Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

IP Address Location Data

The last few years have shown us how the Internet shrinks distances between distributed teams, organizations and families. This poses a challenge for some organizations. Many business relationships and contractual agreements involving the Internet have geographical implications and restrictions. This matters to anyone operating a network. It is most important for networks that get new address space. more

Verizon-Yahoo! Incumbents Never Seem to Learn

It is amazing that after the dozens of examples of failed business decisions made by telcos in relation to the digital economy, Verizon has clearly not learned any lessons and is willing to waste $4.8 billion in its purchase of Yahoo. This investment will be totally useless and will not provide any new revenue for the telco. They seemed to be attracted by the people-tracking facility (surveillance marketing) that companies such as Yahoo use, and they aim this for their own purposes to attract new advertising revenues. more

A New Cellular Carrier?

One of the most interesting aspects of the proposed merger of Sprint and T-Mobile is that the agreement now includes selling some of Sprint's spectrum to Dish Networks to enable them to become a 5G cellular provider. This arrangement is part of the compromise required by the Department of Justice to preserve industry competition when the major wireless carriers shrink from four to three. more

Counterfeit Marks and Counterfeit Goods: Pretense in Cyberspace

The term "counterfeit" is defined under U.S. trademark law as "a spurious mark which is identical with, or substantially indistinguishable from, a registered mark." 15 U.S.C. ยง 1127 (Lanham Act, Sec. 45). Used as a noun, domain names ultimately found to have been registered in bad faith make their registrants cybersquatters by definition. But more commonly we encounter counterfeiting as an adjective as it applies to spurious goods (counterfeit goods) -- "made in exact imitation of something valuable or important with the intention to deceive or defraud." more

Community Support Required for Alternative Trademark Clearinghouse Solution

It's time for the community to demonstrate its resolve to see ICANN implement a successful and effective Trademark Clearinghouse (TMCH). Let's be clear here. The current ICANN implementation model and approach is flawed and needs attention. Following more than three months of consultation and negotiation, today I'm pleased to be able to present the domain name and trademark protection industries with an alternative solution for the operation of ICANN's Trademark Clearinghouse for the new Top-Level Domain (TLD) program. more

IPv6, Stimulus, Digital Recovery and Job Creation

When our G20 leaders met in Pittsburgh last week, stimulus and recovery were foremost on their minds. Needless to dwell on the ravages of sub-prime lending and outsized bonuses rewarding dismal performance. It is good to see that, in today's global economy, Information Technology is recognized as a major driver of economic growth and quality of life. ...The timing of the Cisco announcement linking IPv6 and smart grids is certainly no coincidence. There is a money trail to be followed and IPv6 will ride the smart grid coattails. more

Data Breaches and You: ISOC Global Internet Report 2016 Explains Critical Steps You Need to Take Now

Data breaches are the oil spills of the digital economy. Over 429 million people were affected by reported data breaches in 2015 -- and that number is certain to grow even higher in 2016. These large-scale data breaches along with uncertainties about the use of our data, cybercrime, surveillance and other online threats are eroding trust on the Internet. more

Fadi’s .ORG Fracasso

The stakeholder community needs to get with the program and assert itself now – if it still can. The recent attempts by the Internet Society (ISOC) to wrap itself in the halo of Jon Postel's "original intent" for .org is specious and laughable. As I've previously published, Postel also didn't like how big the top-level domains were getting and suggested, in 1993, that top-level domains should be capped at 10,000 names and that further zone growth should happen at the second- and third-levels (similar to how the UK has .uk and then .com.uk, for example). more

What Do UDRP Panels Look for in Assessing Parties’ Rights to Disputed Domain Names?

Panels appointed to adjudicate domain name disputes under the Uniform Domain Name Dispute Resolution Policy (UDRP) have written in the region of 50,000 decisions involving over 75,000 domain names (minuscule of course when measured against the number of registered domain names). What may surprise some parties, their representatives, and counsel is that these publicly accessible decisions have fueled the emergence and development of a jurisprudence of domain names. more

Advancing Digital Trust: Global Innovations in Domain Registrant Verification (Highlights from the ICANN79 Community Forum)

On 6 March 2024, the ICANN At Large Advisory Committee (ALAC) held a plenary session entitled "Building Trust on the Internet Through Registrant Verification" at the ICANN79 Community Forum in San Juan, Puerto Rico, that Michael Palage and Avri Doria co-moderated. This session was inspired in part by a recent World Economic Forum report entitled "Reimagining Digital ID"... more

ICANN and Voodoo Economics in Wonderland

The exposed areas needing improvement by ICANN - both the organization as well as its global community of stakeholders - provide a target-rich environment. In the nearly three years since the completion of the transition of the Internet Assigned Names Authority (IANA), ICANN has persistently sought to drive top-down dictatorial policymaking; to shroud its activities and decision-making from public view; and, to evade accountability -- in some cases even doubling down on its efforts. more

Moving ICANN Meeting from Marakech Would Send the Wrong Message

Reports of the cancelation of the ICANN 52 meeting in the Moroccan town of Marrakesh appear to be exaggerated. They did, however, force the organization to issue a statement on Sunday confirming that while "no decision had been taken yet" ICANN was considering postponing the meeting in Marrakech scheduled for 8-12 February, 2015. This would a mistake, in our opinion... more

Good Samaritans with Network Visibility

In a big open office 30 feet from me, a team of US Veterans speak intently on the phone to businesses large and small, issuing urgent warnings of specific cyber security threats. They call to get stubborn, confused people to take down hidden ransomware distribution sites. They call with bad news that a specific computer at the business has malware that steals login credentials. more

Touching Enhanced Cooperation

A concrete plinth was lain at the foundation of durable Enhanced Cooperation this week when ISOC unveiled its IXP toolkit and portal. In simple English (which no doubt will be expanded to other languages) the soft launch modestly seeks feedback, corrections, and further input to the already pithy and instructive content. More to the point, this resource responds to one of the principle demands of those who do not recognize themselves in the multistakeholder model: how do we get our own IXP? more

Diversity of View or Unacceptable Inconsistency in the Application of UDRP Law

The general run of Uniform Domain Name Resolution Policy (UDRP) decisions are unremarkable. At their least, they are primarily instructive in establishing the metes and bounds of lawful registration of domain names. A few decisions stand out for their acuity of reasoning and a few others for their lack of it. The latest candidate of the latter class is NSK LTD. v. Li shuo, FA170100 1712449 (Forum February 16, 2017)... It is an example of inconsistency in the application of law. more

Topics

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days