The essay describes six groups of gTLD performance indicators: (1) the presence of a secondary market; (2) uses of second-level domain names; (3) the identity of the owners of parked and not-in-use domain names; (4) domain name renewals; (5) the market size of the supporting complementary assets; and (6) the character of the person in charge of a given registry. A time-trend of these indicators would convey any price inefficiencies and bubbles, and the health of the industry. more
I've posted to SSRN my paper on why most telecom companies, even though they operate networks, don't appreciate the fundamental business dynamics of network structures. This will be a chapter in a book Wharton is publishing on network-based strategies and competencies. In the paper, I describe two views on telecom and Internet infrastructure... more
Just as the number of domain names and domain name disputes have expanded significantly in recent years, so, too, has WIPO's "Overview," which has been updated to address the growing complexity of cases under the Uniform Domain Name Dispute Resolution Policy (UDRP). WIPO has just published the third edition of its "WIPO Overview of WIPO Panel Views on Selected UDRP Questions" -- commonly referred to as "WIPO Jurisprudential Overview 3.0." more
The 2004 new sTLD round brought about a new type of TLD in the form of .asia and .cat. As we always struggle for words to capture their nature, I call them "geoTLDs". Culture, language and ethnicity are also part of geography. Contrary to ccTLDs, geoTLDs do not have a territorial meaning. They are a wonderful addition to the Internet as they provide a way to demonstrate one's commitment to a community that is not defined by borders, yet linked to where the individual chooses to be. ...Will they be? They will, unless we do the wrong thing now. more
A call to action went out: a small, California-based organization called People for Internet Responsibility (PFIR) posted an announcement for an urgent conference - "Preventing the Internet Meltdown." The meltdown that PFIR envisioned was not an impending technical malfunction or enemy attack. Instead, conference organizers foresaw "risks of imminent disruption" to the Internet that would come from an unlikely sector: government officials and bureaucrats working on the unglamorous-sounding problems of Internet Governance. more
Measuring and managing subscriber bandwidth can be an easy and cost-efficient way to improve subscriber quality of experience (QoE). In a HFC cable network, bandwidth is shared among users in the same fiber-node. Even though improvements in DOCSIS technology has allowed a substantial increase of bandwidth availability per fiber-node, a few heavy users - as well as new 4K video content - can quickly kill recently-made network investments and leave subscribers with an impression that they are not receiving the quality they deserve. more
The Internet Infrastructure Coalition (i2Coalition) and The Domain Name Association (DNA) have announced their intent to merge, forming the largest Internet infrastructure advocacy group in North America. more
If the rise of phishing has taught us anything, it's that on the Internet, if a digital asset has value, there's somebody out there who wants to steal it. Whether it's a bank account password, a credit card number, a PayPal login, or even a magic sword in an online game, there's a fraudster somewhere trying to misappropriate it for his or her own nefarious purposes. Domain names have always been a target for such criminals. more
Facebooks says it intends to allow third parties - including local and regional providers - to purchase excess capacity on its fiber. more
One of the most debated questions at the time of the opening of the .eu Top-Level Domain (TLD) was whether or not it was possible to register names on the basis of prior rights on signs which include special characters, such as an ampersand. The Advocate General of the Court of Justice of European Union has just published his opinion (4 years later...) more
Developments in the Caribbean digital space are fuelling initiatives to strengthen the Internet infrastructure in the region. In Guadeloupe, a recent agreement among three Internet service providers has cleared the way for the island to establish its first Internet exchange point. Commonly called an IX or an IXP, an Internet exchange point is a critical element of Internet infrastructure used to interconnect networks and deliver data traffic between them. more
The chart in this post shows the amount of inbound mail that we see, both spam and non-spam, over the past three and a half years. You can see in the above that the amount of good mail that we see has continued to increase over time. This is because of an increased customer base, not because the total amount of good mail worldwide has gone up... However, the amount of spam has plummeted from 23,000 in mid 2010 to 5000 now, a drop of over 75%. The contrast couldn't be starker -- spammers are not spamming as much anymore. It almost looks like the battle against spam is almost over. What's still left to do? more
The information in WHOIS database is very important to Law Enforcement Agencies, Intellectual Property Owners, and all Internet Users in general, who use this data to locate/contact domain name owners for various purposes including but not limited to enforcing laws or addressing grievances related to cybercrime and other cases of DNS abuse like Spam, Phishing, Malware etc. However, Privacy and Proxy Services are also available for many Top Level Domain Registries... more
In a recent press release, Los Angeles law firm Kabateck Brown Kellner says it's filed a class action suit against Network Solutions and ICANN for front running. (If you tuned in late, NetSol admits that if you query a domain name on their web site, they will speculatively register it so that it's only available through NetSol for five days, at their above market price.) This is a very peculiar suit... For one thing, it's hard to see how the total class damages would be large enough to be worth a suit... more
In this multipart series I will be presenting some of the leading industry-standard best practices for enterprise network security using Cisco technologies. Each article in the series will cover a different aspect of security technologies and designs and how each can be deployed in the enterprise to provide the best security posture at the lowest possible budgetary and administrative cost. In Part 2 of this series I discussed security risks and vulnerability. In this article we begin to focus on the role Cisco network and security technologies play in ensuring the safety and security of network data. more