Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

NTAG Chair Blog: What Is the Next GAC Advice?

Last week, New gTLD Applicant Group (NTAG) members - who account for over half of the applications submitted to ICANN in this round - issued a unanimous letter to ICANN's New gTLD Program Committee (NGPC) urging decisive action on Government Advisory Committee (GAC) Category 1 Advice at their upcoming February 5th meeting. The NGPC has been committing to address outstanding items of the GAC Advice in a manner that allows the largest possible number of applicants to proceed since last September. more

It Is All About Trust

Trust is the lifeblood of the Internet and central to everything that is done here. In order for the current 3.5 billion users to continue using the Internet and its services, and for the next billion users to connect to the Internet, trust is required. The importance of trust is seen even more in Africa where, though there is a high growth of Internet users, the e-commerce uptake rate is very low. Users are very reluctant to carry out financial transactions over the Internet because of fear of being attacked by cybercriminals. more

The Strength of Top-Level Domains in UDRP Decisions

Another domain name dispute decision -- this one for '24hour.fitness' -- has highlighted the increasing (potential) relevance of the top-level domain (TLD) under the Uniform Domain Name Dispute Resolution Policy (UDRP). As I have written before, the proliferation of new TLDs is having an impact on whether and how UDRP panels consider the TLD in their decisions. more

DK Hostmaster Wins Award for Transparency and Trust Online

The nonprofit Alliance for Safe Online Pharmacies (ASOP Global) presented its annual Internet Pharmacy Safety E-Commerce Leadership Award to .DK Hostmaster at the 2018 ICANN63 today in Barcelona, Spain. The domain name administrator for Denmark, DK Hostmaster, was selected for the award based on their commitment to ensuring citizen safety by maintaining transparent WHOIS data, proactively enforcing identity accuracy policies to increase consumer trust and safety online. more

Networks Are Not Cars Nor Cell Phones

The network engineering world has long emphasized the longevity of the hardware we buy; I have sat through many vendor presentations where the salesman says "this feature set makes our product future proof! ... Over at the Networking Nerd, Tom has an article posted supporting this view of networking equipment, entitled Network Longevity: Think Car, not iPhone. It seems, to me, that these concepts of longevity have the entire situation precisely backward. more

Apple Buys Into 5G

Apple is coming out with a full range of new 5G iPhones. The phones have been designed to use the full range of new frequencies that the various cellular companies are touting as 5G, up to and including the millimeter wave spectrum offered in center cities by Verizon. In addition to 5G, the phones have new features like a better camera, better ease at using wireless charging, and a lidar scanner. more

Internet Society Seeks Nominations for 2019 Board of Trustees

Are you passionate about ensuring the Internet remains open, globally-connected, secure and trustworthy - for everyone? Do you have experience in Internet standards, development or public policy? If so, please consider applying for one of the open seats on the Internet Society Board of Trustees. The Board of Trustees provides strategic direction, inspiration, and oversight to advance the Society's mission. more

Complexity and Crashes

It's a familiar story by now: on the 8th of August, 2016, Delta lost power to its Atlanta data center, causing the entire data center to fail. Thousands of flights were cancelled, many more delayed, and tens of thousands of travellers stranded. What's so unusual about this event is in the larger scheme of network engineering, it's not that unusual. If I think back to my time on the Escalation Team at a large vendor, I can think of hundreds of situations like this. And among all those events, there is one point in common: it takes longer to boot the system than it does to fix the initial problem. more

Best Practices in the Global Internet

In an increasingly global environment, the Internet infrastructure industry faces a diverse set of serious issues that we as an industry need to address together. To look at these concerns, an area of focus for the Internet Infrastructure Coalition (i2Coalition) has been best practices for our industry. Our approach to developing best practices encapsulates three areas, always with the goal of striking the right balance between security, safety and privacy: working with experts and industry professionals; identifying like-minded partners; and fostering the growth of the Internet economy. more

Those Who Remember History…

Tom Wheeler, the new Chairman of the Federal Communications Commission, gave a speech today at Ohio State University. It was a good speech on his regulatory philosophy. But that's not so interesting. There's nothing out of the ordinary about a government official giving a speech. The unusual development was that the Chairman also released an ebook, called Net Effects. Even more unusual, it's not a bland ghostwritten policy whitepaper; it's a deeply researched work of history. more

Respondent Had Rights or Legitimate Interests in Domain Name by Using It to Promote Genuine Business

In the case of Avon Products, Inc. v. Jenika Mukoro, Heirs Holdings, a 3-member WIPO Panel denied the Complainant's efforts to have the domain name avonhealthcare.com transferred because the Complainant failed to sustain its burden of establishing that the Respondent had no rights or legitimate interests in the disputed domain name. The Panel found that the Complainant proved that its trademark AVON (which has been in use since 1929) is well-known in the field of cosmetics... more

The Ghosts of Deletions Future – December 2018 Versus December 2019

In the absence of data on renewals and deletions which are yet to happen, it can be enlightening to compare the domain names from the zone files of a year ago to the domain names in the current zones. The first group is the legacy gTLDs. The "Retained" domain names are those still in the December 2019 zone files. The "Deleted" domain names are those which are no longer in the current zones. Some of the retained domain names may have been reregistered, but these are not renewals charts. more

Significant Increase in Registry Locked Names Across Top 500 Most Highly-Trafficked Sites

A recent study conducted by Brandsight has revealed that 28% of the top 500 most-highly trafficked sites now employ registry locking. In contrast, only 15% of the top 500 most highly-trafficked sites were leveraging registry locking in 2013. Back in 2013, only 356 of the top 500 most-highly trafficked sites could be registry locked, but that number has also risen significantly so that now 396 of the top 500 most-highly trafficked sites are eligible. more

The Future of Networking (In One Slide)

I recently ran a workshop in Asia and to guide attendees through the content; I put together an overview slide which you might also find of interest and use. It is a description of the quality attenuation framework, originally developed and defined by Predictable Network Solutions Ltd, and documented and extended by myself and colleagues at Just Right Networks Ltd. more

How to Move Telecoms Forward in the USA

In the last few weeks courts in the USA have carried on business as usual. They continue to provide the two major telcos in the USA, Verizon and AT&T, with extraordinary protection -- basically retaining the outdated regulatory system in the USA that identifies the duopoly between the telcos and the cablecos as the best way forward for the development of telecoms competition in this country. This is rather different from the position taken by the new Obama Administration, which has indicated that it will break with past regulations... more

Topics

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Threat Intelligence

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days