UDRP complainants are expected to get it right the first time, and if they don't there's a narrow window for a second filing. Evidence previously available but overlooked will not support a new complaint, although this does not preclude the possibility of one being accepted on evidence of new facts. In Haru Holding Corporation v. Michael Gleissner / NextEngine Ventures LLC the Panel concluded that the time between registration of the domain name and the filing of the complaint was too short for bad faith use... more
Following the release of our new gTLD multiple batch timeline yesterday, today we would like to take the opportunity to demonstrate to ICANN and the community exactly how a single batch timeline could be implemented and how this would benefit all applicants. In recent weeks, ARI Registry Services has publicly expressed concern about the current batching model and digital archery system. Several other key stakeholders within the community have also raised concerns and expressed support for our position. more
The Great Renaming was a significant event in Usenet history since it involved issues of technology, money, and governance. From a personal perspective -- and remember that this series of blog posts is purely my recollections – it also marked the end of my "official" involvement in "running" Usenet. I put "running" in quotation marks in the previous sentence because of the difficulty of actually controlling a non-hierarchical, distributed system with no built-in, authenticated control mechanisms. more
The Registration Operations Workshop (ROW) was conceived as an informal industry conference that would provide a forum for discussion of the technical aspects of registration operations in the domain name system. The 7th ROW will be held in Vancouver, Canada on Thursday, May 17th 2018 in the afternoon, at the end of the GDD Industry Summit, in the same venue. more
Most people - mistakenly - believe that they are perfectly safe behind a firewall, network address translation (NAT) device or proxy. The fact is quite the opposite: if you can get out of your network, someone else can get in. Attackers often seek to compromise the weakest link in a network and then use that access to attack the network from the inside, commonly known as a "pivot-and-attack." more
Computers have always had clocks. Well maybe not clocks as you might think, but digital computers have always had oscillators, and if you hook the oscillator to a simple counter then you have a clock. The clock is not just there to tell the time, although it can do that, nor is it there just to record the time when data files are created or modified, though it does that too. Knowing the time is important to many functions, and one of those is security. more
Counterfeiting is a negative activity that is affecting almost all areas of economies, incidentally it has become a menace in the Internet world. Apart from selling of fake products online, the production and sale of imitated or counterfeit products create huge market for products that hurt the producers of the genuine goods and also create a menancing health risk to the users. more
There are now more than 1,000 top-level domains (TLDs), but which is best for branding yourself or your business? With search engines, does it even make a difference? What does it matter which TLD you chose as long as you rank high enough on Google? That is what many would have you believe, but there is one power greater than any search engine... At one time, my brother and I owned Rate.com. more
Just in time for ICANN's 44th meeting next week, a new Internet Draft has turned up, purporting to fix the centralization of the DNS. The draft has received some attention, including an article in PC World. It isn't entirely clear what the real purpose of the draft is, but it is hard to credit the notion that it is solving any technical problem. Without examining the reasons why the draft exists, I want to debunk a claim in it. more
Imagine that you run an organization out of a building. Imagine that the landlord comes one day and says, "Oh I didn't know you are a resident of country X or dealing with anybody from country X. I have to close this place down right now." And then you are done. You don't have an organization anymore. This very scenario happens on the Internet. more
The House of Representatives has passed another measure related to the proposed IANA functions transition, and has again attached it to "must pass" legislation. This move ups the ante and may well be the final straw that compels the Senate Commerce Committee to hold its own oversight hearing on the IANA transition proposal.On May 30th the House adopted the Duffy Amendment to the Appropriations bill funding the Commerce, Justice, and State Departments in FY 2015. The final vote on the amendment was 229 in favor and 178 opposed -- it was fairly partisan outcome, with only ten Democrats voting aye while just one Republican voted nay. more
2013 may be a promising year for global trade in technology with the kick-off of the International Technology Agreement expansion discussions, the Trans-Atlantic Trade and Investment Partnership, and as the Trade in Services Agreement gets going. But China calls its own tune, and is now threatening to restrict its market for Internet-enabled technologies through a clever device that could cost its trading partners billions. more
Even though ICANN is moving full steam ahead with the New gTLD Program, many of the program's specifics are still being finalized. Many important questions related to the Trademark Clearinghouse and the Uniform Rapid Suspension (URS) still remain unanswered at this point. However, ICANN has recently provided additional details around Application Reveal and Batching and selected the Independent Objector. more
The March 19, 2020, guidance from the U.S. Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA) declared what global citizens appreciate more each day as the COVID-19 pandemic crisis unfolds: "Functioning critical infrastructure is imperative during the response to the COVID-19 emergency for both public health and safety as well as community well-being." more
Let's go to the scoreboard. There are 1751 applications for new top-level domains. Nearly 1/3 (635) are brands. The rest are generics (e.g. .Buzz) and geographies (e.g .NYC). So, brands are definitely interested in new TLDs - and a handful of major industries have jumped into the lead. If you're in any of those verticals, it's time to pay attention. Your competitors may be giving your customers new ways to reach out, learn and buy from them. more
Sponsored byCSC
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byRadix
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byWhoisXML API