/ Featured Blogs

2nd Round gTLDs: the Good, the Bad, and the Ugly

This post outlines the advantages (good) and threats (bad) that can make or break a gTLD, and the eternal fact that some applications will doom themselves to failure (ugly). The Good... Waiting until the second round to apply for a gTLD may end up being a virtue for the following reasons... more

Is it Time for a Registration Operations Industry Association? (Part 1)

Since 2001 there have been occasional conversations on technical mailing lists exploring the concept of creating an independent industry association or consortium of domain registration operators. My recent experiences with the evolution of extensions to the Extensible Provisioning Protocol (EPP) have convinced me to look at these suggestions more closely, and I'm now convinced that this is an idea worth exploring. "Registration Operations" refers to the technical tasks, such as the development, deployment, and ongoing systems administration of EPP, performed by registries and registrars to provide registration services. more

The Coding of Online Brand Protection

Moore's law postulates that the number of transistors in an integrated circuit will double every two years. That law has given us smartphones and other devices with astonishingly diverse capabilities at ever lower costs. However, while it does not encompass online brand infringement, many trademark managers feel that their task is likewise expanding at exponential speed and imposing escalating costs. Potential cybersquatting based in the more than one thousand new generic top level domains is only one new source of anxiety. While the jury is still out on the level of harmful cybersquatting and the efficacy of the new Rights Protection Mechanisms (RPMs) for new gTLDs, that ICANN program is hardly the only challenge. more

How Do We Define ‘SIP’ for Telecom In 2014?

"What is a minimum set of specifications that a vendor must implement to be able to say that it is SIP-compliant?" A friend asked me that question and my response was: "It depends." and even more unfortunately:
"I don't know." It turns out to be a challenging question to answer... and it led me to ask: "How do we define what "SIP" is for telecommunications in 2014? How do we help vendors move their products/services to be based on SIP? As we talk about "turning off the PSTN" and "moving all telecom to IP", how can we make it easier for companies to switch to using SIP? more

ICANN Board Appoints 2015 NomCom Chair

During its September 9, 2014 meeting, the ICANN Board selected the Chair of the 2015 Nominating Committee (NomCom). The 2015 NomCom will begin its work In Los Angeles, immediately after the close of ICANN's 51st International Meeting due to be held in mid-October. ICANN's Nominating Committee is charged with identifying, recruiting and selecting nominees of the highest possible quality for key leadership positions at ICANN. more

iPhone 6 VoLTE Will Disrupt the Mobile Industry

As far back as 2011 we predicted that Apple would eventually enter the voice market. We indicated at that time that it was just a matter of time -- in the end it took another three years... While it didn't happen at Christmas that year the company is now ready and will use the VoLTE service to enter this market, which will make it possible to replace Telstra with any other mobile operator around the world... he telcos are not ready for this. While they should be seen as the leaders in the voice call market they are too preoccupied with protecting their traditional business and it is companies like Apple and Samsung who are now leading the charge. more

Credit Card Breaches a Salutary Lesson for DNSSEC Adoption

Maintaining an 150 year old house requires two things, a lot of time and a lot of trips to the hardware store. Since the closest hardware store to my house is Home Depot, it is rare that a weekend passes without at least one trip to Home Depot. So now in the wake of the Home Depot data breach I am through no fault of my own in a situation where any or all of the bank cards I use regularly could be cancelled if the issuer decides they might be compromised. And this is not the first time this has happened to me this year. more

Critical Look at New gTLD Registries’ Tactics

This post outlines some faulty decisions by new gTLD registries. The purpose is to guide future expansions and, hopefully, adjust some of the decisions that current registries have adopted, including demand prediction, pricing, marketing, doing good versus not doing good, and launch date... GTLDs that have no competition do not need to race to launch. They have the luxury of waiting to better assess prices and postpone investments in capacity. more

Patents and Standards, or: How a Court Case Will Affect Our Everyday Lives

Industry standards are indispensable for today's technology driven economies. Every time we use a mobile phone to place a call, or connect a computer to the Internet at a café, we rely on standardized technology. Most standards are developed over years through the collaboration of numerous engineers from different companies -- the result is a technical document explaining how to make products that can 'interoperate' with one another. As EU Commissioner Neelie Kroes put it: 'Standards are the foundation of interoperability.' more

Watch ION Belfast / UKNOF Live Tuesday, Sept 9, for IPv6, DNSSEC, BGP Security and More

On Tuesday, September 9, 2014, you have a great opportunity to watch live a very packed agenda full of great sessions about IPv6, DNSSEC, routing/BGP security and other components of Internet infrastructure streaming out of the UKNOF / ION Belfast event in Belfast, UK. All of the sessions can be seen live. more