5G sounds like the successor to 4G cellular telephony, and indeed that is the intent. While the progression from 2G to 3G, to 4G and now 5G seems simple, the story is more nuanced. At CES last month I had a chance to learn more about 5G (not to be confused with the 5Ghz WiFi) as well as another standard, ATSC 3.0 which is supposed to be the next standard for broadcast TV. more
I've followed Cuba's home-connectivity "plan" from the time it was leaked in 2015 until the recent Havana home Internet trial. I thought the plan was a bad idea when it was leaked -- it calls for installation of obsolete DSL (digital subscriber line) technology -- and now that the Havana trial is complete, I question whether the plan was real. ETECSA denied the validity of the leaked presentation at the time, and their definition of "broadband" was "at least 256 kb/s." more
As I've written before, domain name disputes involving multiple trademarks sometimes raise interesting issues, including whether a panel can order a domain name transferred to one entity without consent of the other. While panels typically have found ways to resolve this issue, one particularly troubling fact pattern arises when a panel denies a complaint simply because a disputed domain name contains trademarks owned by two different entities. more
The non-contracted parties of the ICANN community met in Reykjavík last week for their annual intersessional meeting, where at the top of the agenda were calls for more transparency, operational consistency, and procedural fairness in how ICANN ensures contractual compliance. ICANN, as a quasi-private cooperative, derives its legitimacy from its ability to enforce its contracts with domain name registries and registrars... more
In recent weeks, you may have seen several articles asking that "ICANN", the Internet Corporation for Assigned Names and Numbers, move more expeditiously to open up the next application window for new gTLDs. As one commenter wrote "Ask a Board member or ICANN staff when they expect the next application window to open, and they will inevitably suggest 2020 -- another three years away. more
Nokia has developed a framework that will enable governments to implement smart cities. The framework is designed to aid regions to design and obtain services for smart city concepts. However, Nokia states that more emphasis needs to be put on developing an overarching strategy rather than small projects. The Australian government announced that they are interested in building smart cities, but there are still major gaps in figuring out how to do so. more
I feel incredibly lucky to work every day with some of the biggest, most recognised and most innovative organisations from around the world on developing strategies for their .brand TLDs. In this capacity, I also have the privilege to meet some of the most knowledgeable and forward-thinking experts in branding, digital marketing, web development and technology, to name a few. One such person is the brilliantly talented Matt Dorville. more
The other day several of us were gathered in a conference room on the 17th floor of the LinkedIn building in San Francisco, looking out of the windows as we discussed some various technical matters. All around us, there were new buildings under construction, with that tall towering crane anchored to the building in several places. We wondered how that crane was built, and considered how precise the building process seemed to be to the complete mess building a network seems to be. more
The incredible pace of change of the Internet -- from research laboratory inception to global telecommunication necessity -- is due to the continuing pursuit, development and deployment of technology and practices adopted to make the Internet better. This has required continuous attention to a wide variety of problems ranging from "simple" to so-called "wicked problems". Problems in the latter category have been addressed through collaboration. This post outlines key characteristics of successful collaboration activities. more
The Bug Bounty movement grew out a desire to recognize independent security researcher efforts in finding and disclosing bugs to the vendor. Over time the movement split into those that demanded to be compensated for the bugs they found and third-party organizations that sought to capitalize on intercepting knowledge of bugs before alerting the vulnerable vendor. Today, on a different front, new businesses have sprouted to manage bug bounties on behalf of a growing number of organizations new to the vulnerability disclosure space. more
The Best Practice Forum (BPF) on IPv6 at the Internet Governance Forum (IGF) explored what economic and commercial incentives drive providers, companies and organizations to deploy IPv6 on their networks and for their services. The BPF collected case studies, held open discussions online and at the 2016 IGF meeting, and produced a comprehensive output report. This article gives a high-level overview. more
Let's be clear: right now, any statements on when (or even if) a follow-up round of new gTLD applications might happen are pure conjecture. The first round closed on April 12, 2012. Since then, the pressure has been increasing for ICANN to actually live up to the guidebook premise of launching "subsequent gTLD application rounds as quickly as possible" with "the next application round to begin within one year of the close of the application submission period for the initial round." But that deadline is clearly not going to be met. more
The emergence and proliferation of Internet of Things (IoT) devices on industrial, enterprise, and home networks brings with it unprecedented risk. The potential magnitude of this risk was made concrete in October 2016, when insecure Internet-connected cameras launched a distributed denial of service (DDoS) attack on Dyn, a provider of DNS service for many large online service providers (e.g., Twitter, Reddit). Although this incident caused large-scale disruption, it is noteworthy that the attack involved only a few hundred thousand endpoints... more
Admittedly, timing is not altogether "all" since there's a palette of factors that go into deciding unlawful registrations of domain names, and a decision as to whether a registrant is cybersquatting or a mark owner overreaching, is likely to include a number of them, but timing is nevertheless fundamental in determining the outcome. Was the mark in existence before the domain name was registered? Is complainant relying on an unregistered mark? What was complainant's reputation when the domain name was registered? What proof does complainant have that registrant had knowledge of its mark? Simply to have a mark is not conclusive of a right to the domain name. more
The choices for consumers and business in Europe to get themselves online have never been so great. Social media, apps and blogsites all have made a lasting impression, and we are now in an increasingly crowded market with the addition of hundreds of new gTLDs. So how has all this affected growth and market shares among domain names in Europe? more
Sponsored byCSC
Sponsored byWhoisXML API
Sponsored byRadix
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byDNIB.com