Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

How Hard Is It to Deploy DKIM?

It's coming up on two years since the DomainKeys Identified Mail (DKIM) standard was published. While we're seeing a certain amount of signed mail from Google, Paypal, and ESPs, there's still a long way to go. How hard is it to sign your mail with DKIM? The major hurdle might seem to be getting mail software that can sign outgoing mail. more

Trademark Holder Not Entitled to Domain Name Registered Years Before

Startups in the process of selecting a company or product name are often frustrated to see that someone else, years ago, registered the .com version of their newly thought-of name. Similarly, companies that have acquired a trademark registration wonder whether they can use their crisp new registration certificate to stomp out someone else who has been using a domain name similar to the company's new mark. A recent case arising under the UDRP shows us that the earlier domain name registration is usually going to be on solid ground against a later-arriving trademark owner. more

Domain Name Hijacking Affects Local Illinois Campaign in Will County

We've previously noted here the challenge of dealing with domain name disputes based on personal names, particularly in the political arena. Now that the campaigns are over and all are taking a deep breath, we can reflect back on one of the domain name disputes arising in the political campaign this year for the office of State's Attorney in Will County Illinois. more

The Pulse of the Domain Industry: Sentiment Trends From the 2025 Survey

The 2025 domain sentiment survey reveals cautious optimism amid rising AI demand, new regulations, and a resurgent market. With security gaps and DNS shifts in focus, the industry's next chapter hinges on strategic adaptation. more

Controlling Cyber Dissidents?

Blogging is not only a well-established element of pop culture, it has become a tremendously influential communications mechanism. As early as March 2002, an article in Wired discussed the blogging "revolution" and declared that blogging "could be to words what Napster was to music - except this time, it'll really work." more

Avoiding an ICANN Monopoly on Policy

With all the focus in the TLD world on the imminent arrival of more than a thousand new TLDs and the still unfinished discussions within ICANN on what policy framework those TLDs will need to follow, it is often forgotten that there are hundreds of other TLD policy frameworks that are mature, stable and well tested. These of course are the ccTLD policy frameworks that have been actively developed over 20 years. more

IANA Transition Planning Proceeding in Fine Internet Style

Hundreds of individuals from across the Internet community have spent countless hours over the last several months crafting plans for the transition of the stewardship of the IANA functions from NTIA to the global multistakeholder community. The fruits of that labor have become highly evident within the past weeks, as two out of three components of the transition plan obtained the consensus of their communities while the third continued its intensive progress. more

P2P: Boon, Boondoggle, or Bandwidth Hog?

Depending on whom you ask, peer-to-peer (P2P) services may be the best thing that ever happened to the Internet or a diabolical arbitrage scheme which will ruin all ISPs and bring an end to the Internet as we think we know it. Some famous P2P services include ICQ, Skype, Napster, and BitTorrent. Currently a new P2P service called iPlayer from BBC is causing some consternation and eliciting some threatening growls from British ISPs... more

Does gTLD Registration Volume Measure Success?

For some time, the measure of success of a TLD was volume of registrations, or strictly speaking, Domains Under Management (DUMs). Who better than .com to validate the truth of that metric? More recently, this same metric has been applied to new gTLDs, especially those who achieve volume quickly, by whatever means necessary. These gTLDs are fawned over, written about, and effectively set up as the standard for other gTLDs to aspire to. But I'd like to challenge that notion. more

The Story of Conficker and the Industry Response

On November 2, 2009, Microsoft released its seventh edition of the Security and Intelligence Report (SIR). The SIR provides an in-depth perspective on the changing threat landscape including software vulnerability disclosures and exploits, malicious software (malware), and potentially unwanted software. Using data derived from hundreds of millions of Windows computers, and some of the busiest online services on the Internet, this report also provides a detailed analysis of the threat landscape and the changing face of threats and countermeasures and includes updated data on privacy and breach notifications. The following is an excerpt from the SIR, pp 29-32, about the Conficker worm and the industry response that showed an incredible amount of collaboration across vendors. more

Put Free Expression on the Internet Governance Forum Agenda

The Internet Governance Project has joined free-expression advocacy organizations Reporters Without Borders and Article 19 to push for including Internet censorship and filtering problems on the agenda of the first meeting of the new Internet Governance Forum (IGF), a multistakeholder deliberation body created by the World Summit on the Information Society... more

ICANN, or ICAN’T or IWON’T?

We're halfway into ICANN71, and early interactions are posing questions about ICANN Org's capability to carry out its mission to maintain an orderly domain name system (DNS). Or, if that's not the case, ICANN leadership seems bent on a hands-off approach to its oversight responsibilities to the DNS. For years now - years - the ICANN community has raised the volume level about acute issues -- a workable Whois management and access system (including clearly delineated controllership)... more

Cyber Resilience Resources Restructuring

Information and Communications (ICT) infrastructures rely on many globally shared critical resilience information resources for diverse essential functions such as identifiers, routing, and cyber security. However, this ICT ecosystem has rapidly become significantly less stable and collaborative with dramatically diminished respect for legal norms and values because of the new USA national Administration. The instability includes the vicarious, wholesale removal of essential public safety and scientific databases, as well as global collaboration with multiple global UN public safety bodies. One result is the scaling of Digital Sovereignty initiatives. more

The Christmas Goat and IPv6 (Year 8)

This is the eighth year we measure IPv6 on the Christmas Goat. And with the crazy climate we have to live in now where there is no snow on the goat or ground. But IPv6 is doing better than the climate this year. This year we increased from 27% 2016 to 40% 2017. In Sweden Tele2, Tre and Comhem are still the only major ISPs with IPv6 enabled. Tele2 (with IPv6 since ~three years) and Tre is mostly mobile operators, and Comhem has enabled IPv6 in their Docsis network. more

More on Story Behind .ASIA

James Seng, my good colleague in APEET, said: "...Chiao called .ASIA 'more or less like a joint venture among APxx organizations'. I say nonsense!" When I say more or less, I mean more or less... On this .ASIA entry, I've intended to use the language carefully at this moment 'cos I know someone will be watching... more

Topics

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

DNS Security

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days