Featured Blogs


Broadband Giants Stay Neutral on Network Funding

It looks as if the big boys like AT&T, Verizon and Comcast are passing on the stimulus money. The official reason is that they don't need it, that they enough cash on hand to build out their networks on their own. Fair enough. Perhaps the funding should be reserved for those more in need, those that just need a boost to fund a new business model or expand service. But there are probably other reasons. more»

FCC Requests Comments on Definition of "Broadband" - Comments Due Aug 31; Replies Due Sept 8

The FCC is engaged in researching and preparing a National Broadband Plan which is due to Congress in February 2010. The FCC has released a Notice of Inquiry soliciting comments for the plan and is currently actively holding a lengthy series of workshops exploring the different aspects of what might go into the plan. more»

Helping Banks Fight Phishing and Account Fraud, Whether They Like It or Not

On Wednesday, Project Honey Pot filed an unusual lawsuit against "John Does stealing money from US businesses through unauthorized electronic transfers made possible by computer viruses transmitted in spam." Their attorney is Jon Praed of the Internet Law Group, who is one of the most experienced anti-spam lawyers around, with whom I have worked in the past. more»

Threats to Internet Oversight Mount as Key Protection Expires

Before the US Government abdicates its oversight of the Internet Corporation for Assigned Names and Numbers (ICANN) it should take a long, hard look at the mounting efforts by world governments to assume greater power over the Internet's addressing system. If those efforts meet no further resistance, the once-theoretical threat of "capture" could become a reality. At the end of September, the Joint Project Agreement (JPA) between ICANN and the US Government is set to expire. The JPA is part of a decade-long agreement where the US transitions control of Internet addressing to ICANN. more»

ICANN Must Simultaneously Reveal TLD and Second-Level Registration Rules

I outline two possible drawbacks with the idea of first revealing rules for the new proposed Top-Level Domains (TLDs) and then for second-level registrations. I propose a lottery process to initially allocate second-level domain names. A number of people have voiced concerns about the idea of automatically granting the winner of the TLD a monopoly power over second-level domain registrations. We should also be worried about the financial interest ICANN has in not providing the rules for the two-level registrations simultaneously. more»

Oh, Spammer, Where Art Thou?

A few weeks ago, I posted a piece on where individuals spammers were located in terms of sending IP. The United States was number 1, followed by China. This is in terms of total volume of spam that they send. However, a second piece of data that I did not take a look at was where all of the individual spam sites contained within the spam was located. For example, does a lot of spam sent from the United States point to spammy URLs hosted in China? more»

Corporate Domain Registration Practices in Light of New gTLDs

For years, corporate domain name administrators have scoffed at every new second-level and third-level country code Top-Level Domain (ccTLD) liberalization, and rightly so. Until recently, most had continued the practice of registering significant numbers of variations, misspellings and typo-squats. While I have never encouraged the practice of registering every variation in every geography, as this becomes prohibitively expensive over time... With what seems to be the imminent launch of hundreds of new TLDs as a result of ICANN's new initiative, companies appear to be saying enough is enough, and meaning it. more»

New gTLDs: Let the Gaming Begin (Part I - TLD Front Running)

A series of recent applications for national trademark rights in terms that correspond to likely strings for new top-level domain names, or TLDs, (e.g., ".BLOG") highlight just one way in which ICANN's new generic TLD (gTLD) application process is likely to be "gamed." But it is also a strategy to which some trademark holders may feel compelled to resort to defend their rights to that string. Unfortunately, it does not appear that ICANN is addressing these important public policy considerations. more»

The Chinese Domain Name Bubble Bursts

Nearly one year ago, I asked Will .CN become the next .COM? And perhaps I was right in more ways than one. Because now it appears that .CN is experiencing its very own .COM bust. Just a year ago Chinese domain registrations were booming, so quickly in fact that .CN had surpassed .DE to become the most-registered ccTLD. more»

Forget TLDs, Keep Dot Suffix and Move On

I have been working on URL, Web address, ID's and Namespace since quite a long time and I have my reservations about the present set up being a complete network. generic Top-Level Domains (gTLDs), country codes (cc), .co are all complicating the network, add to that the problem of address shortage plus other problem mentioned in comments and blogs at CircleID. It's time for out of the box thinking. more»

National Telcos Can and Will Change Their Behaviour, Case in Point: Telstra

When discussions with overseas colleagues made it clear to me how fast things are changing here in Australia compared with the rest of the world, I was prompted to write this update about the developments in Australia, particularly in relation to its incumbent telco, Telstra. Most people overseas have not yet fully caught up with the fact that the destructive regime of Telstra's former CEO is well and truly over -- in the past there has been plenty of international reporting of the shocking behaviour of Telstra under Sol Trujillo (former US West) and his persistent attacks on the government included suing Ministers and abusing the Regulator. more»

Are Phishing and Malware Separate Threats?

Phishing is when bad guys try to impersonate a trusted organization, so they can steal your credentials. Typically they'll send you a fake e-mail that appears to be from a bank, with a link to a fake website that also looks like the bank. Malware offers another more insidious way to steal your credentials, by running unwanted code on your computer... I like VeriSign's characterization of this kind of malware as an insecure endpoint, the PC which is the endpoint of the conversation with the bank isn't actually under the control of the person who's using it. more»

Routing Redundancy: How Much Is Enough?

Internet connectivity is a good thing. Many of us depend on it for everything from our livelihoods to our entertainment. However, the Internet is very fragile and even the The New York Times is worried about it. But they're primarily concerned with overloads that can occur when everyone on the planet does the same thing at roughly the same time, such as surfing for news about Michael Jackson. Unfortunately, we will never avoid all such scenarios. Physical systems are designed around average and typical peak loads, not around extremely high loads associated with very unlikely events. Who would pay for that? more»

Examininng Value in New ICANN TLDs on Search and Navigation, Companies, Domain Registries

I outline the implications for value presented by ICANN's proposed introduction of new Top-Level Domains (TLDs) on user search and navigation, companies, and registries... For the new tools to be value adding they should facilitate navigation, reduce search cost, or provide actionable branding information through marketing. Unfortunately, the new TLDs bring in a mixed bag of value-adding and -destroying tools. more»

Downloading is Not Enough… Probably

Peer to peer download services are still popular with music-loving kids, it seems. The second annual survey of young people's music consumption by pressure group UK Music found that three-fifths of the 1,808 18-24 year olds who took part said they used p2p services, and four-fifths of those did so at least once a week. This is almost the same as last year's result, and would seem to indicate that the efforts by the music industry to offer a range of licensed alternatives to Limewire and other p2p services have failed to have any real impact. more»

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days

Sponsored Topics


DNS Security

Sponsored by


Sponsored by
Afilias - Mobile & Web Services


Sponsored by
Afilias - Mobile & Web Services


Sponsored by