through their WiFi modems and WiFi services in cities, cafes, airports and other venues. Known as LTE Unlicensed (LTE-U) or Licensed-Assisted Access (LAA), this technology can also ride on top of WiFi networks (without utilising the mobile service), providing high-speed broadband access to users. more

Mac Hit by Another Wave of Malware… Users in Denial?

In case you haven't been watching cyber news recently, last week various security researchers published that Macs were infected by the Flashback Trojan and that the total number of infections worldwide was 600,000. This number was published by a couple of blogs. I debated writing about this topic since we had a previous Mac outbreak last year that initially spiked up, caused Apple to go into denial about the affair before issuing a fix, and then the malware kind of went away. Will this follow the same pattern? more

Topics

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Threat Intelligence

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days