Featured Blogs

Latest

Sharing: The First Step to Structural Change in Mobile

The arrival of the iPhone, Android and iPad will raise the stakes higher in the mobile broadband market. The fact that iPhone alone has over 140,000 Apps over sort of open networks, not portals, shows the demand for mobile applications. This will put an enormous strain on the infrastructure of the mobile operators and will require them to build fibre networks to all mobile stations, as well as invest in more spectrum and new technologies such as LTE. At the same time the mobile subscriber markets are becoming saturated and competition is driving margins down. more

Domain Name Registry and Registrar Separation Now Probably Going to Be a Policy Debate

Again on the subject of new Top-Level Domains (TLDs) ... One of the "issues" that concerned a number of people is the concept of "vertical separation". The basic idea is that domain name registries and registrars should be kept separate. While that is a wonderful Utopian ideal, the reality is that in the real world companies own other companies, people trade in stocks and shares etc., etc. So it's far from being a simple "cut and dried" situation. more

DNSSEC: Will Microsoft Have Enough Time?

I have previously pointed out the shortcomings of good and user friendly support for DNSSEC in Microsoft's Server 2008 R2. During the period just after I wrote the post, I had a dialogue with Microsoft, but during the last months there has been no word at all. The reason I bring this up again is that more and more Top Level Domains (TLDs) now enable DNSSEC and also the fact that within six months the root will be signed. more

The Greatest Free Riders of Our Time

Former Southwestern Bell CEO, now General Motors CEO Ed Whitacre famously accused Google of free-riding his network, despite the obvious truth that Google pays for traffic delivery to peering points and ISPs gladly enter into reciprocal peering agreements in lieu of cash transactions that would likely result in a near zero payment as roughly equivalent traffic balances out. Mr. Whitacre did raise a legitimate question whether there are free riders and I'm seeing one darling and one unexpected group flying below the radar. more

Australia Booting Infected Computers Off Their Networks

The Australian has a good article describing the efforts some of their ISPs are making in an attempt to clean up their act: the government is encouraging ISPs to detect computers on their network that are infected and part of botnets, and to communicate to the customer that their system is compromised... Unless the customer feels a little bit of pain they will not change their ways. more

Why is ICANN Traveling Without Moving and Thwarting Innovation in the Domain Space?

While I was giving my .music presentation at ICANN Studenkreis in Barcelona, Spain last week, it dawned upon me. There was not one single ICANN staff member sitting in the room taking notes on any of the presentations given by TLD applicants. I was convinced that it would be beneficial to ICANN staff to observe our presentations and perhaps receive useful feedback from TLD applicants that could be used to better draft the Expressions of Interest recommendation. more

Telecoms Leadership and the State of the Union

Before, during and after his inaugural speech (January 2009) President Obama spoke of the national benefits of broadband, and the changes which have been set in motion in the US telecoms market that were unheard of even a year ago. During the previous administration the incumbent telcos and cable companies had been given more freedom. As a consequence, innovation and competition dwindled and the US was no longer a leader in telecoms... However, since that time, the White House has lost some of its initial leadership. more

Protecting Customer Data

There have been a number of reports recently about customer lists leaking out through Email Service Providers (ESPs). In one case, the ESP attributed the leak to an outside hack. In other cases, the ESPs and companies involved have kept the information very quiet and not told anyone that data was leaked. People do notice, though, when they use single use addresses or tagged addresses and know to whom each address was submitted. Data security is not something that can be glossed over and ignored. more

Should a Domain Name Registrar Run from a PO Box?

In 2008 KnujOn published a report indicating that 70 ICANN accredited Registrars had no publicly disclosed business location. The fundamental problem was one of community trust and consumer faith. Registrars extend their legitimacy to their domain customers who then transact and communicate with the public. more

Big Brands Shooting Themselves In The Foot?

One of the topics that keeps coming up in ICANN policy discussions and as part of the new TLD application process is "transparency". ICANN, and the internet community in general, has had plenty of issues in the past with "bad actors" who have caused a lot of issues for everyone (think of many of the registrars who have lost accreditation in the last couple of years for example). On more than one conference call or policy discussion the issue of a company or a person's track record has come up. more

IPv6 or IPv4? What Will We See in the First Wave of LTE Networks?

All the talk early this year seems to be about LTE deployment to alleviate chronic Apple and other smartphones induced indigestion on the AT&T and other major Mobile Networks swamped by data traffic. The telluric shift albeit the user will not care or should not notice is that when he or she will power on that smartphone or whatever the communicating Swiss Knife will be called, it will request an IP address to complete an IP based call. more

Haiti’s Telecommunications Sector in the Aftermath

The scale of the devastation inflicted by Haiti's earthquake a little over two weeks ago, meant that no industry has been left untouched by its effect. The telecommunications sector is no exception. Ever since the earthquake struck on Tuesday 12th January, fixed line and wireless communications have been virtually unavailable. more

Corporate Espionage in the News: Hilton and the Oil Industry

Is anyone calling espionage by means of computers cyber-espionage yet? I hope not. At least they shouldn't call it cyber war. Two news stories of computerized espionage reached me today. The first, regarding the Oil industry, was sent by Marc Sachs to a SCADA security mailing list we both read. The second, about the hotel industry, was sent by Deb Geisler to science fiction convention runners (SMOFS) mailing list we both read. more

Are Google, Microsoft and Apple the Next Utilities in Telecoms?

Over the last few years the increasing amount of discussion about telecoms reveals that the real competition for telecoms companies is not from other telcos, but companies such as Google and others. While I agree with this, obviously it is important to analyse it further. more

Google and China: Some General Thoughts

I have deferred blogging on the Google/China imbroglio for a few reasons. First, heavyweights such as Jonathan Zittrain have tracked International online censorship and online security issues more closely than I have. Second, after Google's provocative blog post, I wanted to see the facts develop rather than rely solely on Google's assertions. The spin doctors are now moving in, so the useful development of the factual record will be slowing down. more

Topics

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Threat Intelligence

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days