Featured Blogs

Latest

ICANN’s Governance Conundrum

After reading Steve Delbianco's recent CircleID article entitled The Tale of Two Governance Models I was torn. On one hand I agreed and supported Steve's comments about the strength of the bottom-up consensus driven model upon which ICANN was originally founded. As I am about to begin my thirty fifth ICANN regional meeting over the last eleven years, it is a model which I still believe in and fiercely fight to defend. However, on the other hand I look back over the last eleven years... more

Do-Not-Track: Still Not a Great Idea

Back in August, FTC chair Jon Leibowitz suggested an Internet do-not-track registry, analogous to the telephone do-not-call registry. At the time, I thought it wasn't a good idea for both technical and non-technical reasons. This week, the FTC published an online privacy report recommending the same thing, and Rep. Ed Markey promises to offer a bill next year to mandate do-not-track for children. With all this interest, might it be a good idea now? Maybe. more

Two Years Later Dozens of Registrars Still in the Shadows

In June of 2008 KnujOn reported that 70 Registrars did not have a business address listed in the InterNIC Registrar Directory. Only after reporting a month later that little had changed did ICANN perform a mass update of the directory. On further inspection we found many of the newly disclosed addresses were phantom locations, false addresses, and PO boxes. more

WikiLeaks and Stuxnet - Smart Grid Wakeup Calls

The past couple of weeks have been pretty seminal for anyone concerned about the state of Internet security and the bigger picture as to how much we could - do - and should - trust the Web. These two strange words - WikiLeaks and Stuxnet - have suddenly entered our lexicon and there is a lot to be concerned about in the world of smart grid. more

US Government Waves the Caution Flag at ICANN

This month, ICANN is driving hard to get two of its horses to the finish line. The first is barely a year old - it's the first formal review of ICANN's accountability and transparency. The second horse is going on 4 years old: ICANN's plan to introduce hundreds of new top-level domains (TLDs) for the Internet. Just as these horses have entered the home stretch, one of the racecourse officials is vigorously waving the yellow caution flag. And ICANN would do well to pull back on the reins. more

Wildcarding Subdomains Is OK; Reverse Domain Name Hijacking Isn’t - Goforit v. Digimedia

This is a super-interesting dispute involving two not-so-interesting litigants. The plaintiff Goforit runs a type of meta-search engine at goforit.com. After spending 5 minutes at the site, I couldn't identify a single reason why anyone would want to use it. Also inexplicably, Goforit appears to be quite pleased with its trademark rights in "Goforit," a term that seems more like an exhortation than a trademark. more

How to Discredit Net Neutrality

On Tuesday (November 30) Internet backbone provider Level3 publicly accused cable-based ISP Comcast of trying to thwart competing video services delivered through the internet. Comcast was, according to Level3, suddenly choosing to charge it more because of its carriage of Netflix traffic. The accusation was consciously framed to raise net neutrality alarms. It appeared as if a cable TV giant was using its control of internet access to make access to a competing, over the top video service more expensive... Then the full story came out. more

Legal Threats Should Not Diminish ICANN’s Resolve

Guidebook for all interested parties. The best way to start this process would be to give conditional approval to the proposed final AGB next week. This may in fact involve acquiescing to the specific requests placed before it by litigious special interests, but those requests should be granted because they are reasonable and in the best interests of the program and its participants and stakeholders, not because ICANN feels it has to cave at the first sign of a gTLD opponent lawyering up. more

Remembering the Good Times

The most effective early email-borne viruses didn't need botnets. They didn't change your computer settings, or steal your login credentials. And they somehow convinced regular users to help them spread. The first warnings about the Good Times virus began to appear in November of 1994, and by December the warnings were seen all over as people did what the warning said, and forwarded it to all their friends. There was another outbreak the following March... more

The Ultimate Differentiator: Reliability!

Every company that monitors their site or application performance focuses on two key metrics Availability and Speed. However, there is a third metric, Reliability, which is often misunderstood or in some cases ignored by companies. Reliability measures availability, accuracy, and delivery of a service within a time threshold. Reliability is difficult to define and measure as it is different for each company and service. To simplify it, you can think of Reliability as how consistent are you in delivering the "service". more

Rings of Fire

Rightfully, Olympic is a very sacred word and a very pure concept for the Olympic Committee as they have protected this brand and all of its related intellectual property components at every instance for about hundred years. However, the word Olympic as a name is geographic based on Mount Olympus and over the many centuries belonging to the public domain. ... Dot-Olympic ideally should belong to the Olympic committee, if they so desire, but in a contest or any other situation the ownership of this name would simply become a question of going after a diluted geography based public domain name. more

The Perfect, the Good, and the FCC

It has been a busy week in U.S. communications policy, with an FCC meeting adopting important spectrum policy reforms, an FCC complaint about Comcast's approval policies for cable modems, and a dispute between Comcast and Level 3 over fees for Internet backbone traffic. And late last night, it got even more interesting. more

Is It Time for Social Networks to Adopt Some Trademark Protection?

The headlines this week say that over 200 million domain names now exist on the internet. Pretty impressive... But consider the explosive growth of Social Networks. The top twenty social networks alone have over 2 billion user names. With User Names on social networks rapidly becoming the Internet's new brand identifiers, I wonder: is it time that we apply the same trademark rules we have for domain names to user names as well? more

Nominet/SOCA Cyber Crime Proposal: Allow Cross Border Reactions

Reading the policy proposal of Nominet, I get the feeling that something is overseen here. Putting all the jurisdictional hassle aside for a moment, cyber crime is international, cross-border. So what happens if a UK domain is used for criminal activity outside the UK only? more

Committed or Condemned? The Words Matter

A number of people have reported on the International Telecommunications Union's (ITU) Plenipotentiary in Guadalajara. Indeed even the Secretary of the ITU Hamadoun TourĂ© felt the need to comment, saying: "The ITU does not have the intention to take over the Internet. We are condemned to live together, so the question is whether we manage that well or not." A very firm statement - but it needs to be. Many still fear that the ITU is waiting for a moment of inattention by business and the Internet community and that it will pounce and attempt to place itself in a position of control. more

Topics

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days