/ Most Viewed

How to Manage Internet Abundance

The Internet has two billion global users, and the developing world is just hitting its growth phase. Mobile data traffic is doubling every year, and soon all four billion mobile phones will access the Net. In 2008, according to a new UC-San Diego study, Americans consumed over 3,600 exabytes of information, or an average of 34 gigabytes per person per day. Microsoft researchers argue in a new book, "The Fourth Paradigm," that an "exaflood" of real-world and experimental data is changing the very nature of science itself. We need completely new strategies, they write, to "capture, curate, and analyze" these unimaginably large waves of information. more

Dictionary Words Alone or Combined Functioning as Trademarks Are No Less Dictionary Words

By definition "any word" or "any combination of words" can function as trademarks, but whether alone or combined for that purpose no use can overrule their ordinary meanings, support their removal from the public domain, or prevent speculation or use of identical or confusingly similar words by businesses other than rights holders. The fact is, all words that are not coined found in dictionaries, word lists, and circulating in world cultures are generic. more

DDoS Attacks: Don’t Be In Denial of the Risks

Unlike traditional attacks by hackers which breach a business's security systems, resulting in defaced websites, intellectual property theft and/or customer data theft, a DDoS attack focuses on making a business's Internet connected infrastructure (e.g. web servers, email servers, database servers, FTP servers, APIs, etc.) unavailable to legitimate users. A business's brand reputation, which can take years to establish, can be swept away in just a few hours from a single DDoS attack in the same way a natural disaster like a flood or earthquake can impact a traditional brick and mortar business. more

North American Broadband Trends

The broadband sector, like the wireless sector, is one of the strongest growth areas of telecommunications. Unlike most OECD countries, where DSL tends to dominate, the majority of subscribers in the US fixed broadband market are cable subscribers. During 2010 the gap continued to widen as the cable companies accounted for 70% of new broadband subscribers compared to the telcos' 30%. Although new broadband networks such as FttH and WiMAX are being widely deployed, broadband competition in each region is still generally limited to one DSL and one cable operator. more

An IPv6 Update for 2020

The Australian Domain Name Administration, AUDA, recently published its quarterly report for the last quarter of 2020. The report contained the interesting snippet: "The rapid digitization of our lives and economy -- necessitated by COVID-19 -- continued to underpin strong growth in .au registrations. New .au domains created in December 2020 were up 23 percent from December 2019, while total domains under management were up more than 2.1 percent over the same period." more

The 5G Race in Reno

The past week in the 5G world was notable because of some major events in Reno in the 5G race to roll out the full 5G specifications known as Release 16. A set of seven major concurrent industry standards meetings were hosted there over five days last week. The metrics are indicative of who really participates in and shapes the rapidly emerging 5G platforms. more

Google’s .App TLD Application Under Fire

I've written about "closed generic" new TLD applications several times over the last year. I'm opposed to them, as I've said in the past and continue to say today. However I've generally been supportive of "restricted" TLDs. The Association for Competitive Technology (ACT) has serious concerns about Google's application for .app and want ICANN's board of directors to treat as a "closed generic". more

Over a Billion Email Addresses of Major Spam Operation Exposed via Unprotected Backups

A spamming group called River City Media (RCM) has had its database of 1.4 billion records leaked. This was revealed today by MacKeeper Security Researcher, Chris Vickery in cooperation with CSO Online and Spamhaus. more

Could Net Neutrality be to Investments in the Internet What AT&T’s Regulation was to Bell Labs?

As the FCC moves forward with its plans to regulate the internet in the U.S., it's worth taking a look at what's happened when the government has regulated other innovative industries. As a facilitator of innovation, I've always been fascinated with the history of Bell Labs. Bell Labs was once thought of as the source of most modern innovations... The work done at Bell Labs built the foundation for modern invention leading to phones, space exploration, the internet, music distribution, cell phones, radio and television and more. more

Colorado Has a New Spam Law

The governor of Colorado recently signed a new anti-spam law [PDF] into effect. Since CAN SPAM draws a tight line around what states can do, this law is mostly interesting for the way that it pushes as firmly against that line as it can. Other observers have already done a legal analysis of the way it's worded to avoid being tossed out as the Oklahoma law was in Mummagraphics, and to make it as easy as possible for suits to meet the falsity or deception limits in CAN SPAM. To me the most interesting part of this law is its one-way fee recovery language... more

Internet Records Retention Bill

A lot of pixels have been spilled lately over an Internet records retention bill recently introduced in both the House and the Senate. The goal is to fight child pornography. That's a worthwhile goal; however, I think these bills will do little to further it. Worse yet, I think that at least two of the provisions of the bill are likely to have bad side effects... more

The FCC Cyber Trust Label Gambit

Several weeks ago, the Federal Communications Commission (FCC) embarked on one of the most far-reaching regulatory gambits in its 90-year history. It is formally known as a Notice of Proposed Rulemaking in the matter of Cybersecurity Labeling for Internet of Things, Docket 23 -- 239. The FCC offers ICT product developers the use of its FCC trademarked cyber trust mark placed on their products in exchange for accepting open-ended Commission cybersecurity jurisdiction... more

ICANN’s New gTLD Double Standard?

Over the last two days I have sat in a room and watched a rather interesting dynamic unfold between the ICANN Board and its Government Advisory Committee (GAC). While I remain optimistic of there being a responsible closure to the new gTLD implementation process within the next six months, an apparent double standard being used by the ICANN Board could be a potential stumbling block. more

Delayed Enforcement Blocks Domain Name Lawsuit: Southern Grouts v. 3M

I'm often baffled by lawsuits over domain names and keywords because they just don't seem to make any economic sense. This lawsuit is especially perplexing given the plaintiff's delays and the seeming impossibility of the plaintiff reaching a profitable outcome, even if it won in court. What was the plaintiff thinking? more

How a Security Specialist Fell Victim to Attack

Our systems are protected by state of the art security systems. Our SPAM filter is a hardware device that is nearly 100% effective. It also helps in protecting against Spyware and other malicious code. Our Firewall is similar to those you would find in large corporations. Our Anti-Virus system has served us well and we've not had problems with virus for years. ...Two weeks ago, I received approximately twenty e-mails requesting the review and approval of Defending The Net articles published on other sites. I thoroughly review the e-mails to make sure they seem legitimate... more