Featured Blogs

Latest

Maslow’s Hammer Meets the Software Defined Data Center

In my previous post, I talked about the significance of DNS in connection with the Software Defined Data Center (SDDC) and Software Defined Networking. Although the second generation DNS provisioning model I outlined should have seemed straight-forward enough, in real life it is anything but. In my view, the real-world complications of a seemingly trivial issue are largely related to how the network industry approaches IP addressing. more

Preparing for the Launch of the Trademark Clearinghouse

With the Trademark Clearinghouse (TMCH) expected to begin accepting submissions within the next month or so, many companies are now attempting to identify marks for inclusion. As a reminder, the TMCH is a centralized repository of validated rights which will be used in support of ICANN's New gTLD Program. Submissions to the TMCH enable brand owners to register their trademarks as domain names during so-called Sunrise Periods. more

Marketing Activities for New TLDs That Can Start Right Now

Sitting on the plane after a tightly packed 3 days in Amsterdam for the regional registrars meeting, I'm bursting with ideas and thoughts. The highlight of the event for me was the meeting organized by Google to propose the creation of a trade association on behalf of TLDs. Brilliant and long overdue. The comedy of the situation the domain name industry has lived with since its inception is the fact that it actually doesn't exist in the eyes and minds of the average business or consumer. Domain names are simply a by-product of websites, or possibly even web-hosting.  more

Pandora’s Box - New US Cyber Security Bills Create a Worm Hole in the Internet Galaxy

There are two Bills that are floating through the corridors of power on the Hill that could potentially change the course of civil and political rights within the United States and the world. One was introduced through the House of Representatives and the other through the Senate. The two Bills touch on a common thread that are premised on "national security" however there are interesting challenges that will surface should the Bills be passed that affect global public interest that require further examination, introspection and discussion. more

Dial “L” for Liability - Sec. 230 Protects Online Service for Errant Phone Number

The Communications Decency Act has been described as the greatest Internet law. The first major Internet law designed to censor the Internet actually enabled the interactive Internet. While the censorship provisions of the Communications Decency Act went down in unanimous supreme court flames, a separate provision remains standing. The Good Samaritan provision of the CDA (47 U.S.C. § 230) declared that networks and online services are not publishers and therefore are not liable for the content of third parties. more

ICANN Should Clarify Position On Key Word New TLDs

Back in September a number of domain name industry leaders wrote to ICANN to express deep-felt concerns about some companies' declared plans for generic domain name extensions. We have sent ICANN another letter this week which is also planned to be distributed in a press release included here in this post. more

Opportunity Missed: Hilton Checks-Out of New Domains Boom

American author Mark Twain once wrote: "I was seldom able to see an opportunity until it had ceased to be one." Last month we learned that Hilton Hotels & Resorts joined six other new Top-Level Domain applicants in withdrawing their application and exiting the program. I was disappointed when I first heard the news. My initial thoughts were centred on the enormous potential .hilton offered the company and the innovative business opportunities they were now abandoning. more

Cuba Switches on Subsea Cable for Traffic

Cuba has had a troubled history with internet connectivity via submarine cables. The Key West-Havana cable was retired in late 1989, having deteriorated to the point where it was too costly and troublesome to operate. AT&T replaced it with a new cable but the embargo imposed by the US government, compounded by the difficulty in reaching business agreements, meant that the cable remained idle before it too was retired , in 2001. Subsequently, all international traffic has been channelled through a network of satellites. more

Benefits of DNS Based Architecture for M2M Communications

The number of 'things' connected to the internet is already bypassing the number of people on the planet. This Internet of 'things' is changing the way we live and work: from the way food is grown and produced on farms through automated temperature and feeding controls, to the way we check prices and buy through connected terminals, to the vehicles we drive, the security cameras at work, and automated gates at the entrance. Connected 'things' are everywhere. All these 'things' are helping us to be more productive and efficient while also offering more and more convenience. more

Reducing the Risks of BYOD with DNS-Based Security Intelligence; Part 1: Understanding the Risks

Ah, BYOD. How I love thee. BYOD, or "Bring Your Own Device", gives me choices. I can use a device at work I actually like and am most effective with. (How did I ever get by without my iPad?) But BYOD comes with challenges. Personal devices can be infected with malware. Once they're connected to an enterprise's network, they can be controlled by a bot master to hijack enterprise resources and wreak havoc as part of a botnet. more

Much Ado About WCIT-12 and Multi-Stakeholderism

In the last month of last year, the World Conference on International Telecommunications (WCIT-12) ended in Dubai amid, not hugs and fanfare, but finger-pointing and acrimony. The end, much anticipated as it was, wasn't the finest hour for international cooperation for the global public interest. Looking back, one would be forgiven to conclude that the WCIT-12 was doomed to fail. more

Trademark Clearinghouse Debate is Not About the Trademark Clearinghouse!

A comment period on the "strawman", a proposal to update the Trademark Clearinghouse (TMCH), is currently underway. Originally planned to end on January 11, it has been extended by ICANN to February 5. The comment portal has so far received 89 email contributions. A fair number, but the real story is how many major brands have spoken out on the proposed amendments to the TMCH model. more

Contention Is Best Settled by Those Who Know the Players & Industry

Several posts have been made on the topic of contention resolution and private auctions around the new gTLD program over the last few weeks on CircleID. Many of the Applicants we spoke to thought it was appropriate to weigh in from the RightoftheDot.com perspective. We want you to know that the RightOfTheDot auction offering for contention resolution for new gTLD's, unlike other offerings, remains unchanged from when it was first announced to the Domain Industry. more

Beyond Smart Cards and Guns in Schools

On January 8, 2013, a Judge from the United States District Court in Texas ruled against a high school sophomore's refusal to wear a smart identity card embedded with a radio frequency chip which is part of the school's smart ID card student locator project. The Judgment show the Testimonies of Superintendent and the Principal in stating that the sensors do not give exact readings nor are they able to pinpoint the exact location of the students. more

The Incredible Leakyness of Commercial Mailers

Acronis is a company that sells backup software. They have been around for over a decade, and have lots of big respectable customers. The Wall Street Journal is the nation's leading business newspaper. Equifax is one of the big three national credit bureaus. Shelfari is a book interest web site owned by Amazon. The Economist is a globally influential newsweekly. Airliners.net is a popular photosharing site for airplane enthusiasts. What do they have in common? more

Topics

Domain Names

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days