/ Most Viewed

Is the URS Dying?

The much-maligned Uniform Rapid Suspension System (URS) is not only failing to catch on -- it's actually starting to fade. Once envisioned as a popular rights-protection mechanism for trademark owners under the new generic top-level domain names (gTLDs), the URS instead is seldom used. In fact, despite the growth in new gTLD registrations, the URS is in decline. more

A Visualized gTLd Sequencing Proposal

As a follow-up to our previous CircleID article "Strong Support for IDNs, GEOs and/or Communities to Go First" we have developed a flow chart which visualizes how the applications may be processed in a fair and transparent manner. The chart also shows that at the end of the day only about 1,200 new gTLDs may go online, that means that we will likely see about 730 drop outs. more

Online Critics and Unlawful Harassment from Trademark Holders

The following is based on my experience and interpretation of the UDRP and the relevant laws of the United Kingdom and European Union. This is not legal advice but just my own experience and interpretation. How does a UK citizen create a non-commercial trademark.tld parody criticism website and avoid harassment from the trademark holder? Here are the steps... more

Close to 3.1 Million Domain Names Registered in the Third Quarter of 2015

Approximately 3.1 million domain names were registered in the third quarter of 2015, bringing the total number of registered domain names close to 299 million worldwide across all top-level domains (TLDs) as of Sept. 30, 2015, according to the latest Domain Name Industry Brief by Verisign. more

Your Domain Name Does Matter in Search Results – Microsoft Says So!

I stumbled upon a study conducted by Microsoft eons ago back in the paleolithic era of search; 2012... It is about how "premium domains" are perceived by the consumer when seeing them in the search results compared to a lower value "non-premium" domain. I like to use quotations sparingly, but I felt it was necessary because the varying opinions on premium v non-premium domains is a bridge I do not want to cross in this post.  more

The Christmas Goat and IPv6 (Year 6)

When I last year failed to take a picture of the Christmas goat before it was taken down, I decided this year to take a pic every minute, just to be on the safe side. A shortened movie based on these pics of the 2015 Christmas Goat can be find on YouTube. The clip on YouTube also shows that in the early morning of December the 27th the goat was set on fire and burned down in minutes. more

In Defense of Process: Identifying the Problem Before Seeking Solutions

You don't necessarily need to walk before you can run, but you should probably look where you are going before you do either. The U.S. Government's announcement that it would transition out of its unique legacy role in ICANN set off a powder keg at ICANN, as stakeholders from every corner of the community rushed to offer their recommendations on how to fill the impending contractual vacuum with something, new, better, and appropriately reflective of the multi-stakeholder model. more

IANA 2.0: Ensuring ICANN Accountability and Transparency for the Future

The National Telecommunications and Information Administration's (NTIA) March 14, 2014, announcement proposing the transition of its legacy Internet Assigned Numbers Authority (IANA) stewardship role has presented the Internet Corporation for Assigned Names and Numbers (ICANN) multi-stakeholder community equal amounts of opportunity and responsibility. We have been handed a singular opportunity to define the terms of any stewardship transition and the fundamental responsibility to get it right. more

Study Finds a Third of .Com Domains Completely Unused

How Many .com Domain Names Are Unused? Singapore Data Company recently conducted a study to answer this question. more

Belize to Host Caribbean Peering and Interconnection Forum

Belize will host the fourth Caribbean Peering and Interconnection Forum, known as CarPIF, on June 13 and 14. Since its inception in 2015, CarPIF has brought together regional and international technology experts and telecommunications industry execs to discuss a range of topics related to Internet peering and interconnection trends, and their relevance to the Caribbean region. more

The Growing Security Concerns… Don’t Have Nightmares

Anyone concerned about the security of their computers and the data held on them might sleep a little uneasily tonight. Over the past few weeks we've heard reports of serious vulnerabilities in wireless networking and chip and pin readers, and seen how web browsers could fall victim to 'clickjacking' and trick us into inadvertently visiting fake websites. The longstanding fear that malicious software might start infecting our mobile phones was given a boost... And now a group of researchers have shown that you can read what is typed on a keyboard from twenty metres away... more

Fadi Chehadé Announces His Departure - What’s Next for Businesses at ICANN?

Last week, the CEO of ICANN, Fadi Chehadé, announced his intention to leave his position in March 2016, after almost four years as head of the organization. He plans to take a position in private industry, outside of the domain name space. Although the impact to the business community is unclear at this point, Chehadé's departure throws a spotlight on how important ICANN leadership can be in ensuring that business and brand interests maintain their voice in the Internet governance sphere. more

Models for Muni WiFi Completely Neglect Technology Evolution

Modern travel means interminable waits, but it's a good time for reading. I finally read Wireless Pittsburgh: Sustainability of Possible Models for a Wireless Metropolitan-Area Network by Jon M. Peha, published in February as a working paper of the New America Foundation. The good news: it's full of interesting cost estimates and projected subscriber take rates based on specific demographics in Pittsburgh, Minneapolis and Philadelphia... The flaws in this study...
 more

Does Apple’s Cloud Key Vault Answer the Key Escrow Question?

In a recent talk at Black Hat, Apple's head of security engineering (Ivan Krsti?) described many security mechanisms in iOS. One in particular stood out: Apple's Cloud Key Vault, the way that Apple protects cryptographic keys stored in iCloud. A number of people have criticized Apple for this design, saying that they have effectively conceded the "Going Dark" encryption debate to the FBI. They didn't, and what they did was done for very valid business reasons -- but they're taking a serious risk... more

How to Steal Reputation

The term "reputation hijacking" continues to spread through the anti-spam community and the press. It's intended to describe when a spammer or other bad actor uses someone else's system -- usually one of the large webmail providers -- to send their spam. The idea is that in doing so, they're hijacking the reputation of the webmail provider's IPs instead of risking the reputation of IPs under their own control. But I really have to laugh (though mostly out of sadness) whenever this technique is described as something new... more