There is an intrinsic value proposition to new gTLDs. They mean to give users fresh naming possibilities and provide more meaningful Internet addresses. And to do so at much reduced prices. Reduced prices? Really? This is where eyebrows start being raised. How so? Well before the advent of new gTLDs, few suffixes offered any real ability to differentiate. Users thus looked to the second level, not the top level, for a way to get their web addresses to stand out from the crowd. So began a vicious circle of value going to the limited number of meaningful second level names since at TLD level, the only string with any real equity was .COM. more
Social Science Research Network has published a paper examining "the large gaps and inconsistencies in current domain name law and policy" as compared with domain name use in the political context. The paper suggests that the current domain name policy is focused on protecting trademark uses of domain names against bad faith commercial 'cybersquatters' but does not deal with protecting use of domain names as part of the political process. more
VeriSign is reporting that over 112M domains have been registered as of the end of Q3 2006. A record number of domain names are now registered, at 112 million, which is 30% higher than just one year ago and 6% higher than the previous quarter. The five largest TLDs remain .com, .de (Germany), .net, .uk (Britain), and .org... more
To date, end-users (of all levels of technical ability) who are trying to find a good domain name to establish an online identity have been endlessly frustrated by the lack of a method to fairly re-allocate "used" domain names. A full resolution to that problem is a separate (and much bigger) discussion... more
After they finished the tenth installment of their enormous multi-volume history, The Story of Civilization, Will and Ariel Durant wrote a set of thirteen essays entitled The Lessons of History. I happened to pick up this volume yesterday; it's both slim and sweeping. The Durants loved history, and wanted to show their readership what waves and tensions and trends they perceived. It's not a great book, but it's an undeniably forceful one. One essay discusses the essential moral characteristics of individuals, listing six traits and providing "positive" and "negative" descriptions of ways in which people act. more
For those who don't know, there are typically 3 methods of resolving contention sets in the new gTLD world... Given that Google is a portfolio applicant of over 100 gTLDs why did it elect to go for an ICANN Auction and make all details of the auction public? Disclosure of the winning bid by Google certainly makes a statement, it's very newsworthy, but does it serve Google's purposes, since it is in other contention sets for some popular strings and a bar has been set? more
Having eBay has worked out pretty well for the world at large; now it's time for the world of domain names to start using it. We need to throw away the jumble of different auctions and dealer sites. Speculators may not like having their haunts cleaned out, but corporate (end-user) buyers and investors will welcome the chance to deal with one centralized auction mechanism with one set of rules. more
On November 1, 2014, the new European Commission started its work. One of the priorities of its new president, Jean Claude Juncker, is the digital agenda. The European Union wants to be a leader in the Internet world of tomorrow. Vice President Andrus Ansip from Estonia (some people spell the country name "e-stonia") and Commissioner Günter Oettinger from Germany will have special responsibilities to implement the big plans. Juncker was elected by the European Parliament, although the green light for his nomination came from the European Council. more
The ability to rank results according to the level of threat they pose (based on factors such as, for example, the extent to which a webpage relates to a brand of interest) is a key component of many brand protection services. The prioritisation process has a number of purposes, including the identification of: (a) priority targets for further analysis; (b) candidates for content tracking (i.e. regular reinspection of content or configuration, and the generation of an alert if high-concern findings are identified) - as may be appropriate in cases where a domain name presents a high potential level of risk but is not currently associated with any live site content; and (c) priority targets for enforcement actions. more
A recent story today about discussions for an official defense Botnet in the USA prompted me to post a question I've been asking for the last year. Are some of the world's botnets secretly run by intelligence agencies, and if not, why not? Some estimates suggest that up to 1/3 of PCs are secretly part of a botnet. The main use of botnets is sending spam, but they are also used for DDOS extortion attacks and presumably other nasty things like identity theft. But consider this... more
One big story of the day was Facebook's new and improved terms of service which this Consumerist post flagged and which set off a firestorm of controversy... What Was Facebook's Mistake? Facebook could have avoided much of the controversy by providing its users some advance notice of the upcoming changes. more
For some time now I have contended that Confirmed Opt-in, 'COI' is dead, or at the very least on life support. It certainly is not a major factor in the continued relation between sender and receiver; that relies far more heavily on the ongoing and historical reputation of the mailer and the mail stream. Proof of permission doesn't scale; end-users complain all the time, but it is rare if not impossible for a receiving site to request proof when an end-user complains, then the receiver complains to the sender, and the sender says that permission was actually in place. Much more commonly, the sender unsubscribes the address and moves on, permission or not, since the subscriber doesn't want the mail any more. But then, I recently had two eye-opening experiences... more
Last Saturday marked the 53rd anniversary of the Internet. While the vast majority of its five billion users have been online for less than a decade, the Internet was taken into use on October 29th, 1969, when two computers connected to the ARPANET exchanged a message. Although the Internet has been around for a while, it remained below most people's radar until the late 1990s when the dot com boom started. more
The FCC is looking for an organization to provide free, slow, and censored Internet access. The censorship apparently would include email as well as websites. According to an article in today's Wall Street Journal: "Outgoing Federal Communications Commission Chairman Kevin Martin is pushing for action in December on a plan to offer free, pornography-free wireless Internet service to all Americans, despite objections from the wireless industry and some consumer groups [nb. and from me]... The winning bidder would be required to set aside a quarter of the airwaves for a free Internet service [nb. the WSJ hasn't got that part quite right]." more
The MOU between the Department of Commerce and ICANN includes a series of specific milestones that the corporation is required to accomplish by certain specified dates. One of the specific requirements placed on ICANN by the agency is to define "a predictable strategy for selecting new TLDs using straightforward, transparent, and objective procedures that preserve the stability of the Internet...." The MOU goes on to state that "(strategy development to be completed by September 30, 2004 and implementation to commence by December 31, 2004)." more
Sponsored byRadix
Sponsored byWhoisXML API
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byCSC
Sponsored byVerisign