Featured Blogs

Latest

Thinking Carefully About New gTLD Objections: String Confusion (Part 1 of 4)

Since speaking last fall on community-based TLDs at the New gTLD Summit in Los Angeles, I have been asked a number of times to provide input on the objections ICANN allows in its New gTLD Applicant Guidebook ("AGB" or simply the "Guidebook"). As the March 13 deadline approaches, I now present the first of a series of four spotlight articles on the subject -- one on each of the four permissible grounds for objection. more

Compliance Overhaul a NON-Start

Happy New Year, you're fired. While most of us were getting ready celebrate respective holidays, ICANN was quietly closing a critical office and sending all the staff out to look for new jobs. When asked to confirm this, ICANN's delayed response was pure Orwellian Doublethink. The office was closed because ICANN is "assessing how to effectively grow ICANN resources around the globe." How does one grow global resources while shutting down the Asia-Pacific office right before the Asia-Pacific meeting? more

ICANN CEO’s Admissions That ICANN Is Not Ready For New gTLDs Should Concern Everyone

ICANN CEO Fadi Chehade gave an alarming assessment of the state of the New gTLD program... It was admirable for Mr. Chehade to stand up and talk frankly about the state of the New gTLD program. It is important for everyone going through the process of applying for a New gTLD to understand the constraints and limitations that ICANN is dealing with as it tries to implement the program, as well as the wider Internet community that will be affected by the new extensions. more

Reducing the Risks of BYOD with DNS-Based Security Intelligence; Part 2: Taking Control

In part 1, I talked about some of the risks associated with BYOD. But there are actions you can take to greatly reduce this risk. One effective method for limiting the risk of BYOD is to employ DNS-based security intelligence techniques. DNS-based security intelligence makes use of an enterprise's caching DNS server to monitor and block DNS queries to known botnet command and control (C&C) domains. more

Maslow’s Hammer Meets the Software Defined Data Center

In my previous post, I talked about the significance of DNS in connection with the Software Defined Data Center (SDDC) and Software Defined Networking. Although the second generation DNS provisioning model I outlined should have seemed straight-forward enough, in real life it is anything but. In my view, the real-world complications of a seemingly trivial issue are largely related to how the network industry approaches IP addressing. more

Preparing for the Launch of the Trademark Clearinghouse

With the Trademark Clearinghouse (TMCH) expected to begin accepting submissions within the next month or so, many companies are now attempting to identify marks for inclusion. As a reminder, the TMCH is a centralized repository of validated rights which will be used in support of ICANN's New gTLD Program. Submissions to the TMCH enable brand owners to register their trademarks as domain names during so-called Sunrise Periods. more

Marketing Activities for New TLDs That Can Start Right Now

Sitting on the plane after a tightly packed 3 days in Amsterdam for the regional registrars meeting, I'm bursting with ideas and thoughts. The highlight of the event for me was the meeting organized by Google to propose the creation of a trade association on behalf of TLDs. Brilliant and long overdue. The comedy of the situation the domain name industry has lived with since its inception is the fact that it actually doesn't exist in the eyes and minds of the average business or consumer. Domain names are simply a by-product of websites, or possibly even web-hosting.  more

Pandora’s Box - New US Cyber Security Bills Create a Worm Hole in the Internet Galaxy

There are two Bills that are floating through the corridors of power on the Hill that could potentially change the course of civil and political rights within the United States and the world. One was introduced through the House of Representatives and the other through the Senate. The two Bills touch on a common thread that are premised on "national security" however there are interesting challenges that will surface should the Bills be passed that affect global public interest that require further examination, introspection and discussion. more

Dial “L” for Liability - Sec. 230 Protects Online Service for Errant Phone Number

The Communications Decency Act has been described as the greatest Internet law. The first major Internet law designed to censor the Internet actually enabled the interactive Internet. While the censorship provisions of the Communications Decency Act went down in unanimous supreme court flames, a separate provision remains standing. The Good Samaritan provision of the CDA (47 U.S.C. § 230) declared that networks and online services are not publishers and therefore are not liable for the content of third parties. more

ICANN Should Clarify Position On Key Word New TLDs

Back in September a number of domain name industry leaders wrote to ICANN to express deep-felt concerns about some companies' declared plans for generic domain name extensions. We have sent ICANN another letter this week which is also planned to be distributed in a press release included here in this post. more

Opportunity Missed: Hilton Checks-Out of New Domains Boom

American author Mark Twain once wrote: "I was seldom able to see an opportunity until it had ceased to be one." Last month we learned that Hilton Hotels & Resorts joined six other new Top-Level Domain applicants in withdrawing their application and exiting the program. I was disappointed when I first heard the news. My initial thoughts were centred on the enormous potential .hilton offered the company and the innovative business opportunities they were now abandoning. more

Cuba Switches on Subsea Cable for Traffic

Cuba has had a troubled history with internet connectivity via submarine cables. The Key West-Havana cable was retired in late 1989, having deteriorated to the point where it was too costly and troublesome to operate. AT&T replaced it with a new cable but the embargo imposed by the US government, compounded by the difficulty in reaching business agreements, meant that the cable remained idle before it too was retired , in 2001. Subsequently, all international traffic has been channelled through a network of satellites. more

Benefits of DNS Based Architecture for M2M Communications

The number of 'things' connected to the internet is already bypassing the number of people on the planet. This Internet of 'things' is changing the way we live and work: from the way food is grown and produced on farms through automated temperature and feeding controls, to the way we check prices and buy through connected terminals, to the vehicles we drive, the security cameras at work, and automated gates at the entrance. Connected 'things' are everywhere. All these 'things' are helping us to be more productive and efficient while also offering more and more convenience. more

Reducing the Risks of BYOD with DNS-Based Security Intelligence; Part 1: Understanding the Risks

Ah, BYOD. How I love thee. BYOD, or "Bring Your Own Device", gives me choices. I can use a device at work I actually like and am most effective with. (How did I ever get by without my iPad?) But BYOD comes with challenges. Personal devices can be infected with malware. Once they're connected to an enterprise's network, they can be controlled by a bot master to hijack enterprise resources and wreak havoc as part of a botnet. more

Much Ado About WCIT-12 and Multi-Stakeholderism

In the last month of last year, the World Conference on International Telecommunications (WCIT-12) ended in Dubai amid, not hugs and fanfare, but finger-pointing and acrimony. The end, much anticipated as it was, wasn't the finest hour for international cooperation for the global public interest. Looking back, one would be forgiven to conclude that the WCIT-12 was doomed to fail. more

Topics

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

Threat Intelligence

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days