/ Most Viewed

The Coming of the ADC

In the previous decade and the beginning of this one, Server Load Balancing (SLB) reigned supremely in the web data center. Lately, a new class of products is replacing the older load balancers. These products are known as Application Delivery Controllers (ADC) and in the following paragraphs I will share my thoughts on the reasons for that. more

.ORG and Change

The .ORG domain is at a crossroads: What will it be? A simple registry offering domain names for organizations, individuals and others? Or something bigger, as Ethos Capital and the Public Internet Registry propose? Will proposed changes make .ORG better? Or worse? There are valid points on both sides, but as an Internet safety advocate who for two decades has worked to teach children how to be safe online, stop the next young girl from being sex trafficked, and... more

What Do UDRP Panels Look for in Assessing Parties’ Rights to Disputed Domain Names?

Panels appointed to adjudicate domain name disputes under the Uniform Domain Name Dispute Resolution Policy (UDRP) have written in the region of 50,000 decisions involving over 75,000 domain names (minuscule of course when measured against the number of registered domain names). What may surprise some parties, their representatives, and counsel is that these publicly accessible decisions have fueled the emergence and development of a jurisprudence of domain names. more

Sovereignty Strikes the Internet: When Two Don’t Become One

On January 28, the UK government was set to announce whether it would allow Huawei, the Chinese information and communication technologies provider, to develop its 5G infrastructure. Given Brexit and its need to form new alliances, the decision was marked as a significant moment for the UK's trade future. Leading up to the day of the decision, the UK was subjected to a significant amount of pressure from the United States government to reject any deal with Huawei. more

Creating, Protecting and Defending Brand Equity - Part 3

In the final of my three-part post series about how to protect your trademark against misuse, I will focus on proactive searching and policing and the benefits these can provide to brand owners. ... Proactive searching and policing of your brand is a prudent step in making sure your name is protectable. This is an advisable first step in naming a product or service. more

The Rising Cost of Digital Theft and Espionage in Germany

The German digital association, Bitkom, recently announced that the cost of IT equipment theft, data breaches, digital and industrial espionage, and sabotage is expected to reach a staggering 206 billion euros ($224 billion) in 2023.  more

EU-based DNS Internet Infrastructure Beginning to Take Shape, Planned to Onboard 100 Million Users

The EU has been pushing for the development of DNS4EU, a public European DNS resolver with built-in filtering capabilities, as a way to strengthen the "digital sovereignty" of the EU and protect citizens, companies, and public institutions from phishing attacks and malware. In December 2021, a consortium of 13 public and private companies from ten European countries were granted the project to build a public DNS resolution service tailored for the EU. more

Total Domains Registered Reach 183 Million World Wide, .COM, .CN, .DE Top the List

The total number of domain names have grown to 180 million world wide, according to the first quarter 2009 Domain Name Industry Brief published by VeriSign. The first quarter of 2009 reached a base of 183 million domain name registrations across all of the Top Level Domain Names (TLDs) -- a 3% increase over the fourth quarter of 2008 and a 12% increase over the same quarter from last year. Country Code TLDs (ccTLDs) rose to 74.1 million domain names during the first quarter, a four percent jump from the previous quarter and an 18 percent increase year over year. Gauged by total registrations, .com remains the most popular TLD category, followed by .cn (China), .de (Germany) and .net. This composition remains unchanged from Q4 2008. more

China’s New Cybersecurity Law Will Be in Effect Starting Thursday

According to the official news agency, Xinhua, implementation of China's controversial Cybersecurity Law will begin on June 1, requiring strict data surveillance and storage for companies operating in the county. more

Trump Signs Cybersecurity Executive Order, Experts Weigh in on the New Draft

The long-waited cybersecurity executive order expected to launch sweeping reviews of the federal government's digital vulnerabilities, was signed today by President Trump. more

IPv6, Stimulus, Digital Recovery and Job Creation

When our G20 leaders met in Pittsburgh last week, stimulus and recovery were foremost on their minds. Needless to dwell on the ravages of sub-prime lending and outsized bonuses rewarding dismal performance. It is good to see that, in today's global economy, Information Technology is recognized as a major driver of economic growth and quality of life. ...The timing of the Cisco announcement linking IPv6 and smart grids is certainly no coincidence. There is a money trail to be followed and IPv6 will ride the smart grid coattails. more

Diversity of View or Unacceptable Inconsistency in the Application of UDRP Law

The general run of Uniform Domain Name Resolution Policy (UDRP) decisions are unremarkable. At their least, they are primarily instructive in establishing the metes and bounds of lawful registration of domain names. A few decisions stand out for their acuity of reasoning and a few others for their lack of it. The latest candidate of the latter class is NSK LTD. v. Li shuo, FA170100 1712449 (Forum February 16, 2017)... It is an example of inconsistency in the application of law. more

Data Breaches and You: ISOC Global Internet Report 2016 Explains Critical Steps You Need to Take Now

Data breaches are the oil spills of the digital economy. Over 429 million people were affected by reported data breaches in 2015 -- and that number is certain to grow even higher in 2016. These large-scale data breaches along with uncertainties about the use of our data, cybercrime, surveillance and other online threats are eroding trust on the Internet. more

US-CERT Says They Are Aware of DNS Exploit Code, Emphasizes Urgent Patching

The United States Computer Emergency Readiness Team (US-CERT) has acknowledged that they are aware of the publicly available exploit code for a cache poisoning vulnerability in common DNS implementations. US-CERT is re-emphasizing the urgency of patching vulnerable DNS systems. more

FCC Expected to Propose Regulation of Internet as Utility

Sources are reporting that Tom Wheeler, the Federal Communications Commission chairman, is widely expected this week to propose regulating Internet service similar to a public utility -- a move certain to unleash another round of intense debate and lobbying about how to ensure so-called net neutrality, or an open Internet. more