/ Most Viewed

Everything You Should Know About a TLD Business Case, But Didn’t Know to Ask

Applying for a new Top-Level Domain (TLD) is an expensive and lengthy process, costing an estimated $500K for application and various legal and professional services. Central to the application is the business case. Even though ICANN requires an albeit simple version, most applicants must have a credible business case, especially if they need to secure internal approval, or more importantly attract and secure outside investment. Given the truth to the maxim "if you fail to plan, you plan to fail," some closer scrutiny of your business plan will pay dividends in the long-term... more

Richard Clarke: Defend Against Cyberwar by Re-Architecting Networks, Not Buying More Technology

In his keynote yesterday at the RSA Security Conference, former U.S. top chief counter-terrorism adviser, Richard A. Clarke, said cyberwar defence efforts need to focus on re-architecting networks not buying more technology. more

ICANN’s New gTLD Process: Hype and Reality

At its 32d International Junket Meeting last week, ICANN's Board approved the GNSO Council's recommendations for the eventual addition to the root of new generic top-level domains (gTLDs). This means that eventually, when the staff drafts, community comments upon, and Board approves implementation processes, those with deep pockets will have the opportunity to bid for new TLD strings... more

California Senate Passes Bill to Restore Net Neutrality Regulations

The California Senate has voted to approve a bill to restore net neutrality regulations repealed by the Federal Communications Commission in December. more

New TLDs Are Coming, and They Are Coming Fast

Despite what you may have read about possible delays to the rollout of the new Top-Level Domain (TLD) program, all the available evidence points to ICANN approving the applicant guidebook shortly after its San Francisco conference in March. My feelings about the timing of the new TLD program were further buoyed by Kurt Pritz, ICANN's Senior Vice President of Stakeholder Relations, who gave a presentation at the .nxt conference I attended in San Francisco this week. Mr Pritz said the applicant guidebook is currently in a "proposed final" version and should be approved after ICANN's San Francisco conference in March. more

NSA Admits Purchasing Americans’ Internet Browsing Data Without Warrants

The U.S. National Security Agency (NSA) has confirmed acquiring Americans' internet browsing information without warrants through commercial brokers, according to a letter from NSA Director Paul Nakasone to Senator Ron Wyden. more

60 Minutes Investigates Cybersecurity and the Reality of Sabotaging Critical Infrastructure

CBS's 60 Minutes aired a special report last night investigating how hackers can get into the computer systems that run crucial elements of the world's infrastructure, such as the power grids, water works or even a nation's military arsenal. From the report: "At the Sandia National Laboratories, Department of Energy security specialists like John Mulder try to hack into computer systems of power and water companies, and other sensitive targets in order to figure out the best way to sabotage them. It's all done with the companies' permission in order to identify vulnerabilities. In one test, they simulated how they could have destroyed an oil refinery by sending out code that caused a crucial component to overheat." more

ICA Anti-Phishing Victory Might Be a Curse!

A triumph by the Internet Commerce Association (ICA) over tactics and legislation detrimental to domain name owners might end up being a case of winner's curse, a triumph bought at the expense of the industry. In picking this one battle to win, the association ignores a broader war, the range of issues our industry needs to address. more

The Framing of “IP Transition” Fails to Come to Terms With Real Impact of the Internet

I keep seeing so many articles about the Internet and related policy issues that it's hard to know how to respond. The term "IP Transition" may be a good starting point since the term is an attempt to treat the Internet as a smooth transition rather accepting the idea that we are in the midst of a disruptive change. It seems that the FCC's approach is to simply substitute IP for old protocols and to preserve policies tied to the accidental properties of a copper infrastructure. This shows a failure to come to terms with the new reality. more

An Attack on WiFi Spectrum

A little over a year ago, the FCC approved the use of 1,200 MHz of spectrum in the 6 GHz band for public use -- for new WiFi. WiFi is already the most successful deployment of spectrum ever. A year ago, Cisco predicted that by 2022 that WiFi will be carrying more than 50% of global IP traffic. These are amazing statistics when you consider that WiFi has been limited to using 70 MHz of spectrum in the 2.4 GHz spectrum band and 500 MHz in the 5 GHz spectrum band. more

How Not to Develop Public Policy

Some of ICANN's current proceedings on the introduction of new generic top level domains (gTLDs) provide a case study on how not to develop public policy. In particular, the Rights Protection Mechanism proceedings, with serious implications for trademark owners, have followed a course that does not correspond to the ideal of ICANN's bottom-up, consensus-based processes for policy development. More importantly, these proceedings are effectively unilateral developments in international law without the benefit of treaties or international conventions. more

2017: The Year of dotBrand

With over 600 "dot Brands" applied for in 2012, and hundreds now launched, 2017 seems poised to be the Year of dotBrand! "dotBrands" are top level domains (TLDs) that use the brand name to the right of the dot, as in www.mabanque.bnpparibas or www.home.cern. Many large companies across nearly every industry applied, including Google, Amazon, Citibank, VISA, McDonalds, Sony, HBO, Alibaba, and Hermes. more

Email in the World’s Languages - Part III

In our last instalments we discussed the various ways to encode non-ASCII character sets, of which UTF-8 is the winner, and some complex approaches that tried to make UTF-8 mail backward compatible with ASCII mail. After years of experiments, the perhaps surprising consensus is that if you're going to do international mail, you just do it. more

The Chinese Domain Name Bubble Bursts

Nearly one year ago, I asked Will .CN become the next .COM? And perhaps I was right in more ways than one. Because now it appears that .CN is experiencing its very own .COM bust. Just a year ago Chinese domain registrations were booming, so quickly in fact that .CN had surpassed .DE to become the most-registered ccTLD. more

Some Considerations for New TLD Operators from a Registrar Perspective

The "hot topic" at the upcoming ICANN meeting in Singapore will, of course, be whether or not the new Top-Level Domains (TLDs) will actually launch or not. Sure, they'll launch at some point, but ICANN has been pushing to make the big announcement at Singapore. There has been a lot written over the last couple of years about new TLDs over the last couple of years. We are now coming into what might be called the "end game". more