Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Limitations of .Brand Search Engines

The essay outlines the necessary success factors for a niche search engine and raises doubt regarding the role of .Branding in niche engines' success. Some search engines want to target a niche market, not Google. Unlike Google, they're targeted and they are profitable that way. Consider Kayak (travel), Zillow (real estate), Yelp (reviews), and .xxx (adult websites). more

IPv6: Smart Investments and Smart Grids

IPv6 a major catalyst for billions of dollars worth of deals? The Intel announcement of their McAfee purchase for 7.7 billion seems to indicate as much when Dave DeWalt , McAfee CEO is quoted as saying during a conference call; "If we look at the transition from IPv4 to IPv6, we're seeing an explosion of billions of devices and they all need to be secured." more

Protecting Customer Data

There have been a number of reports recently about customer lists leaking out through Email Service Providers (ESPs). In one case, the ESP attributed the leak to an outside hack. In other cases, the ESPs and companies involved have kept the information very quiet and not told anyone that data was leaked. People do notice, though, when they use single use addresses or tagged addresses and know to whom each address was submitted. Data security is not something that can be glossed over and ignored. more

Heartbleed: Don’t Panic

There's been a lot of ink and pixels spilled of late over the Heartbleed bug. Yes, it's serious. Yes, it potentially affects almost everyone. Yes, there are some precautions you should take. But there's good news, too: for many people, it's a non-event. Heartbleed allows an attacker to recover a random memory area from a web or email server running certain versions of OpenSSL. The question is what's in that memory. It may be nothing, or it may contain user passwords (this has reportedly been seen on Yahoo's mail service), cryptographic keys, etc. more

The Emergence and Consolidation of a Jurisprudence of Domain Names

One of the fallouts of disruptive inventions is the need for new laws to counter their unexpected consequences. As it concerned the Internet, these consequences included a new tort of registering domain names identical or confusingly similar to trademarks and service marks with the intention of taking unlawful advantage of rights owners. Prior to 2000 the only civil remedy for "cybersquatting" or "cyber piracy" was expensive and time-consuming plenary actions in courts of competent jurisdiction under national trademark laws. more

.WEB is ICANN’s First Test of Accountability

Last month, in a much heralded international event, the agreement that ICANN held with the United States Department of Commerce was permitted to lapse and so ICANN became an independent manager of the Internet's addressing system. While some argued that the organization was not "ready" for the transition, the majority of ICANN's multi-stakeholder community, including Afilias, agreed that sufficient accountability measures were in place to ensure that ICANN remains a responsible (and responsive) international organization. more

Cyber Infringement of Trademarks by Typosquatting

A fabled, serial cybersquatter of the early Internet argued that typographical errors in domain names were not cybersquatting at all because they had their own distinct identities. Moreover, "I have" (he argued) "just as much right to own the [misspelled] Domain Names as the person who owns the correct spelling of [a] domain name." That dispute involved and <wallstreet journel.com>. Dow Jones & Company, Inc. and Dow Jones LP v. John Zuccarini, D2000-0578 (WIPO September 10, 2000). more

Fighting for Smaller New gTLD Applicants

Will new gTLDs just be more of the same, or will they bring real diversity and innovation to the Internet's namespace? For Hong Kong based Stable Tone, applicant for two Chinese character IDN TLDs (?? or "Dot WORLD" and ?? or "Dot HEALTHY"), it's the smaller applicants that give the new gTLD program its soul. more

A Closer Look at China’s Call for an End to the Internet Governance Forum

China as a nation with a population of 1.3 billion people, represents over a fifth of the whole world and for this reason, if not for any other, we need to sit up and listen to anything that China says, though a lot of what China says may be disagreeable. China unambiguously stated its position during the Internet Governance Forum (IGF) Open Consultations at Geneva on May 13. On this instance, I consider the views expressed by China largely respectable, but needs to be bridged in some areas. more

Is Your Router Spying on You?

If you've followed the telecom industry at all, you've heard of the effort to rip-and-replace Chinese network gear used mostly in cellular networks and in some fiber networks. The U.S. government ordered that such equipment be replaced, although it has funded the replacement in dribs and drabs. There has been heightened scrutiny of Chinese electronics since the recently discovered Beijing-sponsored cyberattacks that have been reported to have infiltrated the networks of major U.S. more

Nominet to Apply for .Wales and .Cymru Top-Level Domains

In the run up to the launch of new TLDs there were a lot of rumours about which organisations would apply for which strings. Detractors might pick holes in the entire project, but it's very hard to argue against the merits of new TLDs specifically in the context of cultural linguistic communities that fall outside the realm of ccTLDs (country code top level domains). The case of Catalonia and .cat is probably the best one and has been vaunted as the poster child for new TLDs in some circles. more

A New Definition of 6G

We now know how wireless carriers are going to continue the string of new G generations of cellular technology. 5G was originally defined to include spectrum up to 90 GHz or 100 GHz. In the last few years, international standards bodies have been developing new 6G standards in what is called the terahertz wavelengths between 100 GHz and 1 THz. more

Whom Do We Regulate when the Phone Monopolies Are Gone?

Once upon a time in a universe not very long ago phone service in the US was provided by regulated monopolies. AT&T was the big one and there were (and are) hundreds of small ILECs (Independent Local Exchange Carriers) around the country. These monopolies were regulated both at the federal and state level. Then we began on the long road toward competition and deregulation. more

IPv6 Deployment from a Different Perspective

Often when looking at IPv6 deployment statistics, the size of the organisation or the network is not taken into account. In this article, we look at IPv6 deployment of Local Internet Registries (LIRs) per country in correlation to the size of the LIR. When looking at IPv6 deployment at the LIR level, we can look at the following two metrics... more

Valuing Trademarks in Domain Names

My new essay, "Valuing Trademarks in Domain Names," outlines the various approaches to valuing trademarks, pointing out the approaches’ different strengths and weaknesses, with emphasis on domain names. Using court cases, the essay points out that there is no one right way to value intangible assets but there are wrong ways. more

Topics

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

DNS Security

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days