Featured Blogs

Latest

How Tiered Internet Pricing Could Actually Facilitate P2P

Time Warner Cable's planned experiment with tiered charging for Internet access has generated a flurry of coverage in the blogsphere, but no new insights (at least that I've seen). The primary problem ISP's complain about is that 5% of their customers use 90% of the available bandwidth and when they examine this traffic, it's mostly peer-to-peer file sharing... more

The Single-Letter Domain Trademark Game

Patent practitioners are familiar with the long-honored practice of engaging in standards-setting activities with the aim of having the standard ultimately require the use of one's proprietary technology. This practice is no longer limited to patents, but has become the game the whole family can play. While most standards-setting organizations have caught on, and have implemented IP disclosure policies, ICANN has not done so... As some are aware, the question of making single-character domain names available has been a perennial topic of discussion within ICANN, championed by a few who have quietly been engaged in some interesting advocacy within the USPTO along a parallel track. more

Google Playing to Win in the 700 MHz Auctions

Many say Google will bid to lose in the upcoming 700 MHz auctions and many more are equivocating. The idea is Google's entry alone will induce enough openness, and besides they couldn't afford to become an operator. This shows a total lack of understanding! more

12 Common Mistakes Made By Bad Faith Cybersquatters

Some cybersquatters register domains in bad faith as part of a business plan to monetize domains by leveraging famous trademarks and high-traffic web sites. Some cybersquatters just don't understand the law. In this this tongue-in-cheek post, we provide a real world case study of the most common mistakes made by cybersquatters when registering trademark protected domains in bad faith. more

Internet Access and the Missing Institutional Design

It's Friday, a day to tie some threads together. There were three announcements/events this week that are connected in a non-obvious way... These three elements go together in creating a picture of US policy towards Internet access at the beginning of 2008. Rather than seeing the Internet as an engine for economic growth, creativity, innovation, and new jobs -- and as the converged communications medium for the next generation -- current policy is to wait for private companies to decide when investment in access makes sense for them. Those private companies have plenty of incentives to shape access to suit their own business plans. more

Examining Actual State of IPv6 Deployment

There have been quite a number of recent articles about various IPv6 issues. Thus the question: how far along is the actual IPv6 deployment? This is a quick-and-dirty survey that focuses mainly on the content provider side. What domains were surveyed? Alexa offers country depended TopSites listings. Domains listed are frequently visited by users from that country, not necessarily hosted there... more

The Network Management Excuse

Telco front-man Scott Cleland, in a recent blog post, thumbs his nose at the Four Internet Freedoms and says that the FCC should too. Under current leadership, it probably will. Referring to the recent submissions to the FCC by Free Press and Public Knowledge and Vuze complaining about Comcast's use of reset packets to block applications that compete with Comcast's own proprietary video entertainment offering, Cleland says "Network management trumps net neutrality." There are lots of reasons for, ahem, managing. Cleland neglects to observe that controlling congestion the way Comcast does it is like scattering nails in the road for traffic control. more

North Dakota Judge Gets it Wrong

Ever been prosecuted for tracking spam? Running a traceroute? Doing a zone transfer? Asking a public internet server for public information that it is configured to provide upon demand? No? Well, David Ritz has. And amazingly, he lost the case. Here are just a few of the gems that the court has the audacity to call "conclusions of law." Read them while you go donate to David's legal defense fund... more

Ralsky Indicted, CAN-SPAM is Still Useless

Well, I read the indictment (available here from Spamhaus.) It's a long litany of criminal behavior, primarily pump and dump stock fraud of a long list of penny stocks from the US and China. Ralsky is described as the "chief executive officer and overall leader" of the scheme... The thing that strikes me about this indictment is that although it includes a lot of CAN SPAM charges, everything Ralsky and Co. did was already illegal under conventional fraud and computer tampering laws. more

Luxembourg to Offer Investor-friendly Legal Environment for Domain Names

EuroDNS, the Luxembourg registrar, used its well attended New Year party last Wednesday to invite the Minister of Telecoms, Jean-louis Schiltz to talk about a law voted at the end of December 2007. According to the Finance and Budget Commission Report on Draft Law 5801, Revenues generated from use of, or license to use, a Domain Name are exempted from Luxembourg corporate taxes up to 80%. more

Google as a Real-time Blackhole List

For those not familiar with RBL, the term means Real-time Blackhole List, it is mainly used for SPAM fighting. I have recently started playing around with Google as an RBL engine, the idea is that if the search term I use hits too many hits it is likely to be SPAM. The danger of course is that the term could be simply popular -- but the trick here is that I'm using something very special as the search term -- the IP address of the poster. more

Internet Governance: The Issue, The Myths, The Problems, The Solutions

I have written a short paper on the topic of Internet Governance. Since it includes a number of resources, it would be easier for me to just point to a link with the document itself. Below are some selected excerpts from the document. "Several myths have been spreading around the World Summit on the Information Society (WSIS), but especially after the first Internet Governance Forum (IGF): The critical Internet resources (CIR) consist only of the IP addresses and the domain name system... There are only 13 root servers..." more

Domain Front Running by Registrars Continues to Draw Attention

In response to accusations lodged yesterday in a post on the DomainState forum, NSI has issued a statement which essentially admits that it engages in a form of domain front running. No one has challenged domain Front Running by registrars in the courts, likely because the practice is new and since the loss of a single domain would not typically generate a level of damages to support litigation. But litigation over this arguably fraudulent domain practice by registrars is both viable and likely inevitable... more

Network Solutions Responds to Front Running Accusations

Following a post on the DomainState forum today, a number news and blogs have criticized Network Solutions for front running domain names that customers try to register. (See for instance today's report on DomainNameNews). Jonathon Nevett, Vice President of Policy at Network Solutions, has offered the following in response to the news break... more

Up to 300 Megawatt Worth of Keepalive Messages to be Saved by IPv6?

The Time Square Ball bringing in 2008 had more than 9,500 LED bulbs displaying 16 million colours while consuming power equivalent to about ten toasters. This compares to 600 incandescent and halogen bulbs adorning last year's Ball. Easy to forget that most mobile devices used by Time Square revelers were behind IPv4 NAT's and that always on applications such as Instant Messaging, Push e-mail, VoIP or location based services tend to be electricity guzzlers. It so happens that applications that we want always to be reachable have to keep sending periodic keepalive messages to keep the NAT state active... more

Topics

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

Threat Intelligence

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days