/ Recently Commented

Three Things Registrars Must Do to Enhance Security

If the rise of phishing has taught us anything, it's that on the Internet, if a digital asset has value, there's somebody out there who wants to steal it. Whether it's a bank account password, a credit card number, a PayPal login, or even a magic sword in an online game, there's a fraudster somewhere trying to misappropriate it for his or her own nefarious purposes. Domain names have always been a target for such criminals. more

Cyberwar vs No Cyberwar

I was browsing CircleID the other day and came across Bruce Schneier's article on cyberwar. Schneier's article, and the crux of his point, is that the term cyber war and the threat of cyber warfare has been greatly exaggerated. The real problem in cyberspace is not the threat of cyber warfare wherein a foreign government, or possibly non-state actor, conducts a cyber attack on another nation. more

Broadband Initiatives: Impact Will Depend on Wireless and Fixed Strategies

Broadband; we want it, and we all depend on it; but where you live can impact access and adoption of the best that service providers have to offer. The FCC is looking to change both geographic and demographic limitations now plaguing the U.S. in the global race for broadband economic supremacy. Can a combination of a fixed and wireless-mobile strategy improve broadband economic viability by increasing access, adoption, and affordability across the broadband spectrum? more

A Look at IPv6 Allocations Since 1999

In the previous graph and article published here two weeks ago, we showed that many ISPs in the RIPE NCC service region (Europe, the Middle East and parts of Central Asia) have not yet obtained IPv6 addresses from the RIPE NCC. Our latest graph demonstrates just how quickly this is changing. more

Out of Office Alerts are So Out of Here

Do Out of Office alerts these days serve a purpose anymore? They seem to work well a decade ago when you were really out of the office and your computer sat under your desk and you couldn't check email till you got to it. Today, we as an industry and as individuals now have laptops, iPads, Smartphones, Wifi, WiMAX, etc. keeping us 100% of the time on the Internet at one time or another. And you know we all at one point throughout our days whether or not on vacation or after 5 PM check email as part of our everyday lives. more

DNS RPZ, Malicious Domains… Bring Your Own Policy. Dress Casual.

Paul observed that most new domain names are malicious. Are they? Since the "dawn of tasting", some 30 million domain names have been created for the purposes of interposition on existing name to resource mappings. That is a third of the .COM historical growth, and mostly in the last five years. ... It is difficult not to conclude that interposition on persistent, public referents is without malice, and that the malicious parties are advertisers seeking to transform public referents into private property, as promotional devices... more

Bandwidth: Why Fast is Important in a Global Economy

Bandwidth is the basic foundation for Internet traffic as a connector to everything important in our lives. Whether it is basic bandwidth for connecting to family and friends, or a super fast highway for global reach and competitiveness in the business world, bandwidth constitutes the speed at which we connect as a global presence within the expanding sphere of Internet communication. ... To understand why bandwidth is important to all Americans, including personal and business uses, we must understand the different types Internet traffic. more

Facebook and YouTube Blocked in Pakistan

After the court's decision, the PTA ordered all the operators in the country to block the website, www.facebook.com, until further orders. It said the directives had been issued by the ministry of information technology and telecommunication in view of the LHC's order. All the ISPs of Pakistan have blocked access to all the hosting servers of www.facebook.com. ...all the Mobile Network Operators of BlackBerry Services in Pakistan were also trying to block access to the FaceBook.com but they could not do it because the Blackberry Services are routed through RIM... more

WiMAX vs. LTE

Mobile WiMAX, with the release of 2×2 MIMO chips in 2008, gives WiMAX a lead of two or so years on its major competitor -- the 3GPP's LTE. However, 3G cellphones using 3GPP UMTS technologies, extended to higher speeds with HSPA, is widely used in handsets in many countries. In North America, 3GPP2 CDMA2000 and EV-DO are widely used, but these are likely to be replaced over time by LTE and to some extent WiMAX. more

New TLD Application Tip: Launch Strategies

Almost exactly nine years ago, the .INFO domain first started accepting registrations. This was an historic event as it was the first time a new generic top-level domain (TLD) was launched to an existing domain marketplace and, in fact, was the first new TLD to be added since .com. We've seen (and provided technology to power) many other TLD launches since then, with many business models. As you seek to introduce your own new TLD however, you should carefully evaluate the different launch models that have been tried before and determine which one will work best for your specific TLD. more

Brand Protection Domain Registrations: There Are More Than You Think

One of the major problems for brand owners is protecting the brand in new TLDs. Most new Top-Level Domain (TLD) registries will depend on brand protection registrations for a major part of their registration volume and some may become almost completely dependent on these registrations if the new TLD fails to capture the public's imagination. Short of comparing the registrant data for each individual domain, there is no 100% accurate method of measuring the level of brand protection registrations in a TLD. more

US Facing a Human Capital Crisis in Cybersecurity, Says CSIS

A new study has been released by Center for Strategic and International Studies (CSIS) Commission on Cybersecurity for the 44th President that looks into cybersecurity manpower challenges in the United States. The report titled, "A Human Capital Crisis in Cybersecurity," is produced by CSIS - a bipartisan public and foreign policy think tank in Washington. more

FCC’s McDowell Warns of “Irreversible International Regulation”

The stakes of the U.S. communications policy debates are larger than many assume. Subjecting broadband to new and extensive regulation in the U.S., says FCC Commissioner Robert McDowell in today's Wall Street Journal, could invite a regulatory ripple effect across the globe. more

ICANN’s Economic Study - It Depends

Economists aren't very good at predicting things, as any one with money in the stock market can attest. The most powerful economist in the United States, the Chairman of the Federal Reserve, is on record predicting a continuing climb in housing prices -- just prior to their precipitous decline. And yet their crystal balls still hold some allure for those who need to present "evidence" about the future. Such is the case with ICANN and the new generic Top-Level Domain (gTLD) program. more

VeriSign Anti-Trust Lawsuit Paves Way for More Suits If There Are No Vertical Integration Exceptions

The Coalition for Internet Transparency (CFIT) filed an anti-trust suit against VeriSign for their monopoly control of the .COM registry and the expiring market of .COM domains. The claims were many including excessive financial pressure lobbying and lawsuits to force ICANN into renewing the VeriSign .COM agreement under very self-serving terms. ICANN inevitably was paid millions of dollars to settle the suit. However, the saga continues once again. ... In the light of continuous and relentless discussions and proposals by the Vertical Integration working group, one question is in the back of everyone's mind. Could the decision on Vertical Integration backfire on ICANN and invite similar suits in the domain name space? more