/ Most Viewed

Google Confirms That Keyword Metatags Don’t Matter

Few Internet technologies have horked cyberlaw as much as keyword metatags. Back in the 1990s, some search engines indexed keyword metatags, which encouraged some websites to stuff their keyword metatags as a way of gaming the rankings. Judges took a dim view of this practice, largely because the surreptitious nature of keyword metatags seemed inherently sinister, regardless of their efficacy. In the interim, search engines wizened up. more

What Drives IPv6 Deployment?

It's been six years since World IPv6 Launch day on the 6th June 2012. In those six years, we've managed to place ever-increasing pressure on the dwindling pools of available IPv4 addresses, but we have still been unable to complete the transition to an all-IPv6 Internet. Nobody predicted this situation when we first thought about the consequences of running out of IPv4 addresses. We all thought that the depletion of IPv4 addresses would in a continuously expanding Internet provide sufficient rationale for IPv6. more

Fear of New gTLD Monopolies Is Overblown

You should not worry too much if some of the new generic Top-Level Domain names (gTLDs) become monopolies. ICANN and the registries won't charge monopoly prices as long as they have to worry about the government stepping in. Monopolies normally present two problems for consumers: restricted output and higher prices. In the case of the new gTLDs, restricted output is caused only by ICANN's monopoly over approving gTLD applications. more

DNSSEC Adoption Part 3: A Five Day Hole in Online Security

Implementing security requires attention to detail. Integrating security services with applications where neither the security service nor the application consider their counterpart in their design sometimes make plain that a fundamental change in existing practices is needed. Existing "standard" registrar business practices require revision before the benefits of the secure infrastructure foundation DNSSEC offers can be realized. more

New TLDs Are Coming, and They Are Coming Fast

Despite what you may have read about possible delays to the rollout of the new Top-Level Domain (TLD) program, all the available evidence points to ICANN approving the applicant guidebook shortly after its San Francisco conference in March. My feelings about the timing of the new TLD program were further buoyed by Kurt Pritz, ICANN's Senior Vice President of Stakeholder Relations, who gave a presentation at the .nxt conference I attended in San Francisco this week. Mr Pritz said the applicant guidebook is currently in a "proposed final" version and should be approved after ICANN's San Francisco conference in March. more

Emerging Markets Tech Watch 2012

2011 has been a significant year for the technology sector globally. Information technology is touching more people in more ways than ever before. Developed markets will be considering a 2012 in which business innovation, competitiveness, and service differentiation are built on ubiquitous broadband, cloud computing, smarter mobile computing, and an increasing plethora of Internet-connected devices. By contrast, securing the technology future for developing markets demands that attention be placed on more fundamental issues. more

Unstoppable Domains Receives ICANN Accreditation, Plans to Integrate Blockchain with Traditional Domain Services

This accreditation positions UD as the largest ICANN-accredited registrar in the Web3 space, allowing it to expand its offerings to include a broader range of generic top-level domains (gTLDs) and country code domains (ccTLDs). more

Tracking the Line that Separates Cybersquatting from Trademark Infringement

The Uniform Domain Name Dispute Resolution Policy (UDRP) is a rights protection mechanism crafted by the World Intellectual Property Organization (WIPO) and adopted by the Internet Corporation for Assigned Names and Numbers (ICANN) for trademark owners to challenge the lawfulness of domain name registrations. Cybersquatting or abusive registration is a lesser included tort of trademark infringement, and although the UDRP forum is not a trademark court, as such, in some ways it is since it empowers (assuming the right alignment of facts) to divest registrants of domain names that infringe a complainant's trademark rights. more

61 Businesses Tell ICANN New TLDs Are Needed to Help Consumers, Encourage Innovation, Avoid Chaos

Sixty-one businesses, organizations, and individuals, including many of the domain industry's major players, yesterday sent a letter to ICANN, detailing the reasons why new top-level domains are required without delay. If you're interested in top-level domains, or if you just want to understand why they are important to the Internet, this letter lays out the reasons clearly and succinctly, with a minimum of jargon. more

Cisco: P2P Flat in North America? Some Experiencing Major Growth

North American p2p went from 370 petabytes in 2006 to only 416 petabytes in 2007 according to Cisco's figures. Since U.S. users increased 16% in the same period, that's a drop in p2p per user and a significant drop in p2p as a percentage of all traffic. There's a major margin of error in these figures, so I'm calling it "flat." That's very different from pre 2007 experience, when p2p grew rapidly. It severely contradicts what many in Washington D.C. are saying... more

GNSO Constituencies Issue Unanimous Joint Statement on ICANN Accountability

In an unprecedented development, all stakeholder groups and constituencies comprising ICANN"s Generic Names Supporting Organization (GNSO) unanimously endorsed a joint statement in support of the creation of an independent accountability mechanism "that provides meaningful review and adequate redress for those harmed by ICANN action or inaction in contravention of an agreed upon compact with the community". The statement was read aloud during a June 26th session on the IANA transition process held on the last day of the ICANN 50 public meeting in London. more

Study Finds GDPR Has Had Minimal Impact on Spam and Domain Registrations

Contrary to concerns regarding the effect of GDPR, "not only has there not been an increase in spam, but the volume of spam and new registrations in spam-heavy generic top-level domains (gTLDs) has been on the decline." more

A Consociational Bureau for the Internet Governance Forum

The principle that Internet governance "is a joint effort which requires cooperation and partnership among all stakeholders" (Geneva Declaration of Principles, para 20) has become axiomatic since it was first agreed at WSIS, and is fundamental to the IGF as a "new forum for multi-stakeholder policy dialogue" (Tunis Agenda, para 72). However at the same time as this principle has been universally embraced, some of its implications, that would require the four stakeholder groups identified in the Tunis Agenda to collaborate on the development of joint policy recommendations (Tunis Agenda para 72(g)) have met with resistance. That the strongest resistance has come from those stakeholders with the greatest investment in the existing Internet governance regime... more

UDRP Standing: Proving Unregistered Trademark Rights

The Uniform Domain Name Dispute Resolution Policy is a non-exclusive arbitral proceeding (alternative to a statutory action under the Anticybersquatting Consumer Protection Act) implemented for trademark rights' owners to challenge domain names allegedly registered for unlawful purposes. Policy, paragraph 4(a) states that a registrant is "required to submit to a mandatory administrative proceeding in the event that a third-party... more

60 Minutes Investigates Cybersecurity and the Reality of Sabotaging Critical Infrastructure

CBS's 60 Minutes aired a special report last night investigating how hackers can get into the computer systems that run crucial elements of the world's infrastructure, such as the power grids, water works or even a nation's military arsenal. From the report: "At the Sandia National Laboratories, Department of Energy security specialists like John Mulder try to hack into computer systems of power and water companies, and other sensitive targets in order to figure out the best way to sabotage them. It's all done with the companies' permission in order to identify vulnerabilities. In one test, they simulated how they could have destroyed an oil refinery by sending out code that caused a crucial component to overheat." more