Featured Blogs

Latest

More Available Wireless Spectrum and Higher Market Entry Barriers

The tremendous demand for, and profitability of mobile telephony supports legislative and regulatory efforts to refarm spectrum with an eye toward reallocating as much as possible for wireless telephony and data services. But there is a downside that no one seems to acknowledge. In light of past FCC practice and the behavior of incumbent wireless carriers I expect two anticompetitive outcomes to occur with the onset of any more spectrum. more

The Internet is Interconnection

There's a scene in the Steven Soderbergh movie, Traffic, where the widow of a drug dealer brings a doll to the Columbian drug kingpin. "The doll is stuffed with cocaine. Big deal, we've been doing that for years," he says dismissively. "No," she answers, "the doll is cocaine." The whole toy is a heat-treated, compression-molded block of cocaine, undetectable to sniffing dogs. The drug lord becomes very interested. The Internet is like that doll... more

Creditor Can Execute Against Domain Name Where Registry is Located: Office Depot v. Zuccarini

The Ninth Circuit affirmed the district court's ruling in Office Depot v. Zuccarini, agreeing that a creditor may levy against a domain name in the jurisdiction where the domain name registry is located. The decision is significant for two reasons. First, it affirms (or reaffirms) that domain names are property subject to the claims of creditors... more

Web Application Delivery: The Challenge of Managing Thousands of Web Applications in the Cloud

Cloud Computing is a hot topic. Some say it is already here, most agree that it will be much bigger in the coming years. It is pushed forward by the economic benefits of virtualization and consolidation. Take a heterogeneous data center, full of many kinds of servers, running a myriad of applications and consolidate it into a uniform farm of virtual machines, where each application is services by one or more VMs and you have a cloud, what is called a private cloud. more

IPv6 and the 5 Billionth Customer

The POPClock tells us that there are 6,807,230,170 of us on this planet when I looked it up at 22:26 UTC (EST+5) Feb 26, 2010. In the meantime we are about to connect the 5 billionth cell phone user this year according to ITU Secretary-General Dr. Hamadoun Toure.
 more

Taking Permission

Permission is always a hot topic in email marketing. Permission is key! the experts tell us. Get permission to send email! the ISPs tell us. Marketers have responded by setting up processes to "get" permission from recipients before adding them to mailing lists. They point to their privacy polices and signup forms and say "Look! the recipient gave us permission." In many cases, though, the permission isn't given to the sender, permission is taken from the recipient. more

Nominet Passes Governance Test With Flying Colours

The dot-uk registry Nominet has passed a crucial governance test with flying colours, voting yes on eight Board resolutions with more than 93 percent member support... The vote was a crucial test for both Nominet's Board and members: trust and confidence in the Board had been damaged by an acrimonious internal battle, which had subsequently led to the UK government threatening to end self-regulation of the UK's registry operations. more

Closing in on the Google Hackers

Joseph Menn has an article on CNN.com wherein the crux of the story is that US experts are closing in on the hackers that broke into Google last month. It is believed by some that the Chinese government sponsored these hackers. China, naturally, denied involvement. My own take is that tools today are sophisticated enough such that you don't necessarily need state sponsorship in order to launch a cyber attack. more

Switching on the Light: Expression of Interest for New TLDs

They say late converts are the most passionate believers. Until now I haven't supported the Expression of Interest (EOI) for new TLDs, the proposed mechanism to measure the number and type of likely applications. Not because it won't work (I think it'll work fine) but because I didn't think it was necessary. I've changed my mind. Here's why. more

Expression of Interest for New TLDs: Time to Shine!

Like many of those present at the ICANN Seoul meeting last October, and indeed along with those around the globe who were eagerly awaiting new TLDs, I too was angered and frustrated at ICANN's deadlines that were slipping like a cartoon character running on an oil slick, caused by an incessant search by certain industry factions for perfection in an imperfect science. (We do work with the internet remember?). more

OpenDNS Adopts Proposed DNS Security Solution: DNSCurve

For more than 15 years, the IETF has been working on DNSSEC, a set of extensions to apply digital signatures to DNS. Millions of dollars in government grants and several reboots from scratch later, DNSSEC is just starting to see real world testing. And that testing is minimal -- only about 400 of the more than 85,000,000 .com domains support DNSSEC, fewer than 20% of US government agencies met their mandated December 31, 2009 deadline for DNSSEC deployment, and only two of the thirteen root zone name servers is testing with even dummy DNSSEC data. more

Will Stonewalling on .xxx Be Beckstrom’s First Big Mistake?

The .xxx controversy is a legacy of the Bush era. In the dark period of WSIS and the Iraq invasion, ICANN's independence was fatally undermined when a political appointee of the Bush administration, in response to an email campaign from rightwing groups in the Bush "base", issued a direct threat to Paul Twomey that if ICANN approved the .xxx Top-Level Domain (TLD) it would not put it in the root. more

Email Portability Approved by Knesset Committee

The email portability bill has just been approved by the Knesset's committee for legislation, sending it on its way for the full legislation process of the Israeli parliament. While many users own a free email account, many in Israel still make use of their ISP's email service. According to this proposed bill, when a client transfers to a different ISP the email address will optionally be his to take along, "just like" mobile providers do today with phone numbers. more

Chuck Norris Botnet and Broadband Routers

Last week Czech researchers released information on a new worm which exploits CPE devices (broadband routers) by means such as default passwords, constructing a large DDoS botnet. Today this story hit international news... The spread of insecure broadband modems (DSL and Cable) is extremely wide-spread, with numerous ISPs, large and small, whose entire (read significant portions of) broadband population is vulnerable. more

XXX Saga Continues

Sex and the internet. Put the two together and you are bound to find an interesting story. While the saga surrounding sex.com took a new twist in the last couple of days, with the current owners going dotbomb, the .xxx story also took an interesting turn... For several years ICM and ICANN tangoed. more

Topics

IPv4 Markets

Sponsored byIPv4.Global

Threat Intelligence

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days