Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Examining IPv6 Performance - Revisited

Every so often I hear the claim that some service or other has deliberately chosen not to support IPv6, and the reason cited is not because of some technical issue, or some cost or business issue, but simply because the service operator is of the view that IPv6 offers an inferior level service as compared to IPv4, and by offering the service over IPv6 they would be exposing their clients to an inferior level of performance of the service. more»

Buying Multiple Domains Makes Sense

Companies usually use one single domain name for their online activities but then, more questions pop up: SEO, Infringement, Future of the company, monitoring online competition... If buying multiple domain names answers some of these questions, there is a way to do it. Here is how... It often happens that the domain name of a company is neither the generic keyword of its core business nor a keyword that necessarily appears attached to its name. more»

ICANN the Machine…

ICANN's new gTLD expansion is really quite an ingenious ploy to grow the once small California non-profit into an unstoppable machine, worth hundreds of millions of dollars, which soon plans to finally be free from any external oversight. I have no doubt that ICANN pats itself on the back for pulling the wool over so many eyes, including stakeholders, new gTLD applicants, politicians, and the global general public. more»

NTP is Still a Security Risk

The Network Time Protocol (NTP) has been in the news a number of times over the past couple of years because of attacks on the protocol, vulnerabilities in the daemon, and the use of NTP in DDoS attacks. In each case, the developers of NTP have responded quickly with fixes or recommendations for remediating these attacks. Additionally, the development team has continued to look ahead and has worked to enhance the security of NTP. Unfortunately, that has not translated to an improved security picture for NTP. more»

IBM's SoftLayer Cloud Infrastructure Service Blocks Cuba - Why Now?

Cachivache Media recently reported that the Bitly URL-trimming service had stopped working in Cuba. Cubans had been using the service for several years, so this resulted in many broken links. Cachivache did not know what had happened, but published a traceroute that timed out at an Akamai router. I contacted Akamai, and they said they could not say anything -- they would only talk with their customers -- Bitly in this case. So I contacted Bitly and had an email exchange with one of their support people. more»

How the Clinton "Village" Transformed Internet Paradigms: Together Making a Difference

U.S. Presidential elections and the resulting Administrations can make an enormous difference on many levels and become profound points of inflection. This reality is certainly starkly visible today. Perhaps for the Internet community as well as the general public, some of the largely unknown events and actions surrounding the Internet and the Clinton team from 25 years ago can provide a basis for engagement over the coming months. more»

China's QUESS and Quantum Communications

In mid-August China launched "QUESS" (Quantum Experiments at Space Scale), a new type of satellite that it hopes will be capable of "quantum communications" which is supposed to be hack-proof, through the use of "quantum entanglement". This allows the operator to ensure that no one else is listening to your communications by reliably distributing keys that are then used for encryption in order to be absolutely sure that there is no one in the middle intercepting that information. more»

IoT Developments: NIST Issues Tech Guidance while NTIA Seeks Broad Input, Global Efforts Percolate

As the federal government grapples with Internet-connected devices and applications that make up the Internet of Things (IoT), the National Institute of Standards and Technology (NIST) is forging ahead to provide "technical leadership" for "the operation, trustworthiness, and lifecycle of IoT". Such efforts complement - and contrast - recent policy efforts at the National Telecommunications and Information Administration (NTIA) and elsewhere to promote IoT innovation while addressing security, privacy, and interoperability.  more»

Court of Appeals Avoids "Doomsday Effect" in Iran ccTLD Decision

Earlier today the U.S. Court of Appeals for the DC Circuit issued its decision in Weinstein vs. Iran, a case in which families of terror victims sought to have ICANN turn over control of Iran's .IR ccTLD to plaintiffs. In a unanimous decision the three judge panel stated, "On ICANN's motion, the district court quashed the writs, finding the data unattachable under District of Columbia (D.C.) law. We affirm the district court but on alternative grounds." more»

Why Registry Service Providers Should be Accredited by ICANN

The merits of a Registry Service Provider accreditation programs have been debated across the Domain Industry since the most recent round of Domain Name Registries were introduced starting in 2012. This post discusses the early reasoning in support of an accreditation program; changes in the policy considerations between 2012 and now; the effects of competition on the landscape; a suggestion for how such a program might be implemented; and why such a program should be introduced now. more»

Reselling Domain Names on the Secondary Market: Bona Fide Offering, or Not?

On the question of reselling domain names on the secondary market, a dissenting panelist in a 2005 case observed that "[t]here is no doubt Respondent is in the business of being a reseller of domain names that consist of common English words" and then suggested that the "fundamental question before the Panel is whether or not such a business should be allowed under the UDRP." He concluded that such a business should not be allowed... more»

The Impact of Reverse Domain Name Hijacking on Supplemental Filings in UDRP Cases

In another blog post, I wrote about the sometimes confusing circumstances in which domain name dispute panelists will consider supplemental, or additional, filings from the parties (in addition to a complaint and response) in cases under the Uniform Domain Name Dispute Resolution Policy (UDRP). I quoted the WIPO Overview, which states, in part, that supplemental filings may be appropriate where a party can "show its relevance to the case and why it was unable to provide that information in the complaint or response." more»

Almost Free Domains for Almost Everyone

The latest ICANN domain auction brought the auction proceeds piggy bank to about $240 million. The application fees for the new gTLD round were $361 million of which, at the end of March, they'd spent $227 million, and their very conservative estimate is that at the end of the process they'll have spent $289 million. If you add the numbers from the private auctions to the ones for the ICANN auctions, it's as much or more than the application costs. more»

TMCH Review Recommends Status Quo

On July 25th ICANN announced the publication of the Draft Report of the Independent Review of the Trademark Clearinghouse (TMCH). This study was coordinated for ICANN by the Analysis Group, in conjunction with researchers from the Center for Internet and Society at Stanford as well the University of Pennsylvania's Wharton School... while public comments on the draft report will be accepted through September 3rd, this Report was triggered by GAC concerns expressed before the Applicant Guidebook for the new gTLD program was even completed, and is not the work product of a GNSO-created working group and therefore will not directly result in the establishment of any new ICANN policy. more»

Verizon-Yahoo! Incumbents Never Seem to Learn

It is amazing that after the dozens of examples of failed business decisions made by telcos in relation to the digital economy, Verizon has clearly not learned any lessons and is willing to waste $4.8 billion in its purchase of Yahoo. This investment will be totally useless and will not provide any new revenue for the telco. They seemed to be attracted by the people-tracking facility (surveillance marketing) that companies such as Yahoo use, and they aim this for their own purposes to attract new advertising revenues. more»

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Sponsored Topics

Afilias

DNS Security

Sponsored by
Afilias
Verisign

Security

Sponsored by
Verisign
Afilias - Mobile & Web Services

Mobile

Sponsored by
Afilias - Mobile & Web Services
Port25

Email

Sponsored by
Port25