/ Most Viewed

Demystifying Statistical Approach to Domain Name Appraisals

Professional domain name appraisals have acquired a dubious reputation, and I understand the rational skepticism regarding their usefulness. In my recent paper, "Statistical Domain Name Appraisal: Same as What You're Doing, +/-," I try to demystify the statistical approach by pointing out its commonality with methods intuitively adopted by active domainers. It will also underscore some of the sources of skepticism toward various appraisal methodologies, and point out the advantages and limitations of statistical models. The paper concludes with a list of the conditions that can make a professional appraisal value adding, and with a plea for transparency. more

New York Times Sues FCC for Net Neutrality Records Concerning Possible Russian Involvement

The New York Times Co. filed a lawsuit today against the Federal Communications Commission concerning records the newspaper alleges may shed light on possible Russian participation in a public comment period before the commission rolled back Obama-era net neutrality rules. more

Tech Continuity in President Trump’s First 100 Days

Tech developments saw less drama than trade and environmental shifts during Trump's first 100 days. Continuity, not abrupt change, defined his approach to AI and digital regulation. Only 9 of 139 executive orders (EOs) focused on tech. Trump's tech policy emphasised reviews and incremental shifts. Public consultations on AI, cybersecurity, and cryptocurrencies signal steady evolution over upheaval. more

Mauritius Steps In: Unraveling the AFRINIC Crisis and Its Impact on African Internet Governance

A Supreme Court judge in Mauritius has been appointed to investigate AFRINIC, Africa's IP address registry, following allegations of misconduct, legal irregularities, and criminal falsification. The inquiry marks a pivotal moment in African internet governance, with implications for regional digital infrastructure and the continent's credibility in managing critical online resources. more

The TPP and the DNS

On November 5, 2015 the Office of the U.S. Trade Representative (USTR) released the official text of the Trans-Pacific Partnership (TPP). That text consists of 30 separate Chapters totaling more than 2,000 pages, and is accompanied by four additional Annexes and dozens of Related Instruments. Only those who negotiated it are likely to have a detailed understanding of all its provisions, and even that probably overstates reality. more

How Can ICANN Improve Institutional Confidence?

This week ICANN held a public consultation in Washington, D.C., where ICANN's President's Strategy Committee (PSC) solicited remarks from a packed audience of intellectual property (IP) lawyers, domain name registrars and other Internet stakeholders on how the organization can improve institutional confidence. No surprise, ICANN's decision to add new generic top-level domains (gTLDs) to the Internet was on many participants' minds. more

Will .cn Become the New .com?

I recently came across a chart of the most popular top-level domains (TLDs), compiled by Stephane Van Gelder. Although I keep track of country code TLD registrations for the Country Codes of the World map (see also related CircleID post), Stephane tracks all domains, including .com, .net., etc. And when I saw it I got to thinking... more

U.S. Cable TV Industry’s Rapid Decline Continues: Over 6.9 Million Customers Cut the Cord in 2023

at the end of 2023. LRG compiles most of these numbers from the statistics provided to stockholders, except for Cox and Mediacom - they now combine an estimate for both companies. Leichtman says this group of companies represents 96% of all traditional U.S. cable customers. I suspect there are regular blog readers who wonder why I post these statistics every quarter. more

Other Countries Beginning to Adopt China’s Unique Approach to an Isolated Internet Structure

While in most developed nations, foreign telecoms are interconnected with local and other international Internet exchanges, in China, there are no foreign carriers detected within china's borders. more

Email in the World’s Languages - Part II

In our last installment we discussed MIME, Unicode and UTF-8, and IDNA, three things that have brought the Internet and e-mail out of the ASCII and English only era and closer to fully handling all languages. Today we'll look at the surprisingly difficult problems involved in fixing the last bit, internationalized e-mail addresses. more

DDoS Attacks: What’s in Store for 2012?

According to Kaspersky Lab, 2011 has seen "numerous DDoS attacks with a variety of motives," many of which will "go down in the annals of cybercrime." As we look ahead to 2012, it's worth examining some of those motives to see what they portend. more

New Anti-phishing Initiative Introduced by Yahoo!

Neil Schwartzman writes to report: "The company announced the Yahoo! Mail Anti-Phishing Platform (YMAP) yesterday. The technology is predicated upon the use of both DKIM and Sender Policy Framework (SPF) to identify authentic messages. As part of the initiative, Yahoo! has partnered with email authenticators Authentication Metrics, eCert, Return Path, and Truedomain to provide broad-band coverage of well-known brands." more

I Am Not an IP Address, I Am a Free Man… and a Potential Customer

When I heard that full episodes of The Prisoner TV series were available online I immediately headed over to the AMC website to wallow in nostalgic enjoyment and remind myself just how cool Patrick McGoohan was as he stumbled around Portmeirion trying to avoid a big plastic ball... I would happily have watched online and let AMC advertise to me in return, but sadly it was not to be. When I got to The Prisoner page on its site I saw only an unfriendly message, shouting at me... more

Open Ends: Civil Society and Internet Governance - Part III

This is the final part of a three-part series interview by Geert Lovink with Jeanette Hofmann, policy expert from Germany, where she talks about her experiences as a member of the ICANN's Nominating Committee and her current involvement as a civil society member of the German delegation for the World Summit of the Information Society (WSIS). "You have been visiting WSIS as a member of the German delegation. Could you share some of your personal impressions with us? Did you primarily look at WSIS as an ICT circus for governmental officials and development experts or was there something, no matter how futile, at stake there?..." more

Notorious Hacker Group XENOTIME Expands Its Targeting Beyond Oil and Gas to Electric Utility Sector

XENOTIME, the notorious group behind what is regarded as the most dangerous malware targetting industrial control systems has expanded its targeting beyond oil and gas to the electric utility sector. more