Featured Blogs

Latest

Supplementing the Record in UDRP Proceedings; When Acceptable?

The Uniform Domain Name Dispute Resolution Policy (UDRP) limits parties' submissions to complaints and responses; accepting "further statements or documents" is discretionary with the Panel (Rule 12, Procedural Orders), although the Forum (in Supplemental Rule 7) but not WIPO provides for supplementing the record with the proviso that "[a]dditional submissions must not amend the Complaint or Response." For some panelists, Rule 7 contradicts the Policy. more

When ‘Confusing Similarity’ in UDRP Cases Gets Confusing

The first element of the Uniform Domain Name Dispute Resolution Policy (UDRP) requires a complainant to prove that the disputed domain name "is identical or confusingly similar to a trademark or service mark in which the complainant has rights." It's unusual for a complainant to fail on this first of three prongs, but one recent case demonstrates just how uncertain the UDRP can be sometimes. more

War-Torn Syrian City Aleppo Gets New Fiber Link

The northern Syrian city of Aleppo is one of the key battlegrounds of that country's on-going civil war as well as the epicenter of the European refugee crisis. The most appropriate United States response to events in Aleppo has become a major foreign policy question among the candidates in this year's U.S. presidential election. Experts are now predicting that forces loyal to President Bashar al-Assad, backed by the Russian military, will take control of rebel-held eastern Aleppo within weeks. more

The .nyc High-Bid Auctions

There were highs and lows in city hall's rollout of the .nyc TLD last month. Early on we were cheered when we received notification that our application for the JacksonHeights.nyc domain name had been approved. And with the de Blasio Administration committed to putting the city's 350+ neighborhood domain names under the control of local residents, we began to imagine that our decade-old vision of an "intuitive" city Internet might materialize... more

Steps on How Service Providers Can Combat CPE Fraud and Protect Network Security

Cable modem fraud can be a major source of revenue leakage for service providers. A recent study found that communication service providers lost $3 billion dollars worldwide due to cable modem cloning and fraudulent practices. To combat this problem, device provisioning solutions include mechanisms to prevent loss -- but what do you really need to protect your bottom line? more

Fast-Moving Technologies Need Bottom-Up Standards

Technical standards typically are not something we think about: they simply make things work. Credit for this goes to the innovators who ensure that the technical standards needed to make many of our devices work together are robust and effective. Given how central telecommunications and information and communications technologies (ICTs) are to our economies and to how we live, it is crucial that they function as expected. Standards enable interoperability, as well as functionality, reliability, and safety. more

Interest in Cloud-Based Email Infrastructure Grows by 35% in 3rd Quarter of 2016

Cloud-based interest in email infrastructure trended up this past quarter. Port25, a Message Systems Company, tracks cloud-based interest (CBIs) among large volume senders based on evaluation and purchase requests received, in conjunction with overall site engagement. In Q3, CBIs on Port25's website grew by 34.97% over Q2, to a total of 48.2% of unique evaluation and purchase requests. more

How the Slow Adoption of the Cloud Has Impacted 3 Industries

"It's in the cloud" has become a phrase we don't think twice about, but less than a decade ago, you might have received some awkward looks using this kind of talk in the boardroom. Cloud-based software applications are heralding the fourth industrial revolution that will eventually lead to the industrial internet of things (IIOT). The reasons for this are because... more

How to Handle an Outage Like a Pro

In just the last two weeks, there were three major DNS outages between Google, Microsoft Azure, and Fonality. But only one of these companies was able to make even bigger waves with the way they handled their blunder. Fonality, who sells VoIP services and business phone systems, offered a very rare and transparent analysis of their outage. In a detailed statement from Chief Marketing Officer Jeff Valentine, readers were given crucial insight on how to prevent the same mistakes from happening to other companies. more

The Internet’s Climate Quandary and the Inconvenience of Practicing What We Preach

It all started earlier this year in June. I was coding transcripts of the past global Internet Governance Forum (IGF) meetings as part of a data mining exercise for DiploFoundation's Geneva Internet Platform (GIP). Pouring over transcript after transcript, the work was tedious, but I was learning a great deal about the Internet governance community as well. My interest was piqued by the conversations, the familiar names I came across, and the multi-stakeholder manifestation of politics, perspectives, and positions. more

Are These the Last Days of Boys’ Club IT?

In the year 2016, 55 years after the human race launched a person into space; the women are still not earning the same wage as their male counterparts. In the UK, the gender pay gap was 19.7% in 2013, the last year we have the statistics for. This was 0.1 per cent worse than in 2012. In the US, women earn 79ยข for every dollar that men earn. As explained in this great article from Vox, the issue is much more complex than mere numbers. more

Transformation - the Real Business Case for NFV and SDN

2016 has seen a steady flow of announcements on successful Network Functions Virtualization (NFV) Proof-of-Concept deployments, mostly focused on virtualizing Customer Premise Equipment (vCPE). This has been a relatively straight forward starting point because unlike many other NFV applications, the vCPE use case does not involve complex activities like having to scale in or out individual services. more

Yahoo Collaborating With US Intelligence Agencies

It was revealed yesterday that Yahoo has been scanning people's email for the federal government. This activity was, apparently, authorized by Yahoo CEO Marissa Meyer but not the former CSO Alex Stamos. Mr. Stamos left Yahoo in June 2015. He also publicly disagreed with the director of the NSA back in February 2015 about the NSA having access to encrypted data. more

Google Launches Corporate Blog ‘The Keyword’ on .Google Domain

As momentum builds in the world of .brands, there are some major players we as an industry have been watching closely for an indication of how their branded TLDs will become part of their digital strategies. .brand websites like these from high-profile tech leaders and influencers can be the best publicity for brand TLDs as a whole; as their involvement and buy-in acts as a significant endorsement of the .brand movement. more

How to Combat Counterfeiters on Chinese Marketplaces

Establishing your brand in an effort to combat counterfeiters on the ever growing and incredibly popular Chinese marketplace Alibaba can seem like a daunting task. Alibaba has grown so popular that it now ships over 12 million packages a day, compared the 3 million shipped by Amazon. Additionally, on Cyber Monday, a popular day for online shopping during the holiday season, Amazon processed 37 million orders. In comparison on Singles Day, an annual holiday in China, Alibaba processed 278 million orders. more

Topics

DNS

Sponsored byDNIB.com

Threat Intelligence

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days