Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Identical or Confusingly Similar to Trademarks but Noninfringing Domain Names

Domain names may be confusingly similar to trademarks or even identical or but not infringing. This is particularly true of trademarks acquired later than the allegedly infringing domain names ArcBest Corporation v. Domains By Proxy, LLC, Registration Private / Vernon Troupe, D2016-2381 (WIPO January 13, 2017) (<arcbest.com>, in which "ark" is a contraction of "Arkansas"), but it can also apply to marks composed of common element that predate domain name registration... more

Rapidly Changing Triple and Quadruple Play Business Models

It is interesting to follow what is happening with triple and quadruple play broadband prices in competitive markets. Through triple and quadruple play, customers are increasingly getting more services for the same money. As most fixed telecoms markets are still largely monopolistic in nature, basic access charges remain high; but good prices are even available in markets with healthy wholesale competition, if one shops around. more

The 5 Stages of gTLD Shock

PCWorld lists new gTLDs among the 5 major changes facing the Internet in 2012. No doubt the sudden introduction of hundreds of new gTLDs will have a significant impact on the Internet. I postulate that users will react to new gTLDs by going through the following stages... more

Domain Registrar Hide and Seek

In the past year ICANN has been putting a lot more effort into its compliance activities, which is a good thing, since the previous level was, ah, exiguous. That's the good news. The bad news is that while they're paying more attention to misbehaving registrants, the registrars, gatekeepers to the world of domains, have serious issues that ICANN has yet to address. more

Trying to Predict Miguel Diaz-Canel’s Internet Policy

I recently gave a short talk that concluded with some speculation on the attitude of Miguel Diaz-Canel, who is expected to replace Raúl Castro next year, toward the Internet. I searched online and came up with three clues -- two talks he has given and one act. In May 2013, Diaz-Canel gave a speech at an educator's conference in which he anticipated today's preoccupation with fake news. He acknowledged the futility of trying to control information. more

The International Telecommunication Union and the Trump Administration

The question is not uncommon these days for someone who has been the principal historian on the ITU over the past 40 years. The short answer is that the institution should do just fine. Indeed, the appearance of bizarre phenomena like Trump, enhance the value and trustworthiness of a stable, globally inclusive intergovernmental venue dealing with matters that by their nature require worldwide cooperation and is buttressed by one of the most highly regarded Secretary-Generals in its history. more

Inquiring About the “Unthinkable”

There has been no shortage of speculation within the ICANN community regarding the continued show down between the ICANN Board and its Governmental Advisory Committee (GAC) over new generic Top-Level Domains (gTLDs) and the pending expiration of the IANA contract this September. Now one of the more interesting topics of discussion that I have had with multiple independent parties was the potential of ICANN making changes to the L root zone file... more

Are Phishing and Malware Separate Threats?

Phishing is when bad guys try to impersonate a trusted organization, so they can steal your credentials. Typically they'll send you a fake e-mail that appears to be from a bank, with a link to a fake website that also looks like the bank. Malware offers another more insidious way to steal your credentials, by running unwanted code on your computer... I like VeriSign's characterization of this kind of malware as an insecure endpoint, the PC which is the endpoint of the conversation with the bank isn't actually under the control of the person who's using it. more

Who Will Crack Cloud Application Access SLAs?

The broadband industry doesn't have an agreed-upon unit of supply and demand that meaningfully "adds up". This is rather odd for a service that aspires to be a utility. It is also a barrier to a much-needed transformation from "bit pipes" to "digital supply chain management". The chart here ought to be in every basic undergraduate textbook on packet networking and distributed computing. That it is absent says much about our technical maturity level as an industry. more

Today Marks a Giant Step Towards DNSSEC Deployment

The global deployment of Domain Name System Security Extensions (DNSSEC) is charging ahead. With ICANN 38 Brussels just around the corner, DNSSEC deployment will inevitably be the hot topic of discussion over the next few days. Case in point, today, ICANN hosted the first production key ceremony at a secure facility in Culpepper, Va. where the first cryptographic digital key was used to secure the Internet root zone. The ceremony's goal was simple: for the global Internet community to trust that the procedures involved with DNSSEC are executed correctly and that the private key materials are stored securely. more

Set-Top-Box Revisited: How Does the Gateway Solution Increase Competition?

The FCC seems determined in revisiting and repairing the current CableCard rules fiasco in which it chose to mandate a universal Set-Top-Box for Cable, Telco, and DBS providers. Where does a solution lie, and is the FCC going down another road of improbable acceptance? The problem with a CableCard solution, in an attempt to create more competition, was the opening of current provider STB's to access other venues, which turned out to be both technically and business concept unfriendly. more

New Revenue Models for the ‘Software Telco’

I was recently asked how telcos might come up with new business models for a world where all resources are under software control. The core idea is to match network supply and demand in space and time (and at all timescales). I've typed up my notes for the curious to critique...Today's telco is more like a static utility 'pipe', the way that gas, electric or oil are delivered. It sells direct access to raw network mechanisms, and users buy circuits that offer a fixed bandwidth in space and time. more

Net Neutrality Undermining Spreads to Developing Countries

After the USA set the bad example of allowing telcos to start charging different rates for content delivery services, other incumbent telcos elsewhere are only too happy to jump on the bandwagon and use the American example as a reason and an excuse to end net neutrality (NN) in their countries also. As did their American counterparts they too see this as another way to grab some extra monopolistic income. more

What May Happen to GAC Advice? 3 Fearless Predictions

Many TLD applicants are likely to respond to the GAC Advice in a manner that is like story telling: Based on a mixture of fiction garnished with some facts from their applications, applicants will write savvy responses with only one aim -- to calm down the GAC's concerns and survive the GAC Advice storm. The "duck and cover" strategy... According to the Applicant Guidebook, material changes to applications need to go through a Change Request process. more

White Spaces Could Be the Broadcasters Best Hope

For years, the National Association of Broadcasters (NAB) fought the White Spaces Coalition and others interested in making US "TV white spaces" available for broadband, Wi-Fi or indeed, any new purpose. When the FCC voted 5-0 to permit license exempt use of TV White Spaces, the industry brought suit in Federal court. And they did this, despite rules in the FCC's decision that are so restrictive that, for now, white spaces devices are doomed to commercial failure. more

Topics

Threat Intelligence

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days