Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

.brand Delegated? Now Comes the Fun Part

A little over a year ago I wrote a series of articles to help guide those with a .brand TLD through the delegation process. After ICANN's recent push for .brands to delegate, the majority are now across the line. There would be many organizations out there currently feeling like first time parents who've just brought a newborn home from the hospital -- it's been a long process already, and the hard work hasn't even begun. more

Looking Beyond IGF 2015 to WSIS+10

IGF 2015 in João Pessoa, Brazil will be seen as a milestone for the global Internet community. After 10 years of intense work, the Internet Governance Forum (IGF) has earned the right to celebrate its success and prepare itself for the future. As we come out of the meeting, we are urging all who want to be heard at this important moment in the evolution of the Internet to join over 110 organizations and individuals who have already signed on to a message to the UN General Assembly that will 1) help safeguard the IGF for the future; 2) preserve the multistakeholder model of governance; and 3) help keep us focused on the work at hand. more

If Code Is Law, Then Protocols Are Good Manners That Help Us Get Along

The Decentralized Social Networking Protocol (DSNP) is a product developed by Project Liberty, an international non-profit founded by Frank McCourt, with the goal of transforming how the Internet works, who owns and controls personal data, and who benefits from the digital economy. The McCourt Institute, as the research and digital governance arm of Project Liberty, aims to support the development and management of DSNP. more

The Missing Piece of the Security Conference Circuit

So far this year I think I've attended 20+ security conferences around the world - speaking at many of them. Along the way, I got to chat with hundreds of attendees and gather their thoughts on what they hoped to achieve or learn at each of these conferences. In way too many cases I think the conference organizers have missed the mark. I'd like to offer the following thoughts and feedback to the people organizing and facilitating these conferences (especially those catering to local security professionals). more

5G and the Health Scare

Having been involved in the telecommunications industry for a long time, I followed many of the discussions involving health concerns when the 3G and 4G mobile technologies were introduced. This time, with 5G, the situation is no different. Again, there are many communities worried about the potential negative health effects of the radiation that emanates from mobile communications. more

National Broadband Growth is Slowing

Leichtman Research recently released the U.S. broadband customer statistics for the end of the fourth quarter of 2021. The numbers show that broadband growth has slowed significantly for the sixteen largest ISPs tracked by the company. LRG compiles these statistics from customer counts provided to stockholders, except for Cox, which is privately owned. Net customer additions sank each quarter during the year. more

Three Views of Multistakeholder Leadership in the Age of Sovereignty

As multistakeholder governance nears a critical juncture, leaders must navigate diverging views, geopolitical pressures and technological upheaval. With sovereignty concerns mounting, the Internet's institutions face a complex future that demands deft stewardship. more

Happy Birthday, Backbone

Today marks the 20th anniversary of the decommissioning of the NSFNET backbone on April 30 1995, an important milestone in the development of the commercial Internet. The NSFNET was set up by the US National Science Foundation in 1985 to enable university researchers access to five supercomputer sites across the United States, using Internet Protocol technology. In stepping back, the NSF supported a transition to an Internet shaped by market forces, and the explosion of commercial use soon followed. more

Towards a Quantitative Approach for Objectively Measuring the Similarity of Marks

Central to many intellectual property disputes is an assessment of the degree of similarity of two contested marks. A determination of similarity is fundamentally a subjective decision involving a range of relevant tests, which include consideration of the perception of the relevant consumer and recognition of the existence of degrees of similarity within a spectrum (from high to low). more

A New Busy Hour – One of the Many Consequences of the COVID-19 Pandemic

One of the many consequences of the coronavirus is that networks are going to see a shift in busy hour traffic. Busy hour traffic is just what it sounds like -- it's the time of the day when a network is busiest, and network engineers design networks to accommodate the expected peak amount of bandwidth usage. Verizon reported on March 18 that in the week since people started moving to work from home that they've seen a 20% overall increase in broadband traffic. more

There is Always a Back Door

A long time ago, I worked in a secure facility. I won't disclose the facility; I'm certain it no longer exists, and the people who designed the system I'm about to describe are probably long retired. Soon after being transferred into this organization, someone noted I needed to be trained on how to change the cipher door locks. We gathered up a ladder, placed the ladder just outside the door to the secure facility, popped open one of the tiles on the drop ceiling, and opened a small metal box with a standard, low-security key. more

Further Ideas in Mark Similarity Measurement

In the final three articles in my series looking at algorithms for measuring the similarity of marks, I extend the ideas to provide a more sophisticated and adaptable framework. Article 4 introduces a similarity score based on color distance in RGB space, offering a quantitative approach to trademark similarity. Article 5 refines word mark similarity by using the International Phonetic Alphabet to improve phonetic analysis. The final article presents a method for sorting colors by dominant shade, aiding in trademark review and potential guidelines for color mark protection. more

GNSO Council: Attend the .ORG Protest!

Tomorrow EFF, NTEN, Fight for the Future, Demand Progress, and other organizations will hold a rally outside of ICANN HQ from 9-11 am. You know about the rally, and you should all attend this event! Whatever your feelings about the sale of .ORG, you are leaders of the GNSO, the body that makes gTLD policy. This is a gTLD event, and registrants are trying to talk with ICANN, and they are trying to talk with YOU. more

Domain Name Association Supports IANA Transition, Petitions Congress to Move Forward

I recently sent a letter to congressional leaders including Speaker of the House Paul Ryan; House Minority Leader Nancy Pelosi; Senate Majority Leader Mitch McConnell and Senate Minority Leader Harry Reid expressing the Domain Name Association's support of the U.S. Administration's planned transition of the Internet Assigned Numbers Authority (IANA) to the global multi-stakeholder community under the stewardship of the Internet Corporation for Assigned Names and Numbers (ICANN). more

Would You Fly an Airplane That Had a Pre-flight Checkout That Was Only 40 Percent Complete?

In the aviation world safety is paramount. Commercial airlines go to major lengths to make sure that their planes are fully up to code and can fly safely in the air. The risks - loss of human lives - are far too extreme to take any chances. One result of this diligence is the fact that travel by plane is far safer than any other method - nearly 40 times safer per mile than travel by car. While application security risks are not as dire, research shows CSOs fail to use the same stringent level of safety to secure their Internet-facing applications. more

Topics

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

DNS Security

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days