/ Most Viewed

The Truth About Supplemental Filings in UDRP Cases

A typical proceeding under the Uniform Domain Name Dispute Resolution Policy (UDRP) consists of a complaint and, sometimes, a response. UDRP Rule 12 makes clear that "further statements or documents from either of the Parties" are appropriate only if "the Panel... request[s], in its sole discretion." In practice, however, such supplemental or additional filings are not uncommon, with the leading UDRP service providers - WIPO and the Forum - issuing guidance about when they may be appropriate. more

White Spaces: The NAB vs. Reality

One of Washington's most powerful corporate lobbies is at it again. Raising a dust cloud of lies in a last-ditch effort to stop new technology that could better the lives of millions. For more than five years, now, the television broadcast lobby has tried to deny the American public access to white spaces -- unused airwaves that sit vacant between TV channels. Technology now exists that would tap the near limitless potential of these airwaves and deliver high-speed Internet services to tens of millions of people now left on the wrong side of the digital divide. more

Smart Cities Want to Co-Design Change With Telcos

With 5G earmarked as a game-changer for cities, wireless technologies are already widely deployed by leading smart cities, including those here in Australia. However, cities do not want to be locked into proprietary technology solutions, rather seeing themselves as a platform on which many organisations can build infrastructure, applications, and services to benefit all citizens and all local businesses. more

Into the Gray Zone: Considering Active Defense

Most engineers focus on purely technical mechanisms for defending against various kinds of cyber attacks, including "the old magic bullet," the firewall. The game of cannons and walls is over, however, and the cannons have won; those who depend on walls are in for a shocking future. What is the proper response, then? What defenses are there The reality is that just like in physical warfare, the defenses will take some time to develop and articulate. more

Counterfeit Marks and Counterfeit Goods: Pretense in Cyberspace

The term "counterfeit" is defined under U.S. trademark law as "a spurious mark which is identical with, or substantially indistinguishable from, a registered mark." 15 U.S.C. § 1127 (Lanham Act, Sec. 45). Used as a noun, domain names ultimately found to have been registered in bad faith make their registrants cybersquatters by definition. But more commonly we encounter counterfeiting as an adjective as it applies to spurious goods (counterfeit goods) -- "made in exact imitation of something valuable or important with the intention to deceive or defraud." more

Washington’s 5G Mania Endpoint – Global CyberBalkanisation

Over the past two years, governments and foreign intelligence agencies around the world have tried to understand the inexplicable, chaotic, irrational, indeed maniacal 5G policies of the Trump Administration. Revelations by former Trump administration officials and most recently Trump's niece confirm that there is no rational basis for Trumpian positions and policies and that the best response is to recognize that Washington is no longer capable of playing a meaningful role... more

It’s Up to Each of Us: Why I WannaCry for Collaboration

WannaCry, or WannaCrypt, is one of the many names of the piece of ransomware that impacted the Internet last week, and will likely continue to make the rounds this week. There are a number of takeaways and lessons to learn from the far-reaching attack that we witnessed. Let me tie those to voluntary cooperation and collaboration which together represent the foundation for the Internet's development. more

New gTLDs: Are You Rich?

Did you know about these new domain name extensions which focus on wellness, wealth and ego? Well, I listed them and there is an interesting one... which really is unique... Many want to be famous and some industries should have a look at this list of extensions since they are keywords dedicated to very powerful industries: Gold and Diamonds, for example, have their own new gTLD for domain names ending in ".gold" and ".diamonds". more

FCC Expected to Propose Regulation of Internet as Utility

Sources are reporting that Tom Wheeler, the Federal Communications Commission chairman, is widely expected this week to propose regulating Internet service similar to a public utility -- a move certain to unleash another round of intense debate and lobbying about how to ensure so-called net neutrality, or an open Internet. more

People Should Drive Automation - Not Technology

Service providers have traditionally organised their operations around different technology domains. The responsible teams have been staffed with specialists looking after routing, network services, security and various other functional areas. Over time, organizations like this have had the tendency to transform into loosely tied silos with limited interaction between the different teams. more

Internet Society Seeks Nominations for 2019 Board of Trustees

Are you passionate about ensuring the Internet remains open, globally-connected, secure and trustworthy - for everyone? Do you have experience in Internet standards, development or public policy? If so, please consider applying for one of the open seats on the Internet Society Board of Trustees. The Board of Trustees provides strategic direction, inspiration, and oversight to advance the Society's mission. more

The Magnitude of the Urban Digital Divide

The web is full of stories of rural areas with no broadband options, and I've spent a lot of time in the last few decades helping rural areas get better broadband. There has not been nearly as much coverage of the huge broadband gap in urban areas. There are a lot of urban homes that can't afford broadband and, in many cases, got bypassed when the telcos and/or cable companies built their networks. more

Data Breaches and You: ISOC Global Internet Report 2016 Explains Critical Steps You Need to Take Now

Data breaches are the oil spills of the digital economy. Over 429 million people were affected by reported data breaches in 2015 -- and that number is certain to grow even higher in 2016. These large-scale data breaches along with uncertainties about the use of our data, cybercrime, surveillance and other online threats are eroding trust on the Internet. more

The Strength of Top-Level Domains in UDRP Decisions

Another domain name dispute decision -- this one for '24hour.fitness' -- has highlighted the increasing (potential) relevance of the top-level domain (TLD) under the Uniform Domain Name Dispute Resolution Policy (UDRP). As I have written before, the proliferation of new TLDs is having an impact on whether and how UDRP panels consider the TLD in their decisions. more

How the Slow Adoption of the Cloud Has Impacted 3 Industries

"It's in the cloud" has become a phrase we don't think twice about, but less than a decade ago, you might have received some awkward looks using this kind of talk in the boardroom. Cloud-based software applications are heralding the fourth industrial revolution that will eventually lead to the industrial internet of things (IIOT). The reasons for this are because... more