Featured Blogs

Latest

Restricting Anti-Virus Won’t Work

In a blog post, Stewart Baker proposed restricting access to sophisticated anti-virus software as a way to limit the development of sophisticated malware. It won't work, for many different and independent reasons. To understand why, though, it's necessary to understand how AV programs work. The most important technology used today is the "signature" - a set of patterns of bytes - of each virus. Every commercial AV program on the market operates on a subscription model... more

Why CDNs Are Critical to Future of R&E Networks, Big Data and the Internet

Netflix has announced that they are deploying their own Content Delivery Network (CDN) for delivery of their video streams to Internet Exchange Points (IXPs) around the world. More importantly they are making the hardware and software design of their CDN servers freely available. That means any network can deploy Netflix CDN boxes deep into their network to significantly reduce traffic volumes and improve performance for users. more

Taking Stock of New gTLDs in the Public Markets

A woman on the radio talks about revolution, though it's already passed. The window is now closed. A snapshot can be taken. A baseline can be set. How have the public markets valued the new gTLD program? And more importantly, how will public markets value it going forward? Until a few months ago, the new gTLD program was arcane policy discussion among a very narrow technical population of the Internet community. more

How Many of the New gTLDs Will Fail?

I was just asked the question: How many of the new Top-Level Domains (TLDs) will fail? This poor listener might have hoped for one sentence as response, but that subject is too interesting to be brief. In this scenario you can't look to historical data to measure or predict the success rate of the new TLDs because past new TLDs have been largely managed by big businesses who have strong revenue streams from other business lines that they could use to support a slacking TLD. more

Best Practices for Implementing IPv6 and Avoiding Traffic Exposures

There has been a lot of discussion lately about the potential for IPv6 to create security issues. While there are definitely some security risks of IPv6 deployment, a carefully considered implementation plan can help mitigate against security risks. As we approach World IPv6 Launch tomorrow, I thought it prudent to share the below described incident that iDefense recently observed. more

ICANN Gets Crazy… Again!

The same thing happens before every ICANN meeting. It starts raining. Not men, as the song goes, or droplets of H2O. It starts raining documents. In the run-up to one of its three-a-year international meetings, ICANN goes into hyperdrive. And this time, days before the Prague meeting (from the 24th to the 29th), the usual downpour has turned into a veritable deluge. Let's just take June 4th as an example. more

Hewlett Packard and Other Companies Deploying Zero Carbon Data Centers

I am pleased to see that several companies are starting to recognize that building zero carbon data centers is a more sustainable direction rather than focusing on energy efficiency (i.e. PUE). As China, India and the rest of the developing world starts to deploy data centers, GHG emissions will continue to increase in portion to the number of data centers regardless of the PUE. But building zero carbon data centers powered only by renewable energy means that as the world deploys many more hundreds of data centers, GHG emissions will remain virtually unaltered and close to zero. more

Flame On!

Here we go again; another instance of really sophisticated spyware has been reported, a system that is "so complex and sophisticated that it's probably an advanced cyber-weapon unleashed by a wealthy country to wage a protracted espionage campaign on Iran". I won't get into the debate about whether or not it's really more impressive than Stuxnet, whether or not it's groundbreaking, or whether or not Israel launched it; let it suffice to say that there are dissenting views. I'm more interested in the implications. more

New Generic Top Level Domain (gTLD) Application Reveal Targets June 13, But Many Questions Remain

Even though ICANN is moving full steam ahead with the New gTLD Program, many of the program's specifics are still being finalized. Many important questions related to the Trademark Clearinghouse and the Uniform Rapid Suspension (URS) still remain unanswered at this point. However, ICANN has recently provided additional details around Application Reveal and Batching and selected the Independent Objector. more

ICANN TAS Window Closes - What’s Next for Applicants?

It's official. After more than six grueling years of work for ICANN and the wider community, the new Top-Level Domain (TLD) application process finally closed a few hours ago. ICANN's Chief Operating Officer later advised the community in a release that just over 1900 applications had been submitted in the TAS with one hour remaining before the system closed (final numbers will be released on reveal day). This number of applicants falls within most industry estimates and shows significant demand as expected from across the globe. more

It’s Not Enough to Succeed. Others Must Fail.

As the last strike of the clock signals the end of 30 May 2012 there will be quiet relief from the back offices and consultants of most top-level domain name (TLD) applicants. And finally after the drama of the TAS system gremlins we have closure. Still there may yet be squeals of anguish as someone, somewhere got it wrong. A glitch in the applicant's computer, a lost bank transfer, a last minute switch of provider: all may be reasons for failure. ...as the quip attributed to Gore Vidal so aptly put it, "It's not enough to succeed. Others must fail." So lets discuss some additional points of failure. more

A Closer Look at the Flame/Flamer/sKyWIper Malware

The world is abuzz this week with some flaming malware - well "Flame" is the family name if you want to be precise. The malware package itself is considerably larger than what you'll typically bump into on average, but the interest it is garnering with the media and antivirus vendors has more to do with the kinds of victims that have sprung up - victims mostly in the Middle East, including Iran - and a couple of vendors claiming the malware as being related to Stuxnet and Duku. more

IPv4: Business As Usual

This year, we expect that the RIPE NCC's pool of unallocated IPv4 addresses will reach the "last /8", meaning that we have 16,777,216 IPv4 addresses left in the available pool. At that point it will no longer be possible for RIPE NCC members to obtain the amount of IPv4 addresses they will require to expand their current and future networks. When we hit the last /8, the RIPE NCC will only be able to distribute IPv6 addresses and a one-off allocation of IPv4 address space... Has this caused a last minute rush? more

Don’t Make Us Treat Our Customers Like Criminals!

Crime, fraud, scams etc., they're all very bad things. They're also not going to go away anytime soon. As a domain name registrar and hosting provider we're constantly "at risk", as we sell a lot of services that are both cost-effective and also give criminals the tools they need to attack 3rd parties. Again, this isn't exactly news. We've always taken a very pro-active approach to dealing with criminal activity and network abuse... But recently I've been losing sleep. more

3 Things You Should Be Doing This Spring and Summer ... If You’re a New TLD Applicant

It would have been difficult to plan for this no-man's-land period we find ourselves in this spring as ICANN rectifies, resets and finally closes their new TLD application window. But for those of us with applications in the black-box hopper, we soldier on. From a marketing standpoint, there are three things we are working on with our partner clients with applications submitted, and if you're in the game too, you might want to consider similar actions. more

Topics

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

Threat Intelligence

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days