Featured Blogs

Latest

“Non-Discriminatory” Broadband: Just Carriage, or Miscarriage of Justice?

The foundational idea behind "net neutrality" is one of fairness by constraining ISP power over network mechanisms. The theory is this: if there is "non-discriminatory" local traffic management, then you have "fair" global outcomes to both users and application providers. There are thousands of pages of academic books making this assumption, and it is the basis of recent EU telecoms law. more

Disputes Falling Outside the Scope of the UDRP

The UDRP is a forum of limited jurisdiction designed for trademark owners to combat a certain kind of tortious (sometimes tipping to criminal) conduct by which registrants register domain names with the bad faith intent of taking economic advantage of owner's marks and injuring consumers by beguiling them to disclose personal information. The forum is not open to trademark owners whose claims are outside its scope, even though they may include allegations of cybersquatting. more

Do You Know Who Your Domain Name Registrar Is?

A guy I know passed along this e-mail sent to one of his customers. They assumed it was a phish, since they didn't recognize the domain name in the link, but couldn't figure out what the goal of the phish was. They even checked the list of ICANN registrars, and nope, registrar.eu wasn't on the list. Nonetheless, this mail was real, and if the recipient had ignored it, his domain would have been suspended. What's going on? more

Can Trump’s Twitter Account be Deleted Under the New EU Hate Speech Code?

On 31 May 2016, The Commission together with Facebook, Twitter, YouTube and Microsoft unveiled a code of conduct that includes a series of commitments to combat the spread of illegal hate speech online in Europe. These IT Companies support the European Commission and EU Member States in the effort to respond to the challenge of ensuring that online platforms do not offer opportunities for illegal online hate speech to spread virally. more

The Changing World of Network Management in an Increasingly Cloud-Centric World

Over the past two weeks Andrew Lerner, Vice President in Gartner Research covering enterprise networking products, has put out two successive blogs that raise really interesting questions about the changing world of network management in an increasingly cloud-centric world. In "What Keeps Network Folks Up at Night?", Andrew writes about the worrisome challenges in the Banking/Financial industry related to frequent manual network configuration errors. more

Ethical Hacking: Turning The Tables to Boost Cyber Security

Hacking remains a huge problem for businesses. As noted by MarketWatch, more than 175 data breaches have already happened this year, and in 2015 approximately 105 million adults in the United States had their personal information stolen. For companies, the stakes are huge: Compromised systems not only damage the bottom line but can severely impact public opinion. more

The 5 key Benefits of a Branded Top Level Domain - According to the Brands Themselves

In early 2012, in order to promote Choice, Competition and Innovation, ICANN opened its doors to allow organizations to apply for new Top Level Domains. In spite of a complex and costly application process, ICANN received a very large number of applications: In total, 1,930 applications were received, of which 675 were brands applying for a closed new gTLD, a dot brand. more

Important Milestone in IANA Stewardship Transition: NTIA Says Proposal Meets Criteria

Today, the global Internet community reached an important milestone. The US Department of Commerce National Telecommunications & Information Administration (NTIA) announced that the community-developed proposal to transition the stewardship of the Internet Assigned Numbers Authority (IANA) functions meets the criteria it set out in March 2014. more

Representation in Multistakeholder Model

In the recent years, a new form of multilateral cooperation has emerged that is more inclusive and open than the traditional intergovernmental approaches. A solutions oriented governance model where multiple stakeholders work in collaboration to achieve the purpose. These stakeholders could be from various states working at the global level or it could be bound to a nation-state which is referred to as the mutlistakeholderism at the regional or local level.  more

Internet Society Activities at EuroDIG 2016: Trust, Collaborative Security, Zero Rating and More…

Over the next two days (9-10 June), the European Dialogue on Internet Governance (EuroDIG) takes place in Brussels, Belgium. With a theme of "Embracing the digital (r)evolution", EuroDIG has a full agenda and Internet Society staff will be participating in many aspects of the programme. For us, a primary focus will be at 11:30 CEST (UTC+2) on Thursday, June 9, when our President and CEO Kathy Brown opens the first Plenary with a keynote speech. more

Growing Interest Abroad for Cloud-Based Email Infrastructure

Between September of 2015 and May 2016, (last 8 months) Port25 saw almost a 30 percent jump in new cloud-based email infrastructure interest outside the United States... While most of the influential senders are not abandoning on-premises mail transfer agent (MTA) solutions, many are looking to cloud infrastructure for managing higher-volumes by bifurcating individual email streams to the cloud. more

Google’s IPv6 Stats Hit 12% on Fourth Anniversary of World IPv6 Launch

Four years ago today, thousands of websites, including Facebook, Google and Yahoo, and hundreds of networks permanently enabled IPv6 in what was called "World IPv6 Launch". One year before, on June 6, 2011, there had been a 24-hour test in "World IPv6 Day" but by June 6, 2012, IPv6 was enabled permanently for the participating sites and networks. One of the many IPv6 statistics sites many of us have watched since that time has been Google's statistics. more

Declaring and Declining to Find Reverse Domain Name Hijacking

What to one panelist is clearly bad faith conduct in filing a UDRP complaint, to another is excusable for lack of proof. The disagreement over reverse domain name hijacking centers on the kind of evidence necessary to justify it and the nature of the burden. RDNH is defined as "using the UDRP in bad faith to attempt to deprive a registered domain-name holder of a domain name." Rule 1, Definitions. more

Unlawful Targeting of Trademarks and Consumers in Registering Domain Names

Unlike trademark applications which go through a lengthy examination process before advancing to registration, anyone (anywhere in the world) can register a domain name identical or confusingly similar to a trademark - instantly and no questions asked, at least, in the traditional space (the legacy gTLDs)! With the new gTLDs registrants will receive notice of possible infringement if the brands are registered with the Trademark Mark Clearing House, but notices do not function as injunctions to block registrants from registering infringing names. more

Using the URS as a Preliminary Injunction for Domain Name Disputes

As I've written before, the Uniform Rapid Suspension System (URS) - the domain name dispute policy applicable to the new generic top-level domains (gTLDs) - is just not catching on. Whether because of its limited suspension remedy, high burden of proof or other reasons, the URS remains unpopular among trademark owners. However, there's one interesting use to which the URS can be put. more

Topics

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

Threat Intelligence

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days