Featured Blogs

Latest

New Publication on Updating the Anti-Cybersquatting Regime and Ad-Based Cybersquatting

Sealing the cracks: a proposal to update the anti-cybersquatting regime to combat advertising-based cybersquatting is the title of an article by Christopher Varas in the April issue of the Journal of Intellectual Property Law & Practice. In this article, the author labels "modern cybersquatting" the monetization of domain names through PPC advertisements, and says that brand owners lack effective tools to combat this practice... more

Domain Name Price Jump: Moore’s Law or Parkinson’s Laws?

As expected, VeriSign raised the price of domain names, effective in October. New prices wholesale prices (to the registrar) for .com domain names are going from $6.42 to $6.86, while .net will increase from $3.85 to $4.23. This news came a few days ago in a letter to registrars. (Hint to consumers: renew your domains now.) ...So, basically, many if not most of VeriSign's registry costs have been falling at an exponential rate. Hard disk storage, computing performance, bandwidth, RAM storage... yet the cost is going up. How is this justified? more

An Open Letter to Yahoo!‘s Postmaster

In June 2004, Yahoo! and a number of other companies got together to announce the Anti-Spam Technical Alliance or ASTA. While it appears to have been largely silent since then, ASTA did at least publish an initial set of best practices the widespread adoption of which could possibly have had some impact on spam... The majority of these are clearly aimed at ISPs and end users, but some are either generally or specifically relevant to email providers such as Yahoo!, Google or Microsoft... The problem: Since February this year, we have been receiving a significant quantity of spam emails from Yahoo!'s servers. In addition to their transport via the Yahoo! network, all originate from email addresses in yahoo.com, yahoo.co.uk and one or two other Yahoo! domains. Every such message bears a Yahoo! DomainKeys signature... more

Trust in Email Begins with Authentication

As most CAUCE supporters already know, forging 'From:' or other commonly seen email headers is trivially easy. It's one of the most frustrating oversights in the creation of Internet email technology -- though of course that's only obvious in hindsight; it was just fine for the pre-Internet networks of the late 1970s and early-mid 1980s. Since then, things have changed -- and the most interesting recent technological advancements in email have been in the realm of sender authentication, which encompasses ways to verify that the apparent sender of a message actually is the entity which sent it. more

Who Makes the Any Apps Any Handset Call?

The Wall Street Journal today reported that FCC Chairman Kevin Martin wants to reject a Petition for Declaratory Ruling filed by Skype that would establish a wireless Carterfone policy, i.e., that wireless carriers must allow subscribers to use any compatible handset to access any application, content or software. Chairman Martin has confidence that the marketplace solutions obviate any necessary FCC intervention. Such optimism must derive in part from the apparently newfound willingness of one major wireless carrier, Verizon, to support aspects of open access. Perhaps Chairman Martin has confidence in the marketplace based on the magnanimous offer of most wireless carriers to pro-rate their early termination penalties by $5 a month. But here's the rub... more

Hot Architectural Issues for the Internet

The Internet Architecture Board's (IAB) chair, Olaf Kolkman, asked the members of the IAB to provide a statement paper each on what they believe the current most pressing issues in terms of Internet architecture are... I have thought about this for the past few days, and realised that it's hard to come up with overarching issues and even harder to come up with issues, where the IAB actually could make a difference. But I came with up with two issues. more

Will Technology Solve Network Neutrality?

When I first read this post about Predictable Network Solutions on the excellent Telco 2.0 blog, I thought it was an April Fool's Day hoax. Then I remembered that it's a UK site, and some Googling confirmed that it's a real company. So my question is, will this technology -- or something like it -- eventually make network neutrality a non-issue? Or will it be the means for network operators to implement the discrimination that everyone is worried about? more

F2C: My Opening Remarks

Here are my opening remarks at F2C: Freedom to Connect yesterday: "I am honored to be among so many remarkable people. We have to be remarkable people, because we have a hell of a job to do. The Internet has been given to us. It is a miraculous gift, and a boon to our lives... at least in part because it accidentally matured outside the purview of profit and loss. Now the money has arrived. If you want to see what happens when the money arrives, look at Nigeria or Venezuela or Russia or Iraq..." more

IPv6 Deployment: Just Where Are We?

In this article we'd like to look at some measures of the use of IPv4 and IPv6 protocols in today's Internet and see if we can draw any conclusions about just how far down the track we are with the IPv6 part of dual stack deployment. We'll use a number of measurements that have been made consistently since 1 January 2004 to the present, where we can distinguish between the relative levels of IPv4 and IPv6 use in various ways. more

IPv6… A Pre-Game Show in Denver and Featured at the Geneva Auto Show

We saw it in San Jose, then in Taipei and in Philadelphia and now it is about to happen in Denver Colorado! Yes, the IPv6 hour is about to occur a fourth and even a fifth time! The upcoming ARIN XXI will have a pre-game and a main event IPv6 hour with technical staff to assist the neophytes on their first dive into the IPv6 only world... In the meantime in the Geneva Auto show, impact of IPv6 on ITS (Intelligent Transport Systems/Services) was a topic on its own with a revealing and well timed presentation by Thierry Ernst of Inria, the French Institute of Research in Informatics and Automation. more

Gaping Hole in Models for Using Spectrum Efficiently

In February, the FCC's Office of Strategic Planning and Policy Analysis published three studies (1, 2, 3) on spectrum licensing and spectrum utilization. Thanks to Nick Ruark for pointing them out... Reading on I was struck by a gaping hole in their assumptions. more

A Third, More Interesting Round in E360 vs. Comcast

In the past week, Comcast filed an answer, denying all of E360's charges, and attached to it a motion to file a most impressive counterclaim. The court granted the motion on Monday so the counterclaim has been filed. At about the same time, E360 filed its response to Comcast's previous motion to dismiss the suit due to its utter lack of legal merit. more

Google and the White Spaces

The white spaces proceeding is the next big opportunity for experiments in alternative ways of providing wireless highspeed internet access... A key advantage of unlicensed spectrum is that experiments in new technology can be carried out without asking the permission of spectrum licensees. To date, we have made very little spectrum available for unlicensed use and experimentation. The FCC has the discretion to decide whether the digital television "white spaces" may be used on an unlicensed basis... more

Google’s Gigabit Gambit

Want a gig (1000 megabits per second) of Internet access bandwidth? Google says you could have it by the end of next year "from Manhattan to rural North Dakota (sic, I think they meant Vermont)" if their proposal to the FCC is accepted forthwith according to CNET's newsblog. Not only a gig but a mobile gig, accessible by cellphone or roaming computer -- no fiber required. Sound too good to be true? -- it isn't, IMHO! Engineering is not the problem... more

NSI: “Don’t Taunt Them, Kill Them”

Clearly whatever it is that Dutch politician Geert Wilders wants to talk about in his film is going to be the end of the internet. The news that Network Solutions decided to pre-empt his use of a domain name registered through them for the purpose of promoting his film need not be re-hashed here. However, before bemoaning yet another registrar freely deciding, as is its right, with whom it chooses to do business, it's important to look at the big picture. No, it is not "censorship" for Network Solutions to decide how it wants its services to be used... But, perhaps we might understand Network Solutions policy more clearly by looking at domain names registered through NSI... more

Topics

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

Threat Intelligence

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days