Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Downloading is Not Enough… Probably

Peer to peer download services are still popular with music-loving kids, it seems. The second annual survey of young people's music consumption by pressure group UK Music found that three-fifths of the 1,808 18-24 year olds who took part said they used p2p services, and four-fifths of those did so at least once a week. This is almost the same as last year's result, and would seem to indicate that the efforts by the music industry to offer a range of licensed alternatives to Limewire and other p2p services have failed to have any real impact. more

Australian Football League Kicks Off Sporting Code .Brands

I can't lie -- I absolutely LOVE Aussie football and have kicked a ball around since I was three years old. In fact, I always will. My ongoing love for the game is as certain as death, taxes and the fact that my beloved Melbourne Demons club will give me both incredible highs and heartbreaking lows each and every year. For most Aussies, a sporting life is very much the way of life... Today is one of those wonderful times when you get to blend your professional and personal passions. more

Mobile Consolidation - A Threat to Competition

The global financial crisis and the very rapid growth in mobile broadband, thanks to smartphones, have combined to create havoc in the mobile market. On the one hand, we see that customers, especially those in countries seriously affected by the GFC, such as Southern Europe and Ireland, have reduced their mobile use, with the result that there has been a significant drop in Average Revenue per User (ARPU). On the other hand, phenomenal growth has taken place in mobile broadband, but without a significant increase in ARPU... more

The NameSentry Report: Benchmarking Abuse Levels in the Domain Name Industry

On July 10th Architelos released the first NameSentry Report, benchmarking abuse levels in the domain name industry. For some time now, a debate has raged about the potential impact of new gTLDs on Internet safety and security, namely abusive registrations such as phishing, spam, malware, and so on. However, without benchmarking the current state, how can we realistically evaluate if new gTLDs have made any measureable difference in the level of abuse? more

Inter-Process Communication - Building Block for the New Internet

The blog on the need for a new internet received quite a bit of (international) attention, and with the assistance of colleague John Day, we would like to elaborate a bit further on this. I mentioned RINA as a good example that can be used to have a look at how such a new internet should look like. Interestingly the basics are not all that new. Already in the 1970s, but certainly two decades later, there were plenty of telecoms and computer engineers who started to understand that the future telecommunications work would have more to do with computing than with telecoms. more

M3AAWG & i2Coalition Collaborate on Best Practices on Anti-Abuse in Hosting & Cloud Environments

I am excited to announce the recent release of the industry first Best Common Practices document for Cloud and Hosting providers for addressing abuse issues that was created by M3AAWG and the i2Coalition. M3AAWG has been collaborating with the Best Practices Working Group of the i2Coalition over the past 2 years to discuss ways to solve malicious activity within hosting and cloud ecosystems.  more

A Year Later: Insights from dotSucks

This week marks the first birthday of the general availability of dotSucks domain names. It has been a year notable for both heat and light, adding up to a set of insights relevant for any new gTLD... Be clear about who you serve and use their vocabulary (not domain name industry jargon) to tell them about it. Engage in marketing... Emotional resonance is more effective than even overwhelming facts-and-figures. The right story helps people see themselves in you. more

Getting On Board With DNSSEC - A Personal Recount

I first became familiar with DNSSEC around 2002 when it was a feature of the Bind9 server, which I was using to setup a new authoritative DNS platform for customers of the ISP I was working for. I looked at it briefly, decided it was too complex and not worth investigating. A couple of years later a domain of a customer got poisoned in another ISPs network. And while the DNS service we provided was working properly, the customers impression was we hadn't protected them. more

Email and Law in the News

A couple things related to the intersection of email and law happened recently. The 6th circuit court ruled that the government must have a search warrant before accessing email. The published opinion is interesting reading, not just because of the courts ruling on the law but also because of the defendant. more

Super Bowl 50 Ads Reimagined Through a New Top-Level Domain Filter

Marketers and advertisers across the world pay close attention to Super Bowl ads, for good reason. At a cost of up to $5 million for a 30-second spot, Super Bowl ads represent the world's biggest stage for high-reach, large-impact marketing. The best practices seen on Sunday will set the standard across the industry and influence marketing behavior around the world. The call to action used in any Super Bowl spot can make or break the investment. more

Notes from NANOG 89: Trust and Network Infrastructure

Trust is such a difficult concept in any context, and certainly, computer networks are no exception. How can you be assured that your network infrastructure is running on authentic platforms, both hardware and software and its operation has not been compromised in any way? more

IPv6 a Case of Confirmation Bias

Is the glass half full or half empty? The human reflex of selective deafness to information or arguments countering one’s established believes lives on. The ISOC organized lunchtime IPv6 panel at IETF 74 in San Francisco illustrates the point... more

Financial Times on Telecoms Separation

I've written that a Network Neutrality law needs a Network Management Exception, and I've laid out how this exception is likely to become a giant vacuum-cleaner-fish loophole. The way out is the separation of infrastructure from service, so infrastructure operators can have no financial interests in the services they carry, hence no motive to discriminate in anti-competitive ways. Now today's Financial Times has an editorial on the EC telecom regulator, Viviane Reding's proposal to beef up national telecom regulatory authority within European countries and create a Europe-wide so-called super-regulator. more

WHOIS Policy at ICANN Continues to Fail

ICANN has once again acceded to the wants of contracted parties and is at risk of abdicating its duty to act in the global public interest when it comes to WHOIS policy. Its inability or unwillingness to date to reign in bad WHOIS policy, driven by contracted party interests, flies in the face of its previously-expressed policy goal “to ensure the continued availability of WHOIS to the greatest extent possible while maintaining the security and stability of the Internet’s system of unique identifiers.” more

A Tipping Point for the Internet: 10 Predictions for 2018

The year 2018 represents a tipping point for the Internet and its governance. Internet governance risks being consumed by inertia. Policy decisions are needed if we want to prevent the Internet from fragmenting into numerous national and commercial Internet(s). Geopolitical shifts, in particular, will affect how the Internet is governed. The Internet is made vulnerable by the fragmentation of global society, which is likely to accelerate in response to the ongoing crisis of multilateralism. more

Topics

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days