/ Most Viewed

Making the Platform Relationship Win-Win

CSC recently participated in an open discussion at the World Trademark Review's APAC WTR Connect, where we moderated a discussion with brand owners, Western Digital and PVH, and platform owner, Alibaba, on the topic: "Making the Platform Relationship Win-Win." How do brands define what a platform is? For the brand owners, a platform could be any distribution service of their products -- be it a traditional eCommerce marketplace like Alibaba or Amazon.com -- or other digital service enablers... more

Global Content Removals Based on Local Legal Violations - Where are we Headed?

From the Internet's earliest days, the tension between a global communication network and local geography-based laws has been obvious. One scenario is that every jurisdiction's local laws apply to the Internet globally, meaning that the country (or sub-national regulator) with the most restrictive law for any content category sets the global standard for that content. If this scenario comes to pass, the Internet will only contain content that is legal in every jurisdiction in the world... more

Reducing Unreachable ICANN Registrations

Recently ICANN published a report on inaccurate registration data in her own databases. Now the question is presented to the world how can we mitigate this problem? There seems to be a very easy solution. ... The question to this answer seems simple. To know who has registered with an organisation. This makes it possible to contact the registered person or organisation, to send bills and to discuss policy with the members. more

Who Says You Can’t Have Fun at The IETF?

A new IETF draft has been published that specifies a new HTTP status code for legally restricted resources. That is, if the government restricts your access to the web page, return this code (similar to how something not found is a 404). The error code: 451. From the Internet Draft, if the user tries to access a page, but access to the page is restricted by the government, display the following... more

Making Multi-Language Mail Work (Part 3)

In the previous installments we looked at software changes in mail servers, and in the software that lets user mail programs pick up mail. What has to change in the user mail programs? ... The first and most obvious is that users have to be able to enter the addresses. more

US-China Tech War Threatens Global Internet Infrastructure: China Plans $500 Million Subsea Cable Rival

Chinese state-owned telecom firms plan an extensive undersea fiber-optic internet cable network to link Asia, the Middle East, and Europe. The cable, to be named EMA (Europe-Middle East-Asia), would cost approximately $500 million to complete and be manufactured and laid by China's HMN Technologies Co Ltd, a fast-growing cable firm whose predecessor company was majority-owned by Chinese telecom giant Huawei Technologies Co Ltd. more

Trademarks and Domain Names Composed of Common Terms

The lexical material from which trademarks are formed is drawn from the same social and cultural resources available to everyone else, which includes domain name registrants. Since trademarks are essentially a form of communication, it is unsurprising that a good number of them are composed of common terms (dictionary words, descriptive phrases, and shared expressions) that others may lawfully use for their own purposes. more

Fiber to the Home: Ideal Economic Stimulus?

This week, the headlines seem to be full of fresh doom and gloom for wireline carriers, who employ people in every congressional district across America. Sooner or later, someone is going to call for Congress to tap some of the hundreds of billions in 2009 economic stimulus to help the LECs through troubled times, save lots of jobs, and preserve the way we do business in our critical last-mile communications infrastructure. Is this wise? Is there a better way? more

4G on the Moon

This post is a little more lighthearted than my normal blog posts. An article in FierceWireless caught my eye talking about how Nokia plans to establish a 4G network on the Moon. The primary purpose of the wireless technology will be to communicate between a base station and lunar rovers. 4G LTE is a mature and stable technology that can handle data transmission with ease... more

55 Days Remain Until the 10th Internet Governance Forum in Joao Pessoa, Brazil

On behalf of the Internet Governance Forum (IGF) Multistakeholder Advisory Group (MAG) I would like to extend the official invitation from the United Nations Secretary-General which cordially invites and encourages all stakeholders to participate in the upcoming 10th annual meeting of the Internet Governance Forum, being held this year in the beautiful coastal city of João Pessoa, Brazil. more

Routing Without Rumor: Securing the Internet’s Routing System

The Domain Name System has provided the fundamental service of mapping internet names to addresses from almost the earliest days of the internet’s history. Billions of internet-connected devices use DNS continuously to look up Internet Protocol addresses of the named resources they want to connect to - for instance, a website such as blog.verisign.com. Once a device has the resource’s address, it can then communicate with the resource using the internet’s routing system. more

Defining KPIs to Measure the Success of Your AI Strategy

KPIs are industry-specific and should be aligned carefully with your AI strategy. My course at UC Berkeley drills down heavily on how to define success when implementing your AI strategy, and measurement, like anything else, is the top priority. One technique that can potentially be used in your organization as you embark on your AI strategy is to use the SMART method for KPIs. SMART stands for Specific, Measurable, Attainable, Relevant, and Time-Sensitive. more

UK Online Safety Act Becomes Law Amid Controversy

The UK's Online Safety Bill has received Royal Assent and is now officially the Online Safety Act. This law mandates tech companies to incorporate new standards for the design, operation, and moderation of their platforms. more

Close to 200K Phishing Domains Discovered in a 5-Month Span, 66% Targetted Consumers, Akamai Reports

Between December 2, 2018 and May 4, 2019, 197,524 phishing domains were discovered, 66% of which directly targeted consumers according to the latest State of the Internet report by Akamai. more

The Maturing Domain Industry

Day one of the Digital Marketing and gTLD Strategy congress is happening in London today. As we inch ever closer to new gTLDs actually launching on the Internet, business models and marketing approaches are becoming clearer and better defined. This was evident in today's presentations and workshops, with applicants and current TLD operators alike showing much greater depth of thought into how these namespaces might actually be of use to Internet users. more