Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

AI Has No Time for “Human” Rights

Popular media have recently reported a White House initiative asserting companies' "moral obligation" to limit the risks of AI products. True enough, but the issues are far broader. At the core of the debate around AI -- will it save us or destroy us? -- are questions of values. Can we tell AI how to behave safely for humans, even if in the future it has a "mind of its own"? It is often said that AI algorithms should be "aligned with human values." more

The Crypto Wars Resume

For decades, the US government has fought against widespread, strong encryption. For about as long, privacy advocates and technologists have fought for widespread, strong encryption, to protect not just privacy but also as a tool to secure our computers and our data. The government has proposed a variety of access mechanisms and mandates to permit them to decrypt (lawfully) obtained content; technologists have asserted that "back doors" are inherently insecure. more

Google and ETECSA Will Agree to Exchange Internet Traffic Without Charge

Google and ETECSA have signed a memorandum of understanding agreeing to negotiate a peering agreement that would allow cost-free data exchange between their networks once an undersea cable physically connects them. Google has worked hard to establish a relationship with ETECSA and the Cuban government. In recent years, Cuba, not the US, has limited the Cuban Internet. This agreement telegraphs a change in Cuban policy. more

When UDRP Consolidation Requests Go Too Far

Although including multiple domain names in a single UDRP complaint can be a very efficient way for a trademark owner to combat cybersquatting, doing so is not always appropriate. One particularly egregious example involves a case that originally included 77 domain names -- none of which the UDRP panel ordered transferred to the trademark owner, simply because consolidation against the multiple registrants of the domain names was improper. more

Early Disclosure of UDRP Complaints

Under the previous rules for the Uniform Domain Name Dispute Resolution Policy (UDRP), domain name registrants that had a complaint filed against them were supposed to be notified of the complaint by the trademark owner that filed it. Then, a revised set of UDRP rules that went into effect in 2015 eliminated the complainant's obligation to notify the respondent. Instead, the new rules only require the UDRP service provider (such as WIPO or the Forum) notify the respondent, presumably after the registrar has locked the domain name, preventing any transfers. more

World Anti Counterfeiting Day… Staggering Costs Fueled by the Web

Established in 1998 by the Global Anti-Counterfeiting Group (GACG), "World Anti Counterfeiting Day" is held annually in June to raise awareness of the international impacts of counterfeiting and piracy. According to the International Chamber of Commerce (ICC), the cost of counterfeiting is a $600 billion a year problem. MarkMonitor estimates the cost of online counterfeit trade at $200 billion annually. more

Internet Governance Calendar During the COVID-19 Pandemic

The Internet has become an integral part of our lives. Its growth is dependent upon the interaction of engineers, researchers, and network operators to advance networking technologies, policies, governance mechanisms, and deployment. In this undertaking, the Internet's multi-stakeholder governance has relied heavily upon regular face-to-face meetings and conferences to gather individuals and organizations from numerous participating communities. more

Is It Time for a Data Sharing Clearinghouse for Internet Researchers?

Today's Senate hearing with Facebook's Mark Zuckerberg will start a long discussion on data collection and privacy from Internet companies. Although the spotlight is currently on Facebook, we shouldn't forget that the picture is broader: companies from device manufacturers to ISPs collect network traffic and use it for a variety of purposes. more

Battling Cyber Threats Using Lessons Learned 165 Years Ago

When it comes to protecting the end user, the information security community is awash with technologies and options. Yet, despite the near endless array of products and innovation focused on securing that end user from an equally broad and expanding array of threats, the end user remains more exposed and vulnerable than at any other period in the history of personal computing. more

Online Businesses to Benefit from Supreme Court “Booking.com” Ruling

Today, in U.S. Patent and Trademark Office v. Booking.com, the Supreme Court of the United States has affirmed that generic terms including .com domain names may be trademarked when consumers do not perceive the mark to signify the class of services, with heightened distinctiveness and recognition attributable to top-level domains that add meaning like .club, .guru, and .vip. more

Broadband for Communities

When talking about the benefits of broadband, it's easy to overlook how broadband has become the glue that brings people and communities together. This is becoming particularly important for rural communities but matters to people everywhere. Rural communities have been rapidly losing other forms of media that were the focal point in the past. 2004 was the peak of the newspaper business in terms of readership and revenues. more

Collaboration: A Means to Boost Enterprise Network Protection

In an age where cyber threats and attacks have reached a point of ubiquity, managing your organization's network security single-handedly may no longer be sufficient. The increasing volume and sophistication of threats, not to mention the continuous advancement in attack tools and their perpetrators' skills and know-how, has led to concerns on whether potential targets can keep up. more

ICANN Paris: Seeking Comments from Internet Users in North America

Ahead of next week's ICANN meeting in Paris, I would like to consult users, At-Large Structures (ALSs) and others involved in internet governance in North America. As one of the three regional representatives on the ICANN At-Large Advisory committee, I want to make sure individuals, users and ALS's are given the chance to summit their own questions, suggestions and items to the agenda of the upcoming meeting. I'd be happy to receive your comments, and/or schedule a chat with you Mon-Thur, from 13:00-18:00 EDT. Leave a comment to this post, or leave me a message. more

DCA Trust Strongly Urges ICANN Board Not to Adopt the Proposed Amendment to Its Bylaw

ICANN has been busy in managing several parallel processes that are also closely tied together in one way or the other. The processes include the new gTLD process, the IANA transition and most currently and important action yet that would act as the synergizing factor is the accountability process. ICANN has also posted for public comment proposed Bylaws revisions that would incorporate a higher voting threshold for the Board to determine not to follow the advice of the Governmental Advisory Committee. more

How Bubbles Decide Elections

The victory of Trump left the world perplexed, it did not take long to appear texts blaming Facebook and its bubble for the unexpected result. The "bubble", a theme that circulated more for the academic and technical spheres gained an unusual popularity in the last days, never saw so many texts on the subject published in such a short space of time, and in the recognized spaces of global journalism. more

Topics

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days