The telecommunications business is a double-edged sword. On the one hand it is an enormous growth industry because of its function as a key facilitator in the transformation of societies and economies towards a future that is driven more and more by ICT developments. Over the last decade companies such as Google, Apple, Samsung, Amazon and Facebook have made it to the list of the most successful businesses... On the other hand many of the traditional telco businesses operating in this market are recording declining results. more
It's hard to know what to make of the Google/Verizon deal since until earlier today both companies have denied that there is one. And it's hard to argue about net neutrality because it means so many different things to different people. I've got lots of reading to do to catch up on the newly released set of principles from the companies, but in the meantime here are a few thoughts on the topic. more
DataPrivacyBR and the Internet Integrity Task Force, IITF, in collaboration with CircleID and IGF recently held 2 online events focusing on digital citizenship, governance, and a digital bill of rights and responsibilities. A diverse group of high-level presenters and speakers spanning all stakeholder groups, addressed questions such as: What are the foundational principles that define and protect the rights and responsibilities of digital citizenship? Do existing internet governance models take digital rights sufficiently into account? Are there alternatives to business models that are based on digital exploitation and servitude? Why do we need a digital Bill of Rights and Responsibilities and how can it be created? more
In the 2020 Broadband Deployment Report, the FCC made the following claim. "The vast majority of Americans -- surpassing 85% -- now have access to fixed terrestrial broadband service at 250/25 Mbps". The FCC makes this claim based upon the data provided to it by the country's ISPs on Form 477. We know the data reported by the ISPs is badly flawed in the over-reporting of download speeds. Still, we've paid little attention to the second number. more
We all live in a world where the rapid pace of innovation can be both exciting and challenging. From keeping up with the latest consumer technologies, such as new mobile apps, social media platforms, and digital assistants like Alexa to business-driven innovations like Things (IoT) to Artificial Intelligence, the one certain thing we all face is change. In the Top-Level Domain (TLD) arena, can the same be said about legacy TLDs? more
A fundamental rule of trademarks is that they have to be distinctive, and that nobody can register a trademark on a generic term like "wine" or "plastic." In a case decided today by the U.S. Supreme Court, the court decided 8-1 that online travel agent Booking.com could register its domain name as a trademark. In this case, I think the majority got it wrong, and Justice Breyer's lone dissent is correct. more
About 65% of 1.5B Internet "connections" are in the Global South, led by the BRICS. The actual number of users is probably twice that. Three quarters are not native English speakers. China has three times as many as the United States. India has more Facebook users than the United States. Vietnam has the fastest growth. See some figures below for why I'm confident Indonesia has more than 100M wireless only. more
On eBay, a Virgin Mary Grilled Cheese Sandwich sold for $28,000, a ghost in a jar for $55,000, and a Corn Flake shaped like the state of Illinois $1,350. In each of these very real examples, auction participants placed significant value on the items they were pursuing, in spite of their questionable value. These lucky eBay winners may have also received a case of Winner's curse... Unfortunately, human beings are not always rational and information is rarely - if ever - perfect. So how do you avoid winner's curse for your TLD? more
A concrete plinth was lain at the foundation of durable Enhanced Cooperation this week when ISOC unveiled its IXP toolkit and portal. In simple English (which no doubt will be expanded to other languages) the soft launch modestly seeks feedback, corrections, and further input to the already pithy and instructive content. More to the point, this resource responds to one of the principle demands of those who do not recognize themselves in the multistakeholder model: how do we get our own IXP? more
When it comes to breach disclosures, today's chief information security officers (CISOs) are struggling with an especially turbulent regulatory environment. Security teams are understaffed, and systems are more extensive, making them harder to monitor and defend, while threats are becoming more sophisticated, more frequent, and more varied. It's at precisely this difficult juncture that regulations and enforcement are rapidly changing, leaving CISOs feeling like they are running up the down escalator. more
WannaCry, or WannaCrypt, is one of the many names of the piece of ransomware that impacted the Internet last week, and will likely continue to make the rounds this week. There are a number of takeaways and lessons to learn from the far-reaching attack that we witnessed. Let me tie those to voluntary cooperation and collaboration which together represent the foundation for the Internet's development. more
As promised at an end-of-the-year (2015) announcement, the U.S. Copyright Office has now launched a comment submission process about the "safe harbor provisions" of the Digital Millennium Copyright Act (DMCA). The DMCA is often used by copyright owners to get infringing content - images, text, videos, music, even software - removed from problematic websites. more
One of the most interesting aspects of the proposed merger of Sprint and T-Mobile is that the agreement now includes selling some of Sprint's spectrum to Dish Networks to enable them to become a 5G cellular provider. This arrangement is part of the compromise required by the Department of Justice to preserve industry competition when the major wireless carriers shrink from four to three. more
Given the current debate around mass surveillance which is undertaken by both governments and (social) media companies, the recurring question is what is happening to our hard-fought personal freedom? In the case of government-based mass surveillance there isn't an opt-out option, and in reality opt-out is also not a valid solution to services provided by Google, Apple, Facebook and the millions of apps that we all use to some extent or another. more
The term "counterfeit" is defined under U.S. trademark law as "a spurious mark which is identical with, or substantially indistinguishable from, a registered mark." 15 U.S.C. ยง 1127 (Lanham Act, Sec. 45). Used as a noun, domain names ultimately found to have been registered in bad faith make their registrants cybersquatters by definition. But more commonly we encounter counterfeiting as an adjective as it applies to spurious goods (counterfeit goods) -- "made in exact imitation of something valuable or important with the intention to deceive or defraud." more
Sponsored byWhoisXML API
Sponsored byCSC
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byRadix
Sponsored byIPv4.Global
Sponsored byVerisign