A certain number of brands are using a dot brand domain as their main actual website. The following analysis looks at how dot brands are used in brand communication. Are brands communicating about their domain names, or are domain names supporting brand communication? Dot brand corresponds to the ability, for a certain number of pioneering brands, to use their brand name at the top level of the naming system for their own purpose, in parallel to a dot com or a country code. more
The headlines this week say that over 200 million domain names now exist on the internet. Pretty impressive... But consider the explosive growth of Social Networks. The top twenty social networks alone have over 2 billion user names. With User Names on social networks rapidly becoming the Internet's new brand identifiers, I wonder: is it time that we apply the same trademark rules we have for domain names to user names as well? more
For many industry participants, the timing around opening the next round of new Top-Level Domain applications has been frustrating, to say the least. However, with the recent ICANN Marrakech meeting now complete, we thought it timely to provide an update for those who may be interested to apply in the next round or for those merely following the journey. more
More and more connected devices will require more and better electricity solutions. In many developing economies more people have ready access to a smartphone and the internet than they have access to electricity. For that reason we have seen mobile telecoms operators starting to include power solutions (mainly through distributed energy systems, using solar panels) in order to sell more phones and telecom services. This shows how important access to electricity is. more
"The Internet Corporation for Assigned Names and Numbers (ICANN) has ruled that .feedback owner Top Level Spectrum (TLS) is in breach of its registry agreement," Barney Dixon reporting in IPPro The Internet. more
With GDPR coming into effect this May, it is almost a forgone conclusion that WHOIS as we know it today, will change. Without knowing the full details, how can companies begin to prepare? First and foremost, ensuring that brand protection, security and compliance departments are aware that a change to WHOIS access is on the horizon is an important first step. Just knowing that the ability to uncover domain ownership information is likely to change in the future will help to relieve some of the angst that is likely to occur. more
Databases are the infrastructure of the modern administrative state and data is its lifeblood. When the data is contaminated with errors, federal agencies have difficulty performing even the most basic administrative functions such as managing its inventory of office space and protecting the personally identifiable information (PII) of social security number holders. The federal dissemination of unreliable data doesn't just waste money; it undermines public trust in government and leaves it unmanageable. more
The advent of mobile broadband triggered a huge change in broadband access across Asia. Following more than a decade of strong growth in almost all mobile markets in the region, an amazing transition to new generation mobile networks and services took place. By end 2014 there were a total of 1.2 billion mobile subscribers and with annual growth running at over 40% coming into 2015 the numbers were expected to hit 1.7 billion by end-2015. more
The Coalition Against Domain Name Abuse (CADNA) recently released a statement that implied that cybersquatting is a criminal activity. It said, "CADNA has been working diligently to further international and national policies that combat the practice of cybersquatting... As brands continue to learn about the prevalence and practice of online criminal activities..." While, Internet Commerce Association (ICA) vigorously opposes cybersquatting, it is important to note that cybersquatting is a civil matter, not a criminal one. There is a good reason that cybersquatting is a civil matter... more
Symantec today announced that it has signed a definitive agreement to acquire VeriSign's identity and authentication business, which includes the Secure Sockets Layer (SSL) Certificate Services, the Public Key Infrastructure (PKI) Services, the VeriSign Trust Services and the VeriSign Identity Protection (VIP) Authentication Service. more
Very little was said about telecommunications during the official speeches and forums at ITU Telecom World 2009. The industry is even talking about changing its focus from telecommunications to ICT [United Nations Information and Communication Technologies Task Force], Discussions are now focusing on how ICT can be used to underpin the various socio-economic developments that are taking place. more
It is not uncommon for government agents to force technology companies to create or install malicious software in products in order to help them with surveillance. The American Civil Liberties Union (ACLU) has released a guide for developers that is intended to help preserve security and customers' privacy. more
In response to United Domains pre-registration of .nyc domain names, we posted the below on our blog and the NARLO sites yesterday. While United Domains pre-registration service is free and non-binding, the North American Regional At Large Organization, part of the ICANN governance ecology, is concerned that "the offer of such a service could create artificial demand..." more
U.S. federal court issues preliminary injunction, holding that enforcement of Canadian order requiring Google to remove search results would run afoul of the Communications Decency Act... Canadian company Equustek prevailed in litigation in Canada against rival Datalink on claims relating to trade secret misappropriation and unfair competition. After the litigation, Equustek asked Google to remove Datalink search results worldwide. Google initially refused altogether... more
The EC recently approved technical rules on how the 900MHz and 1800MHz frequency bands should be utilised for 4G services, including LTE and WiMAX. National governments have until the end of 2011 to implement the decision into national legislation. Restrictions were initially imposed by the 1987 GSM Directive which limited these bands for 2G. more