/ Recently Commented

America Planning for the Closure of Its Copper Network

In an interesting move the FCC's Technical Advisory Council has outlined the need for setting a 'sunset' date for the closure of the circuit switched network. This is a first step that eventually could lead to the replacement of the PSTN in the USA, rather than letting the network slowly fade into oblivion the FCC proposes the bring the issue in the open so that it can be properly evaluated and discussed. more

New gTLD Applicants Must Reduce Cognitive Biases

To improve the viability of your application for the recently approved launch of new generic top-level domains (gTLDs), you must reduce decision biases in estimating a new gTLD's expected revenues. To do so, you must either delegate the responsibility to an independent multi-disciplinary team within your company, or seek input from a consultant. more

Why Isn’t Mobile Malware More Popular?

This is a followup to Wout de Natris' as usual excellent piece on the Enisa botnet report -- pointing out the current state of mobile malware and asking some questions I started off answering in a comment but it grew to a length where I thought it'd be better off in its own post. Going through previous iterations of Mikko's presentations on mobile malware is a fascinating exercise. more

Report on Smart Grid Cyber Security

A recent report from Pike Research, "Smart Grid Cyber Security" has found if smart grids can realize their full potential, consumers, utilities, nations, and even the earth itself will benefit. As with nearly any new technology, the industry focus has been on getting smart grids up and running, often with little consideration for cyber security issues. more

Why Private Support of Cyber Security Initiatives May Not Work

A fledgling international cyber security alliance is continuing to gather backing from private business, according to a recent article published on ComputerWeekly.com. The International Cyber Security Protection Alliance (ICSPA) aims to support law enforcement agencies in countries that lack the resources to fight cybercrime. Commercial security organizations such as McAfee and Trend Micro are supporting the alliance. more

Focus on gTLD Niches, Not on the Number of Registrations

Applicants for the recently approved launch of new generic top-level domains (gTLDs) should seriously take into account niche markets instead of focusing on the number of registrations. Drawing on failure and success drivers when it comes to Internet start-ups, it becomes clear that the failures of recently introduced generic top-level domains (gTLDs) - such as .biz and .info - are due to their focus on the number of registrations (i.e., scale) instead of focusing on niche markets. On the other hand, start-up successes have been consequences of prudent initial niche strategies. more

Independence and Security Online Have Not Yet Been Won

As we, here in the United States celebrate our independence this Fourth of July, we are reminded that the liberties and freedoms that come with that independence have yet to be won online. As citizens of this country we are blessed with safety and security from threats both foreign and domestic, but those guarantees have not yet extended to our citizenship in the global Internet community. This is true not just for American citizens, but for all Internet users throughout the world. more

Top-Level Domains and Search

Search marketers and SEO mavens are starting to pay attention to top-level domains (TLDs) now that ICANN has announced a starting date. Many of them are dubious about the benefits of TLDs to search, but they are missing out on why search will benefit from new TLDs - and vice-versa. A recent article on SEO.com looked at the value of new top-level domains for search. One of the reasons for his skepticism comes from a common but completely erroneous notion that there's some sort of order to how top-level domains work today... more

Bit.ly Gets You Blocked

URL shorteners, like bit.ly, moby.to and tinyurl.com, do three things... Making URLs shorter was their original role, and it's why they're so common in media where the raw URL is visible to the recipient -- instant messaging, twitter and other microblogs, and in plain text email where the "real" URL won't fit on a single line. From the moment they were invented they've been used to trick people to click on links to pages they'd rather not visit... more

The New gTLD Chess Game

On June 20th, the ICANN board voted to move ahead with the new generic Top-Level Domains (gTLDs) program, intended to add hundreds, if not thousands of new names to the DNS root. Now what? Not even the most enthusiastic ICANN supporters think that any new TLDs will be added before the end of 2012, but there are other things going on that greatly complicate the outlook. more

The Internet Community Says Thank You to ICANN for New TLDs

After more than six years of consultation and negotiation regarding the New Top-Level Domain Program, the ICANN Board this week approved the program to the pleasure of many within the Internet community. For this, we say thank you to ICANN on a job well done! The New Top-Level Domain (TLD) Program has been controversial at times and has fuelled many passionate debates within the Internet community. more

Outsourcing and Registry Operations Present Challenges to New TLD Applicants

After ICANN announced in Singapore approval of the new Top-Level Domain (TLD) program, we heard many prospective applicants say they would start asking registry infrastructure providers to break down their costs into registration and resolution components. The last few TLD launches have shown that although you can achieve some respectable registration volumes for new TLDs, chances are it will take some time for content to be associated with the domain names, and hence, resolutions to pick up. more

Internet Security and the Multistakeholder Approach: Is It Attainable?

Internet Security is a topic that has drawn a lot of attention over the past year. As awareness grows that cooperation is necessary, it dawns on people that there are many and very different stakeholders involved, stakeholders that may never have met before. Let alone have cooperated. An example of an approach is the National Cyber Security Council (NCSC) that was installed in The Netherlands on 30 June. This is a high level council that will give advice to public as well as private entities on how to better secure themselves and society at large against cyber attacks and how to become more resilient. However, without the right approach it is doomed to become a talking shop. more

What’s New In the Field of Cybersecurity Cooperation

The last few months have shown a number of signs that cooperation in cyberspace is not just necessary, but it is vital for the survival of the Internet as we know it. There is no need to provide links to all the articles and news stories that talk about the dangers of cyberattacks on the infrastructure in the USA or other countries - you can find plenty of them. ... What misses really in these stories is the answer to the question "So, what?" more

Role of Finance Leaders is Specialized in TLD Launches

When I first entered the domain industry as head of finance and operations at .MOBI, the company had just acquired its licence from ICANN. I did a quick overview of the business environment through a financial lens. My first impressions were predominantly positive. Sales were generated up front on a cash basis, which put registry operators in an enviable operational cash flow position... Outsourcing the back-end registry operations meant that we could tie cost of goods sold (COGS) to activity. But I had a steep learning curve... more