/ Most Viewed

The Empire Strikes Back: “New” Verisign Hums a Familiar Tune

Losing your monopoly must be hard. True, few companies ever experience that particular breed of angst, but if Verisign's reply to even modest success in the new gTLD marketplace is any indication, it must be very hard to say goodbye. We understand why they're worried... The quality of newly registered .COM names is dropping and has been for years. And there is nothing Verisign can do about it. So welcome to the fire sale. more

Early Data Suggests New gTLDs Perform Well in Search Environment

Internet addresses registered in new gTLDs are holding their own against -- and in some cases outperforming -- comparable addresses registered in legacy domains like .COM, according to new data that provides the best window yet into the operational functionality of new gTLD addresses. A question on everyone's mind in the run up to new gTLDs was: how would new domains perform in the wild against legacy domains on the key criteria of search? more

Breaking the Mold: Reclassifying Over a Billion .XYZ Domains for Alternative Uses

Three years ago, my team and I launched .xyz with the mission of bringing competition, choice, and innovation on the internet. .xyz was probably the only domain extension that had no built-in meaning, included very few domains priced at a premium, and relied on low margins and high volume. We brought with it the message that .xyz was for every website, everywhere. And instead of targeting one vertical, we connected with the next generation of internet users... more

Sinowal Trojan May Be One of the Worst Crimeware Ever Created

A sophisticated cybercrime group that has maintained an especially devious Trojan horse for nearly three years has stolen login credentials of close to 300,000 online bank accounts and almost as many credit cards during that time, according to reports released today by RSA FraudAction Research Lab. The spyware is called Sinowal Trojan, also known as Torpig and Mebroot. RSA reports that their findings are based on data collected on this Trojan over the course of almost three years -- including information regarding its design and its infrastructure. Findings indicate that this may be one of the most pervasive and advanced pieces of crimeware ever created by fraudsters, say RSA experts. more

How the Internet Can Be Enormously Accelerated Without Fiber-Optic Cables or LEO Satellites

We got used to it: if we open a website, it's always like stop and go on a high-traffic highway or city traffic jam. At some point, we will reach the destination. The constant stalling is due to a traffic rule for the Internet called TCP (Transmission Control Protocol). The TCP/IP protocol family comes from the American defense industry. It was introduced by DARPA (Defence Advanced Research Projects Agency) in the early 1970s. At that time, no one had the Internet as the need of the masses on the screen. more

Internet Governance Outlook 2018: Preparing for Cyberwar or Promoting Cyber Détente?

In 2018, Internet Governance will be one of the top priorities in the geo-strategic battles among big powers. In today's world, every global conflict has an Internet-related component. There is no international security without cybersecurity. The world economy is a digital economy. And human rights are relevant offline as well as online. It is impossible to decouple cyberspace from the conflicts of the real world. more

ICANN Board - GAC Geneva Meeting: Open to Observers?

The ICANN Board and GAC will be having a meeting in Geneva next month to resolve outstanding issues in connection with the new gTLD implementation process. Unfortunately to date details of whether this meeting will be open or closed to observers has not yet been publicly addressed. As a strong advocate toward openness and transparency I have drafted the following text which calls for the meeting to be open to observers. more

Why Digital Sovereignty Cannot Escape Its Own Contradictions? Reflections for Moving Forward

The debate surrounding digital sovereignty has gained momentum in recent years, particularly within BRICS nations, where governments seek to assert greater control over their digital ecosystems. Proponents of digital sovereignty often frame it as a necessary countermeasure against foreign technological dominance, positioning it as either a "positive" force- fostering local innovation and self-reliance- or a "negative" one- fueling authoritarian control and economic isolation. more

Experience and Evidence Point to Strong Renewal Rates for New TLDs

In the tenth month of the revolutionary expansion of generic top-level Internet domains, global registrations in new gTLDs reached more than three million addresses, providing the clearest illustration yet of the strong international appetite for new, relevant addressing options. As we near the first full year of new gTLD availability, focus now shifts to another critical metric -- renewals -- which we expect to show similar strength based on history and data analysis. more

Domain Speculation: Attack of the TechnoPinkos

This morning I was forwarded a link to the Business2.0 article on domainer Kevin Ham about a half-dozen times and one sent the reddit comment thread on it (titled "This guy is a piece of s**t") and I had to chuckle and replied "I see Techno-Pinkos are out in full force". Some of the comments are just classicly clueless: "He's just a parasite. Someone gaming the system for their own financial ends without providing a useful service to anyone, and making it worse for many." ...Newsflash: Speculation is any time you choose one path, good or service over another in the hopes that you will do better... more

Why Colombia Is About to Make a Colossal Mistake With .CO

Ten years ago, the most effective branding exercise the internet registry market has ever seen began. And to celebrate the anniversary, its owner is going to strangle it. At the ICANN meeting in Montreal this month, the Government of Colombia booked a meeting room, prepared a Powerpoint presentation and invited representatives of the world's largest registry operators to attend. Once there, they were offered a rare and valuable opportunity: to take over running of the .co registry. more

The IETF Evolution

The Internet Engineering Task Force (IETF) is a collaborative body that has developed internetworking specifications for more than five decades, successfully shaping the global marketplace of digital network equipment and services. Beginning as a kind of distributed think tank among network researchers in 1969, it evolved to become one of the world's most influential standards bodies. more

An Analysis of Microsoft’s MARID Patent Applications

The IETF MARID working group has been slogging away all summer trying to produce a draft standard about e-mail sender verification. They started with Meng Wong's SPF and Microsoft's Caller ID for E-mail, which got stirred together into a hybrid called Sender ID. One of the issues hanging over the MARID process has been Microsoft's Intellectual Property Rights (IPR) in Caller ID and Sender ID. The IETF has a process described in RFC 3668 that requires contributors to disclose IPR claims related to their contributions. more

A Psychoanalysis of Corporate Domain Names and Branding - Part I

A corporate name of any merged entity, at best, is really an outcry from the deep bottom of a corporation, all in search of attention and in pursuit of fame and glory. Whether you read a corporate brand name in a column, see it in a phone book, hear it on a radio, TV or come across it on the web, the name is always, a real show-off with a desperate mission to seek all the attention it can get...a corporate brand name is the single most important issue of corporate communications today. Equally, a domain name, the twin of a corporate name, still as to most CEOs, it is the most misunderstood term of corporate communications. Even now, domain name issues are often left to webmasters, ISPs and, sometimes to lawyers. It has yet to earn the respect as the single most important issue of e-Commerce and also to earn the respect as a real and a true passkey for global access for the web. more

Technology Adoption in the Internet

How are new technologies adopted in the Internet? What drives adoption? What impedes adoption? These were the questions posed at a panel session at the recent EuroDiG workshop in June. In many ways, this is an uncomfortable question for the Internet, given the Internet's uncontrolled runaway success in its first two decades. The IPv4 Internet was deployed about as quickly as capital, expertise, and resources could be bought to bear on the problem... more