/ Most Viewed

‘Notorious Hosting Providers’: An Overview of the Highest-Threat Hosts From IP-address Blacklist Analysis

One major element of many brand-protection programmes is the use of an algorithm to sort the findings identified through monitoring, according to their relevance or level of potential threat. This prioritisation process offers a number of benefits, including the identification of priority targets for further analysis, content tracking, or enforcement. more

Twitter and Web Globalization

ICANN recently launched its own Twitter feed. And since ICANN is a global organization, it launched more than one language feed -- one in English and one in Spanish... This is not the most scalable solution. And I'm not trying to pick on Twitter; the issue effects any multinational company or organization. For instance, let's say ICANN launches a Portuguese feed for Brazil. The address would have to read twitter.com/icann_pt_br. Similar challenges arise with French... more

The Sportsmanship of Cyber-warfare

As a bit of a history buff I can't avoid a slight tingling of déjà vu every time I read some new story commenting upon the ethics, morality and legality of cyber-warfare/cyber-espionage/cyberwar/cyber-attack/cyber-whatever. All this rhetoric about Stuxnet, Flame, and other nation-state cyber-attack tools, combined with the parade of newly acknowledged cyber-warfare capabilities and units within the armed services of countries around the globe, brings to the fore so many parallels... Call me a cynic if you will, but when the parallels in history are so evident, we'd be crazy to ignore them. more

Keeping Cyberspace a Public Space

I recently had an opportunity to re-read a pamphlet I wrote in 2000 for a series on new thinking about mutualism published by the Co-operative Party. In 'e-Mutualism, or the tragedy of the dot.commons' I talked at length about the co-operative basis of the Internet, the need for online public spaces which are not controlled or dominated by commercial interests, and the opportunities that the network offers for mutual organisations of all sizes, from small co-operatives to retailers like John Lewis... Re-reading it now I wasn't too embarrassed by my ten-year old analysis. more

Expansion of Top-Level Domain Names: Why Current Brand Protection Procedures Will Be Impractical

As ICANN introduces new generic top level domains (gTLDs) and separates itself from US oversight, it has the opportunity to distance itself from the taint of cybersquatting, brand abuse, and criminal activity involving domains... To underscore the scope of the issue, consider this research on just 30 top Interbrand-ranked global brands. The most recent MarkMonitor Brandjacking Index found cybersquatting incidents increased over 40% in the last year for the brands that were studied; these leading brands suffered as many as 15,000 incidents per brand... more

Antony Van Couvering Interviews Alexa Raad, CEO of Architelos (Video)

Antony Van Couvering, CEO of Minds + Machines, continues his series of in-depth talks with leading figures from the domain name industry with this video interview of Alexa Raad, CEO of Architelos, filmed recently at ICANN 49 in Singapore. Alexa and Antony discuss how brands are dealing with new gTLD, registry strategies for success and how to market a new gTLD. more

China Sends a Wake-Up Call to All Multinationals - Are You Awake?

If you visit Marriott's China website today, you're likely to see this (see screenshot). I dumped the text within this page into Google Translate and included below is what it loosely said. So what exactly happened here? Marriott sent a survey in Mandarin to its Chinese loyalty members that referred to Tibet, Macau, and Taiwan as "countries." As readers of this site might know quite well by now, in the eyes of Chinese authorities, this is no trivial oversight. more

The IPv4 Price Inversion

A curious price inversion has occurred in IPv4 markets. The long-term trend that discounted large blocks has reversed. The graph identifies /15 and /16 (large) block pricing per IP address throughout the period in the form of dark spots. It is evident that, for most of the timeframe here (2014 to the first half of 2021), large blocks sold at a significant discount. One might guess that the administrative chores related to large-network needs were most efficiently and cheaply satisfied with large blocks. more

A Dangerous Buzz, and Opt-In Isn’t Just for Email

Google is great at generating buzz, and they've done it again with their new social vitality tool, appropriately named Google Buzz. Buzz takes all of your Gmail contacts (and presumably other connections from elsewhere within the Googleplex), and makes them all your "friends" by default; it then shares your activity from Google Reader, YouTube, and other tools with all of them, and vice versa... more

A Link to Eternity

While Google is as secretive about its internal processes and systems as Apple is about product development, every now and then senior people post articles on the official Google blog and offer their thoughts on the development of the web. In the latest posting, two Google engineers, Alfred Spector and Franz Och, look at how search strategies will benefit from the faster computers, greater volumes of data and better algorithms we are likely to see in the next decade, speculating that "we could train our systems to discern not only the characters or place names in a YouTube video or a book, for example, but also to recognise the plot or the symbolism." more

Ladies and Gentlemen, China’s Netizen Day…

Just after the government announces a crackdown on Internet smut. Yesterday, they announced plans for "Netizen Day" on September 14th, which apparently marks 15 years since the first e-mail message was sent from China in 1987. The new celebratory day (I don't think it's an official holiday) was unveiled at an official ceremony presided over by Chinese government officials and Internet execs, many of whose companies - including Google, Sina, and Sohu, who were named in the smut crackdown just 24 hours before. more

Some Unsolicited Advice for AT&T re Google Voice

The FCC has posed a number of provocative questions to AT&T regarding the fact that iPhone subscribers cannot download and use the Google Voice application. AT&T should stifle every motivation to play cute or clever with the FCC. Apple adopted such a strategy when it suggested to the Library of Congress and others that it would be curtains for the free world if iPhone owners could hack, jailbreak, tether, and otherwise use their handsets without fear of violating the prohibition on circumventing copyright laws contained in the Digital Millennium Copyright Act. more

HD Voice Really is Great

Listen for half a minute to a demo of a high-bit-rate codec and you expect they will transform our industry. The difference is like a CD with great headphones versus a little transistor radio. Suddenly, you realize just how awful the sound is on your regular telephone. Who wouldn't want their call to sound dramatically better was my first reaction. When Thomson and some of the cable folks discussed plans, I was enthusiastic. Years later, nearly no one is taking advantage... more

Can SpaceX Launch Version 2 Starlink Satellites This Year?

The answer to the question in the title depends on the availability of SpaceX's new Starship spacecraft and Super Heavy booster rocket, collectively referred to as Starship. Elon Musk says he is highly confident about getting Starship to orbit this year. He also says, "At SpaceX, we specialize in converting things from impossible to late." Starship is critical to Starlink because the version 2 satellites are seven meters long and weigh about 1.25 tons... more

Extreme Vulnerability at the Edge of the Internet - A Fresh New Universal Human-Rights Problem

By design, the Internet core is stupid, and the edge is smart. This design decision has enabled the Internet's wildcat growth, since without complexity the core can grow at the speed of demand. On the downside, the decision to put all smartness at the edge means we're at the mercy of scale when it comes to the quality of the Internet's aggregate traffic load. Not all device and software builders have the skills - and the quality assurance budgets - that something the size of the Internet deserves. more