/ Recently Commented

Mobile Apps vs. Mobile Web

With all of the buzz around apps & app stores it would be easy to assume that mobile apps have unstoppable momentum and that the mobile web is taking a back seat. It's worth taking a step back to see how this is all going to pan out. Will mobile apps dominate completely and overwhelm the mobile web or does the mobile web still stand a chance? more

ICANN’s New gTLDs: The Game Changers Have Landed

The day after 'reveal day' two big questions will emerge; firstly was the advertising branding world so wrong or secondly, the parties behind the proposed names so invincible and can turn their $350 million dollars into many tens of billions. To be fair the jury may be out nevertheless, here are some facts... The Internet was never designed to solve the global business naming problems; it was the extension of DARPA, a failsafe military communication system later adventured into public use. more

Wow, That’s a Lot of Applications

ICANN unveiled all the applications for new top level domains today, all 1,930 of them. Most of them were fairly predictable, big companies applying for their own names like .IBM, .DUPONT, .AUDI, and .HSBC. The most applications for the same name were 13 for .APP, 11 for .INC and .HOME, 10 for .ART, 9 for .SHOP, .LLC, .BOOK, and .BLOG. None of those claim community support so they'll have to slug it out in the contention process. more

Why Comcast will Vehemently Fight a DOJ Investigation

If your company becomes a huge dominate market player in both broadband and content delivery, scrutiny will come your way, like it or not. Comcast (NASDAQ: CMCSA) has been so successful in building both a content and delivery system to such a mass audience; it's beginning to look like former monopolies which grew unwanted investigations and break-ups in the 1980's. Remember AT&T and the DOJ anti-trust decision to split the monopoly into smaller regional companies? more

Interoperability Testing Event for DMARC Email Anti-Spoofing Specification

At the end of January, the DMARC (Domain-based Message Authentication, Reporting & Conformance) specification was publicly announced and resulted in widespread media coverage, blog posts and discussion. Since that time various individuals and organizations have been working on writing code for DMARC validators and report parsers. The dmarc-discuss list has been fairly active as various questions and issues have been raised and clarified. Now it is time to see how well the various implementations play together in live testing. more

Analysis of the IDN New gTLD Applications

There has been a lot of excitement since ICANN revealed the list of 1930 applications for new gTLD yesterday at an event in London yesterday. Even some of the strongest opponents of the ICANN's new gTLD program have acknowledged there is a case to open up new gTLDs for Internationalized Domain Names (IDNs). I am going to focus here on the analysis of the IDN applicants. more

The Business Parallels Between IPv6 and DNSSEC

For two things that would seem to be completely unrelated there is an interesting parallel between IPv6 and DNSSEC. In both cases there is a misalignment of interests between content providers and service?providers. Content providers aren't highly motivated to deploy IPv6 because only a small proportion of users have v6 connectivity and even fewer only have v6. Service providers aren't anxious to deploy IPv6? because there isn't a lot of content on v6, and virtually none exclusively on v6 - so they don't expand the universe of interesting stuff on the web by deploying IPv6. Basically the same things could be said about DNSSEC. more

Password Leaks

The technical press is full of reports about the leak of a hashed password file from LinkedIn. Worse yet, we hear, the hashes weren't salted. The situation is probably both better and worse than it would appear; in any event, it's more complicated. more

The Biggest Glitch of All - ICANN’s Batching Program for New gTLDs

ICANN's batching program, called digital archery, is deeply flawed and should be abandoned before it causes havoc with the new gTLD program. As well as arbitrarily creating winners and losers, creating unfair advantages for certain types of applicants and for certain regions, the program may be suffering from another software "glitch" of the kind that damaged the application process. There is a much better solution: a single batch for all applications. more

ICANN’s Contract Not Enforceable on WHOIS Accuracy

This may or may not come as a shock to some of you, but ICANN's contract with the Domain Name Registrars, in terms of WHOIS inaccuracy is not enforceable. Bear with me. The ability of ICANN to enforce against a Registrar who fails to correct or delete a domain with false WHOIS does not exist. more

The ICANN Hunger Games

Adolescents were fascinated by the book and film called "Hunger Games". The plot is about a government forcing people to watch, and forcing some to play, a cruel game for life and death. ICANN's own Hunger Games, the so-called "digital archery" or "batching" process, is not lethal to people, but shares all other features: it is forced upon the participants, it is destructive, unfair and unnecessary. more

ICANN Gets Crazy… Again!

The same thing happens before every ICANN meeting. It starts raining. Not men, as the song goes, or droplets of H2O. It starts raining documents. In the run-up to one of its three-a-year international meetings, ICANN goes into hyperdrive. And this time, days before the Prague meeting (from the 24th to the 29th), the usual downpour has turned into a veritable deluge. Let's just take June 4th as an example. more

Don’t Make Us Treat Our Customers Like Criminals!

Crime, fraud, scams etc., they're all very bad things. They're also not going to go away anytime soon. As a domain name registrar and hosting provider we're constantly "at risk", as we sell a lot of services that are both cost-effective and also give criminals the tools they need to attack 3rd parties. Again, this isn't exactly news. We've always taken a very pro-active approach to dealing with criminal activity and network abuse... But recently I've been losing sleep. more

If You Build It, They Will Come.

Only two years after signing the DNS root zone, the powerful lure of a secure global infrastructure for data distribution is starting to reveal itself. It is illustrated clearly by two proposed technical standardizations that seek to leverage secure DNS. To some degree these developments highlight the strength of DNS institutions and how they might fill gaps elsewhere in the Internet's governance. But an increasing reliance upon and concentration of power in the DNS also makes getting its global governance correct even more important. more

It’s Not Enough to Succeed. Others Must Fail.

As the last strike of the clock signals the end of 30 May 2012 there will be quiet relief from the back offices and consultants of most top-level domain name (TLD) applicants. And finally after the drama of the TAS system gremlins we have closure. Still there may yet be squeals of anguish as someone, somewhere got it wrong. A glitch in the applicant's computer, a lost bank transfer, a last minute switch of provider: all may be reasons for failure. ...as the quip attributed to Gore Vidal so aptly put it, "It's not enough to succeed. Others must fail." So lets discuss some additional points of failure. more