Featured Blogs


The Regulatory Arbitrage Lovefest

My day job, which includes finishing a book, updating a broadband law treatise, and trying to engage undergraduate students in the challenges of telecommunication and Internet policy, prevents me from weighing in each time I see yet another outrageous claim on such issues as network neutrality, broadband market penetration, and the competitiveness of U.S. telecoms markets. But I have to make time for this one. more»

Reducing Cybersquatting, Phishing

Solutions to cybersquatting and phishing must target brand customers instead of the trademark infringers, who are in effect liars. This post outlines why online-based traditional solutions fail, and it offers solutions to two types of lying (cybersquatting and phishing). more»

IPv6, Stimulus, Digital Recovery and Job Creation

When our G20 leaders met in Pittsburgh last week, stimulus and recovery were foremost on their minds. Needless to dwell on the ravages of sub-prime lending and outsized bonuses rewarding dismal performance. It is good to see that, in today's global economy, Information Technology is recognized as a major driver of economic growth and quality of life. ...The timing of the Cisco announcement linking IPv6 and smart grids is certainly no coincidence. There is a money trail to be followed and IPv6 will ride the smart grid coattails. more»

Post JPA: Tempered Happiness

The Affirmation gladdens me. The Affirmation worries me. The Affirmation makes me wonder what is next. I am of course referring to the Affirmation of Commitments between the United States Department of Commerce (DoC) and ICANN. In the respect that the US is loosening its grip on ICANN a little, this is a good thing. Symbolically, of course it is gigantic... more»

Ambient Connectivity: An Introduction

"Ambient Connectivity" is the ability to assume connectivity anywhere and anytime. Ambient Connectivity is the future of the Internet once we've removed the barriers we associate with today's telecom and extend the reach beyond the narrow confines of "broadband". The nuanced definition of Ambient Connectivity is that we can view connectivity as infrastructure but we need to take responsibility if we find ourselves disconnected. more»

DOC to ICANN: Time to End Double-Weighted Voting of Registries and Registrars

The US Department of Commerce and ICANN announced today an Affirmation of Commitments. One of the important elements of that document was in section 4, namely that "ICANN and DOC recognize that there is a group of participants that engage in ICANN's processes to a greater extent than Internet users generally." more»

ICANN’s September Surprise

"Surprise, surprise, surprise!" is how Gomer Pyle would react to the news that the US government has allowed the JPA to expire, thus completing the transition of DNS management to ICANN. Plenty of skeptics doubted the US would let it happen, but today really is ICANN's independence day. more»

Verizon: Voice is Dying

Ivan Seidenberg, Verizon CEO, saying "voice is dying" is a defining moment in telecom history. He didn't use those words, but his comments at Goldman Sachs are clear "we have to pivot and make a shift from the voice business to the data business and eventually to the video business. ... we must really position ourselves to be an extremely potent video-centric asset." more»

Registry-Registrar Cross Ownership: Framing the Issues

There has been much said and written recently about the issue of registry-registrar cross ownership with regard to New Top Level Domains ("New TLDs"). It is clear that there appears to be a fair amount of confusion about the issue and the positions espoused by various parties. To assist the ICANN community in understanding the issue -- the points of agreement and debate -- I offer the following overview on behalf of Network Solutions and Central Registry Solutions... more»

Why Distinguish Between Defensive and Offensive Domain Names?

Offensive domain-name registrations require strategic corporate decisions. Second, they require different strategic and tactical remedies when third parties register desired names. Thus, different organizational approaches are necessary to manage domain name risks and rewards. The essay identifies the strategic differences and remedies for the two types of domain names, and outlines the implications for internal work-flow organizational structures. more»

Why Does the Telco Industry Need to Change?

Over the last years the telecommunications market has been regulated on the basis of operating telephony services. Internet access has been added to this in recent years but it is still essentially linked to telephone line regulations. While major societal changes have been happening, since the 1980s at least, very few policy changes were made around the telecoms industry to enable it to play a key role in these changes. Key telecoms reforms in the mid- and late 1990s still refused to take a more multi-media -- or perhaps what we now call a trans-sector -- approach towards the industry. more»

Is the Transition to IPv6 a "Market Failure?"

At the outset I should say that here I would like to restrict my view to the transition from the IPv4 Internet to the IPv6 Internet, and, in particular, to examine the topic of the appropriate market structure that lies behind the dual stack transition strategy, and the manner in which the Internet can transition from the universal use of IPv4 as the underlying datagram protocol to the universal use of IPv6. more»

In Congress, A Confusing Argument Against New TLDs

In a recent post to CircleID entitled New Domains and ICANN Accountability, Steve DelBianco paints himself as "frustrated" that ICANN didn't take a different path toward new Top-Level Domains (TLDs). Mr. DelBianco was one of four witnesses at a hearing before the House Judiciary Committee's Subcommittee on Courts and Competition on September 23, 2009. He is a creative advocate for his clients, an engaging speaker, and a skillful writer, and he produced a synopsis of the hearing which sounded convincing -- until I tried to make sense of it. more»

An Authenticated Internet

Discussions around DNSSEC are so often focused on the root, the attacks, what DNSSEC does and doesn't do and so on -- and these are all valid and important points. But there is far less attention focused on the opportunities that will surface from an authenticated internet. ...DNSSEC is becoming more of a reality now -- rather than a technical discussion which has been stuck in the mud for 15 years. We can now begin to think about new opportunities to build from a secure DNS, opportunities that build on the certainty that you have arrived at the correct website. Today, you can't be sure. more»

China's Censorship Arms Race Escalates

Last week the China Digital Times reported that a photo (shown in the post) has been making the rounds in Chinese blogs and chatrooms. It is an image of a "computer science float" for Thursday's National Day parade, onto which somebody has photoshopped a screenshot of the Internet Explorer error message familiar to anybody who has ever tried to access a blocked website in China: "This page cannot be displayed." more»

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days

Sponsored Topics


DNS Security

Sponsored by


Sponsored by
Afilias - Mobile & Web Services


Sponsored by
Afilias - Mobile & Web Services


Sponsored by