Featured Blogs


One Step Closer to an Accountable ICANN

We believe that certain updates in the latest draft that limit the scope of ICANN's Mission, as specified in paragraph 188, could explicitly prevent ICANN from actively enforcing its contracts with Registries and Registrars or use contracts as a tool to implement consensus policies in the future. We suggest in our comments that revised bylaw text be added explicitly stating that the enforcement and creation of ICANN's contracts with Registries and Registrars... more»

5 Reasons Why You Should Adopt NFV for Your CPEs

Communication service providers around the world are about to embark on an epic journey. A journey which has the potential to be a major game changer for hardware and software vendors alike. The simple concept of decoupling software from hardware, referred to as network functions virtualization (NFV), promises to improve an operator's ability to differentiate themselves from the competition by moving network functions from dedicated appliances to generic commercial off-the-shelf (COTS) servers. more»

Can We Stop IP Spoofing? A New Whitepaper Explores the Issues

In March 2013, Spamhaus was hit by a significant DDoS attack that made its services unavailable. The attack traffic reportedly peaked at 300Gbps with hundreds of millions of packets hitting network equipment on their way. In Q1 2015, Arbor Networks reported a 334Gbps attack targeting a network operator Asia. In the same quarter they also saw 25 attacks larger than 100Gbps globally. What is really frightening about this is that such attacks were relatively easy to mount. more»

3 Strategies for Keeping ICANN and IANA On-Mission and Out of Politics

Over the last year, the ICANN community has been raging on about two issues: the looming IANA transition away from the US government, and how to ensure the organization is accountable to all the Internet's stakeholders. While the issues have run on separate tracks, they both boil down to one question: can ICANN be trusted to be a good steward of the Internet's future? The answer to this question will go a long way in deciding ICANN's future. more»

Sept 8 Deadline for Comments on IANA Stewardship Transition - Have You Submitted Your Comments?

Have you submitted your comments on the IANA Stewardship Transition Proposal? Do you believe the proposal of the IANA Stewardship Transition Coordination Group (ICG) for how to transition the Internet Assigned Numbers Authority (IANA) functions away from the U.S. government to the global community to be a solid proposal? Do you have points in the proposal you would like to emphasize? Do you have concerns? more»

Why is ICANN Tax Exempt?

ICANN, as we all know, is a California non-profit that is tax exempt in the US as a charity, under section 501(c)(3) of the US tax code. But it's a rather unusual charity. Typical charities support the arts, or education, or sports, or relief for the poor. ICANN doesn't do anything like that. So what's the basis for its tax exemption? We don't have to guess, it's all in the application they filed in 1999. more»

Challenges for .brands - Launching Your .brand

One of the consistent themes of this blog series is that despite similarities across .brand TLDs, no two brands will settle on the exact same strategy and process for moving their TLD to launch. As I discussed last week, an implementation plan ensures that each required action is documented, responsibility for it is assigned and a more detailed project plan can be developed to take this process further. more»

'The Global Village' Idiot

I recall from some years back, when we were debating in Australia some national Internet censorship proposal de jour, that if the Internet represented a new Global Village then Australia was trying very hard to position itself as the Global Village Idiot. And the current situation with Australia's new Data Retention laws may well support a case for reviving that sentiment. more»

ICT Sectors Are Merging Into a New Wholesale Platform for the Networked Economy

There certainly is a lot of interest in the IoT (personal devices) and M2M (industrial applications) market. But what we are seeing is only what is happening on the surface. Most of the IoT and M2M activities are taking place unseen. For example, all new electronic devices (smartphones, tablets, set-top boxes, game consoles) are now IoT devices. Wearable technology has also become a thriving part of the IoT industry, with an ever-broadening range of possible uses and devices, including smart watches, glasses, clothing items, skin patches, and even implants for health monitoring. more»

The Mobile App Trap

The Apple App Store was seven years old as of Friday, 10 July, marking a key -- and possibly critical -- evolution in how we use the Internet. First, the numbers, which are truly astounding -- there are now more than 1.4 million apps available, which have been downloaded more than 100 billion times. And that's just Apple. Add in Android and the other platforms, and we start talking about a new app economy, generating billions in revenues for developers from around the world. more»

Online Reviews Provide Insights into gTLD Customers' Needs

There is a high degree of uncertainty when launching a product, and new gTLDs are no exception. However, registries that have introduced them -- or will introduce them in the second round of new gTLDs -- can improve their odds. A key move: go to established domain name forums and check out their specialized sections for new gTLDs. What users say there can help companies refine tactics and strategy. more»

Challenges for .brands - From Strategy to Implementation Planning

While your strategy and objectives speak more broadly to why you're launching a .brand TLD, your implementation plan covers the all-important 'how'. Once you complete your strategy workshop session to agree upon objectives and approach, how do you actually launch a .brand TLD? You need an implementation plan to guide you from strategy to launch, and beyond. At its core, the implementation plan is a checklist; just like a pilot landing a plane, you need to run through your checklist to ensure you don't miss any crucial elements. more»

World Body Declares Cyber Security Top Issue

Sovereign nations around the globe have clearly defined borders, but as attendees were shown at a UN Conference several years ago, cybercrime is a borderless phenomenon. In 2011 Norton Security released statistics that showed that every 14 seconds an adult is a victim of cybercrime and the numbers are growing. As internet use grows, so does the amount and type of information streaming across the web. This information crosses transnational lines, public and private sectors. more»

Do New gTLDs Disrupt .com?

This post examines whether the new gTLDs program is a disruptive innovation to the dominance of .com. I then use the idea of disruptive innovation to explain the relative adoption failure of previous generic Top-Level Domains (gTLDs), such as .biz, .info and .mobi. Harvard Professor Clayton Christensen's theory of disruption explains battles between market entrants and incumbents. Examples of markets transformed by disruptive innovations include classified ads (Craigslist), long-distance calls (Skype), record stores (iTunes), research libraries (Google), encyclopedias (Wikipedia), and taxis (Uber). more»

Challenges for .brands - Transforming Ideas Into Strategy

The importance of engaging with all the necessary stakeholders in your .brand TLD and ensuring you have company-wide buy-in cannot be understated. But once you have all these players in a room together, what's next? Every brand launching its own TLD will move through the process differently. Unfortunately for those managing this project, there is no single, 'off-the-rack' strategy that will suit every .brand TLD's individual requirements. more»

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days

Sponsored Topics