/ Most Commented

Hyperties: “Travel Adaptors” for the Cloud?

I have spent the day here in Berlin attending my second advisory board meeting for the EU research project reTHINK. I'm chewing over what I learnt about the possible future of the telecoms and cloud industry. There has been a decades-long tussle between the communications and computing parts of the ICT industry. Both sides wish to exert power over the digital economy. Sometimes this tussle works for the common good, sometimes not. more

Ted Cruz: IANA Transition ‘Likely Illegal’

"Sen. Ted Cruz (R-Texas) called on Congress to stop the Obama administration from giving away control of the Internet with congressional authorization -- a move Cruz said is likely illegal," Nicholas Ballasy reporting today in PJ Media. more

Sophisticated Maleware Found Aimed to Target Energy Companies

"The threat uses sophisticated techniques to evade detection and prepares the ground for more malware components," Lucian Constantin reporting in CIO: "Security researchers have discovered a new malware threat that goes to great lengths to remain undetected while targeting energy companies." more

Thomson Reuters in Definitive Agreement to Sell Intellectual Property Unit Including MarkMonitor

The portfolio includes Web of Science, Thomson CompuMark, Thomson Innovation, MarkMonitor, Thomson Reuters Cortellis and Thomson IP Manager. more

Populism and Hi-Tech

At a recent panel discussion in Berkeley, USA, the topic - The Moral Economy of Tech - was explored. The panel discussed the way hi-tech people in general view themselves and their work, and even though I am not an engineer or a developer of software and algorithms I could very much relate to that. I often mention the fact that I am proud to be a member of this industry, as it in general provides positive developments to society and the economy. more

Domain Names Identical to Trademarks But No Likelihood of Confusion

Confusion is a basic element in both cybersquatting and trademark infringement. It appears twice in the UDRP; once in paragraph 4(a)(i) in the adjectival phrase "confusing similarity", and once in paragraph 4(b)(iv) in the phrase "likelihood of confusion." Each use of the distinctive phrases is directed to a different observer. More of this in a moment. The first relates to standing; the second to infringement. Unless a party has standing it can have no actionable claim. more

The Privacy Shield Governing EU-US Data Flows Gets European Approval

"EU-U.S. commercial data transfer pact clears final hurdle," Julia Fioretti today reported in Reuters: "A commercial data transfer pact provisionally agreed by the EU executive and the United States in February received the green light from EU governments on Friday." more

Google Announces Experiment with Post-Quantum Cryptography

Google is experimenting with new cryptography to future-proof Internet communications against quantum computers. Matt Braithwaite, Google Software Engineer in a blog post on Thursday wrote: "Quantum computers are a fundamentally different sort of computer that take advantage of aspects of quantum physics to solve certain sorts of problems dramatically faster than conventional computers can." more

UK Bill Ups Prison Term for Online Piracy from 2 to 10 Years

The UK government has unveiled its latest Digital Economy Bill as part of an "ambition for the UK to be the most digital nation in the world". more

Internet Governance Forum USA 2016 on Thursday, July 14

IGF-USA full day conference at the Center for Strategic and International Studies (CSIS) in Washington DC to be held on Thursday, July 14, 2016 from 8:00 AM - 7:00 PM. Key forum topics include IANA transition, ICANN accountability, broadband access, online privacy, Internet of Things, and digital trade. more

EU Launches First European Public-Private Partnership on Cybersecurity, Plans $2B Investment

The European Commission has launched a new public-private partnership on cybersecurity expected to trigger €1.8 billion ($2B) of investment by 2020. more

China Forbids News Reporting from Social Media Unless Approved

The instruction, issued by the Cyberspace Administration of China, came only a few days after Xu Lin, formerly the deputy head of the organization, replaced his boss, Lu Wei, as the top gatekeeper of Chinese internet affairs. more

Rightside Rejects Donuts’ Unsolicited $70 Million Proposal, Says Undervalues Business

In an announcement released this morning, Rigtside said its Board of Directors has rejected the unsolicited proposal from Donuts Inc. to acquire Rightside's entire registry of generic top-level domains (gTLDs) and related assets for $70 million in an all-cash deal. more

Documentary Balmes Israel for Stuxnet Malware Failure

Oscar-winning documentarian Alex Gibney's "Zero Days" -- coming out on Friday -- investigates the story of the classified Stuxnet attack on Iran by the US and Israel. more

The Netherlands First Country to Implement Long Range (LoRa) Network for IoT

Dutch telecoms group KPN reports that The Netherlands has become the first country in the world to implement a nationwide long range (LoRa) network for the Internet of Things. more