/ Most Viewed

Unregistered Gems Part 6: Phonemizing Strings to Find Brandable Domains

The UnregisteredGems.com series of articles explores a range of techniques to filter and search through the universe of unregistered domain names, in order to find examples which may be compelling candidates for entities looking to select a new brand name (and its associated domain). The previous instalment of the series looked at the categorisation of candidate names according to the phonetic characteristics of its constituent consonants, using a simple one-to-one mapping between each consonant and a corresponding phonetic group. more

Today’s CISOs Are Contending With Oft-Changing Disclosure Standards

When it comes to breach disclosures, today's chief information security officers (CISOs) are struggling with an especially turbulent regulatory environment. Security teams are understaffed, and systems are more extensive, making them harder to monitor and defend, while threats are becoming more sophisticated, more frequent, and more varied. It's at precisely this difficult juncture that regulations and enforcement are rapidly changing, leaving CISOs feeling like they are running up the down escalator. more

ITU, the Internet, and a Very Contentious Footnote

I was part of a small APNIC delegation that attended the ITU Plenipotentiary Conference (PP-10) with a limited Sector Member role as an observer. Our aim was to be available to ITU Member States with questions on IP addressing issues and to follow Member State discussions on the ITU's role in Internet governance issues. Four adopted resolutions at PP-10 were of particular relevance to Internet management, of which one was new: "Facilitating the transition from IPv4 to IPv6". more

The Role of Mobile Broadband in the Overall Telecoms Market

The fixed broadband network is the infrastructure needed to meet the needs, both economic and societal, of developed markets. While some people in some developed markets have abandoned their fixed telephone connection in favour of all-mobile solutions, the majority (90% plus) still have both a fixed and a mobile connection... And so wireless broadband and FttH will develop, in a complementary and harmonious way. There are several reasons for this. more

The Canoe Tipping Point

Google has successfully created a nationwide (worldwide) fine-grained, targeted ad market by using queries to its search engine. The cable industry would like to be able to use its cable and broadband subscriber data to create a nationwide, fine-grained, targeted ad market. This race has substantial implications for the future of online video -- and online activity generally. more

Mobile Broadband in Africa and the GCC Countries

The story of the growth of pre-paid mobile voice and SMS in Africa and the countries of the Gulf Cooperation Council is well known. The challenge is to move to mobile broadband, which is seen as having potentially explosive growth. Operators will need to create new value propositions, they face significant internal challenges and risk being displaced by rivals moving faster or better able to understand and meet the needs of customers... more

Unregistered Gems Part 5: Using Groupings to Find Brandable Domains

The initial instalment of my recent series of articles on domain name discovery1 considered the use of phonotactic analysis - that is, the measure of the similarity of a string to the 'corpus' of other words in a language - to identify available unregistered candidate domains which may be of interest for potential brandability. more

AFRINIC at the Crossroads: ISPA Endorses Candidates Ahead of Pivotal Board Election

After three years of turmoil, AFRINIC - the regional internet registry for Africa - has opened online voting for a new board, marking what could be a turning point for the embattled organisation. The election, running from September 10 to 12, follows a failed attempt earlier this year that was annulled amid allegations of vote manipulation and procedural irregularities. more

How Digital Asset Management May Change Due to COVID-19

One of the "fathers of the internet," Vint Cerf, in a September 2019 article he published, said: "Today, hackers routinely break into online accounts and divert users to fake or compromised websites. We constantly need to create new security measures to address them. To date, much of the internet security innovation we've seen revolves around verifying and securing the identities of people and organizations online. more

Analysis of the Global Telecoms Industry In 2016

The telecoms industry represents one of the most dynamic sectors in the world. Only 25 years ago 90% of all activities took place via telephone calls over fixed telephone lines. Now, within the broader ICT industry, telecoms is underpinning all of the new developments in relation to the digital, sharing and interconnected economies. It facilitates new social and economic developments in all sectors such as e-health, e-education, e-business, smart grids, smart cities, e-government, and so on. more

Timing Is All: Cybersquatting or Mark Owner Overreaching?

Admittedly, timing is not altogether "all" since there's a palette of factors that go into deciding unlawful registrations of domain names, and a decision as to whether a registrant is cybersquatting or a mark owner overreaching, is likely to include a number of them, but timing is nevertheless fundamental in determining the outcome. Was the mark in existence before the domain name was registered? Is complainant relying on an unregistered mark? What was complainant's reputation when the domain name was registered? What proof does complainant have that registrant had knowledge of its mark? Simply to have a mark is not conclusive of a right to the domain name. more

The Internet as a Public Utility

I recently attended a workshop on Lessons Learned from 40 Years of the Internet, and the topic of the Internet as a Public Utility in the context of national regulatory frameworks came up. For me, 40 years is just enough time to try and phrase an answer to the big policy question: Has the Internet been a success in the experiment of using market forces to act as an efficient distributor of a public good? Or has it raised more issues than it has addressed? more

Alliance for Safe Online Pharmacies to Recognize Contribution from Internet Industry

ASOP (Alliance for Safe Online Pharmacies) is often seen as taking a rather confrontational stance towards domain name registrars, registries and hosting providers. However both ASOP and others, including LegitScript, often cite the assistance they've received from internet industry players in their work. This year ASOP has decided to take this a step further... more

Equifax Announces Comprehensive Consumer Settlement for the 2017 Data Breach

Equifax has announced a comprehensive resolution for its 2017 cybersecurity incident that includes a fund of up to $425 consumer fund. more

Is It Time for a Breakthrough in Securing Cyberspace?

This year in July gen. Keith Alexander, director of the National Security Agency and head of the US Cyber Command participated at DefCon, the hackers conference in Las Vegas. In his address, gen. Alexander said, among other things, "This is the world's best cybersecurity community. In this room right here is the talent our nation needs to secure cyberspace."... As someone, who is regularly meeting the top Russian cyber folks, I already know (unofficially, of course) how the words of gen. Alexander were met in Moscow. more