Featured Blogs

Latest

Wildcarding Subdomains Is OK; Reverse Domain Name Hijacking Isn’t - Goforit v. Digimedia

This is a super-interesting dispute involving two not-so-interesting litigants. The plaintiff Goforit runs a type of meta-search engine at goforit.com. After spending 5 minutes at the site, I couldn't identify a single reason why anyone would want to use it. Also inexplicably, Goforit appears to be quite pleased with its trademark rights in "Goforit," a term that seems more like an exhortation than a trademark. more

How to Discredit Net Neutrality

On Tuesday (November 30) Internet backbone provider Level3 publicly accused cable-based ISP Comcast of trying to thwart competing video services delivered through the internet. Comcast was, according to Level3, suddenly choosing to charge it more because of its carriage of Netflix traffic. The accusation was consciously framed to raise net neutrality alarms. It appeared as if a cable TV giant was using its control of internet access to make access to a competing, over the top video service more expensive... Then the full story came out. more

Legal Threats Should Not Diminish ICANN’s Resolve

Guidebook for all interested parties. The best way to start this process would be to give conditional approval to the proposed final AGB next week. This may in fact involve acquiescing to the specific requests placed before it by litigious special interests, but those requests should be granted because they are reasonable and in the best interests of the program and its participants and stakeholders, not because ICANN feels it has to cave at the first sign of a gTLD opponent lawyering up. more

Remembering the Good Times

The most effective early email-borne viruses didn't need botnets. They didn't change your computer settings, or steal your login credentials. And they somehow convinced regular users to help them spread. The first warnings about the Good Times virus began to appear in November of 1994, and by December the warnings were seen all over as people did what the warning said, and forwarded it to all their friends. There was another outbreak the following March... more

The Ultimate Differentiator: Reliability!

Every company that monitors their site or application performance focuses on two key metrics Availability and Speed. However, there is a third metric, Reliability, which is often misunderstood or in some cases ignored by companies. Reliability measures availability, accuracy, and delivery of a service within a time threshold. Reliability is difficult to define and measure as it is different for each company and service. To simplify it, you can think of Reliability as how consistent are you in delivering the "service". more

Rings of Fire

Rightfully, Olympic is a very sacred word and a very pure concept for the Olympic Committee as they have protected this brand and all of its related intellectual property components at every instance for about hundred years. However, the word Olympic as a name is geographic based on Mount Olympus and over the many centuries belonging to the public domain. ... Dot-Olympic ideally should belong to the Olympic committee, if they so desire, but in a contest or any other situation the ownership of this name would simply become a question of going after a diluted geography based public domain name. more

The Perfect, the Good, and the FCC

It has been a busy week in U.S. communications policy, with an FCC meeting adopting important spectrum policy reforms, an FCC complaint about Comcast's approval policies for cable modems, and a dispute between Comcast and Level 3 over fees for Internet backbone traffic. And late last night, it got even more interesting. more

Is It Time for Social Networks to Adopt Some Trademark Protection?

The headlines this week say that over 200 million domain names now exist on the internet. Pretty impressive... But consider the explosive growth of Social Networks. The top twenty social networks alone have over 2 billion user names. With User Names on social networks rapidly becoming the Internet's new brand identifiers, I wonder: is it time that we apply the same trademark rules we have for domain names to user names as well? more

Nominet/SOCA Cyber Crime Proposal: Allow Cross Border Reactions

Reading the policy proposal of Nominet, I get the feeling that something is overseen here. Putting all the jurisdictional hassle aside for a moment, cyber crime is international, cross-border. So what happens if a UK domain is used for criminal activity outside the UK only? more

Committed or Condemned? The Words Matter

A number of people have reported on the International Telecommunications Union's (ITU) Plenipotentiary in Guadalajara. Indeed even the Secretary of the ITU Hamadoun TourĂ© felt the need to comment, saying: "The ITU does not have the intention to take over the Internet. We are condemned to live together, so the question is whether we manage that well or not." A very firm statement - but it needs to be. Many still fear that the ITU is waiting for a moment of inattention by business and the Internet community and that it will pounce and attempt to place itself in a position of control. more

A Tale of Two Governance Models

As many of us in the Internet community gear up for the ICANN meeting in Colombia next week, it's important to remember that not everybody embraces the multi-stakeholder approach that we've gradually learned to love. Just a month ago, a group with a very different vision of how to run things wrapped up their own Internet governance meeting in Latin America. Their meeting was three times as long and accomplished about a third as much, but they'd still like to see their model replace the ICANN model. more

The Threat from Within - US v. Fowler, SDFL 2010

The security vendor-phobe at the head of the conference bangs on the podium with his shoe declaring that "The greatest threat comes from within! (buy our product for your network's salvation)." Fear as a marketing strategy can never be underestimated. Particular when the fear is of the misunderstood. Media helps stoke the flames of fear-marketing with stories of fired or disgruntled IT staff who reportedly effectuate their revenge on former employers by bricking systems. more

Is Bulgarian Cyrillic .?? (.bg) Really Similar to Other Latin ccTLDs?

Bulgaria has proposed for an Internationalized Domain Name (IDN) ccTLD string .?? (Cyrillic for .bg, or U+0431 U+0433), but the proposal was turned down by the ICANN DNS Stability panel in May 2010 without any arguments or an option for appeal. The proposed string is composed of two characters... more

ACMA: 30,000 PC’s Infected in Australia Per Day

Anti-spam and malware enforcement agency ACMA reports on this (shocking high?) figure. Keep this up and ca. 50% of the Australian population is infected within a year. I remember a presentation from Sweden only a few years ago, that there were only a little over a thousand infected pc's in Sweden. (Reactions were: that can't be correct. Too low) Do you know what the numbers are for your country and maybe more importantly what your government and/or Industry is/are doing about it? more

Bad Timing: Comcast, Netflix, NN, Cable Modems, and NBCU

Comcast, the largest broadband provider, largest pay-TV company, and third-largest telephone company in the country, distributes communications services to more than a third of the country. Today Comcast's existing overwhelming market power was on display in major public battles with (1) Level 3 and (2) cable modem manufacturer Zoom. The takeaway from today: No market forces are constraining Comcast -- or any of the other major cable distributors, none of which compete with each other. more

Topics

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

Threat Intelligence

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days