Featured Blogs

Latest

Noncommercial and Fair Use in Rebutting Claims for Abusive Registration of Domain Names

The UDRP lists three nonexclusive circumstances for rebutting lack of rights or legitimate interests in domain names, which if successful also concludes the issue of abusive registration in respondent's favor. The third circumstance is "you are making a legitimate noncommercial or fair use of the domain name without intent for commercial gain to misleadingly divert consumers or to tarnish the trademark or service mark at issue." more

IANA Transition is Just the Beginning

The transition of the Internet Assigned Numbers Authority (IANA) functions is finally in the history books. After almost two years of working groups and multiple rounds of meetings, most of us want to take a long vacation and never hear the acronym "IANA" again. However, the transition is just the beginning. Now is the time for the multistakeholder community to exercise its new authorities and responsibilities to ensure ICANN remains accountable to every internet user. more

The Wild West Of Performance Measurement: Using Data To Ensure Optimal Vendor Selection

Data-driven decision making relies on contextual understanding of how data is gathered and the type of analysis used to arrive at an outcome. The popularity of data-driven decision-making has increased the number of companies using statistics to support a preference or vendor selection. The Internet Performance Management (IPM) market hasn't been spared, but, unlike other markets where institutions have codified a standard for qualification and quantification, such as the FDA's nutrition labels, Insurance Institute for Highway Safety, or the Coffee Quality Institute, the IPM market is still in the Wild West stage. more

One-Click Unsubscription

Unsubscribing from mailing lists is hard. How many times have you seen a message "please remove me from this list," followed by two or three more pointing out that the instructions are in the footer of every message, followed by three or four more asking people to not send their replies to the whole list (all sent to the whole list, of course,) perhaps with a final message by the list manager saying she's dealt with it? more

A Look at New gTLDs Numbers… We’re Doing Good

Like it or not, new gTLDs are here and they're here to stay. If it is still common to read that the ICANN new gTLD program was a failure and few users are using new domain names, numbers show the opposite. I recently read very rude critics addressed to new gTLD applicants but surprisingly, critics often come from ".com" investors and my understanding of this is that new domain names lower their margins ...since the domain name offer is now larger. more

Maintaining Security and Stability in the Internet Ecosystem

DDoS attacks, phishing scams and malware. We battle these dark forces every day - and every day they get more sophisticated. But what worries me isn't just keeping up with them, it is keeping up with the sheer volume of devices and data that these forces can enlist in an attack. That's why we as an industry need to come together and share best practices - at the ICANN community, at the IETF and elsewhere - so collectively we are ready for the future. more

A Record Year for Domain Name Disputes?

With just a little more than three months left in 2016, the number of domain name disputes filed at the World Intellectual Property Organization (WIPO) appears to be headed for a record year. According to public data published on the WIPO website, the current number of domain name disputes filed this year (as of this writing, September 27, 2016) is 2,228 - which would indicate that the total might reach 3,011 cases by December 31. more

Exploiting the Firewall Beachhead: A History of Backdoors Into Critical Infrastructure

There is no network security technology more ubiquitous than the firewall. With nearly three decades of deployment history and a growing myriad of corporate and industrial compliance policies mandating its use, no matter how irrelevant you may think a firewall is in preventing today's spectrum of cyber threats, any breached corporation found without the technology can expect to be hung, drawn, and quartered by both shareholders and industry experts alike. more

Increasing the Strength of the Zone Signing Key for the Root Zone, Part 2

A few months ago I published a blog post about Verisign's plans to increase the strength of the Zone Signing Key (ZSK) for the root zone. I'm pleased to provide this update that we have started the process to pre-publish a 2048-bit ZSK in the root zone for the first time on Sept. 20. Following that, we will publish root zones with the larger key on Oct. 1, 2016. more

Making the Most of the Cloud: Four Top Tips

Cloud computing is on the rise. International Data Corp. predicts a $195 billion future for public cloud services in just four years. That total is for worldwide spending in 2020 - more than twice the projection for 2016 spending ($96.5 billion). As a result, companies are flocking to both large-scale and niche providers to empower cloud adoption and increase IT efficacy. The problem? Without proper management and oversight, cloud solutions can end up underperforming, hampering IT growth or limiting ROI. more

The Great Telco Quality Transformation

The telecoms industry has two fundamental issues whose resolution is a multi-decade business and technology transformation effort. This re-engineering programme turns the current "quantities with quality" model into a "quantities of quality" one. Those who prosper will have to overcome a powerfully entrenched incumbent "bandwidth" paradigm, whereby incentives are initially strongly against investing in the inevitable and irresistible future. more

SEO and New dot Brand gTLDs

According to a recent study carried out by Custora in the USA, search engines -- paid and organic -- represent close to 50% of e-commerce orders, compared to 20% for direct entry. A dot brand domain has the potential to boost direct entry, as it can be more memorable than traditional domains. Can dot brand domains also be part of a consistent search engine strategy? more

Filing Cybersquatting Complaints With No Actionable Claims

I noted in last week's essay three kinds of cybersquatting complaints typically filed under ICANN'S Uniform Domain Name Dispute Resolution Policy (UDRP). The third (utterly meritless) kind are also filed in federal court under the Anticybersquatting Consumer Protection Act (ACPA). While sanctions for reverse domain name hijacking are available in both regimes, the UDRP's is toothless and the ACPA's a potent remedy. more

Observation from Seminar on IANA Function Stewardship Transition Held by CAICT

On August 16 of 2016, the US Government announced its intention to transit the stewardship of the Internet Assigned Numbers Authority (IANA) function to the multistakeholder community upon the expiration of the IANA function Contract as of October 1 of 2016, barring any significant impediment... This announcement attracts the close attention of Internet community around the world and also in China. more

Moving to the Cloud? 10 Key Questions for CIOs

Companies are moving to the cloud. According to Cloud Tech, CIOs are on the front lines: In 72 percent of companies surveyed, chief information officers lead the cloud computing charge. However, adoption without the right information is doomed to fail - here are 10 key questions CIOs should ask before moving operations to the cloud... First, it's critical to identify business benefits. Here the key to success lies in specifics rather than generalities... more

Topics

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

Threat Intelligence

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days