/ Most Viewed

IGF Nairobi - Success of the Multi-stakeholder Model

A funny thing happened in Nairobi last week... I showed up for an Internet Governance Forum (IGF) panel discussion on the use of the Internet during times of political and social unrest, and a truly multi-stakeholder dialogue broke out. It turned out to be my favorite session during an incredible IGF week that, thanks to our Kenyan hosts, exceeded every expectation. The session, formerly known as "The Internet in the Post-Revolution Phase – Challenges of Political Engagement and the Safety of Citizens" was cancelled for reasons unknown. Perhaps it was a conflict of schedules, or maybe the topic was deemed by the organizers or certain governments to be too sensitive for the official agenda. more

UDRP Standing: Proving Unregistered Trademark Rights

The Uniform Domain Name Dispute Resolution Policy is a non-exclusive arbitral proceeding (alternative to a statutory action under the Anticybersquatting Consumer Protection Act) implemented for trademark rights' owners to challenge domain names allegedly registered for unlawful purposes. Policy, paragraph 4(a) states that a registrant is "required to submit to a mandatory administrative proceeding in the event that a third-party... more

Sitting Around the Domain Table

I went to Domain Roundtable with some reservations. I was excited about meeting other domain portfolio holders, but I wasn't sure what to expect from the ICANN and Verisign people there, the corporate intellectual property people, and the corporate attorneys. I was pleasantly surprised by everyone I met. more

2nd FCC Workshop on PSTN Transition Streaming Live Today

Today, December 14, 2011, the US Federal Communications Commission (FCC) is holding the second of two workshops on the transition of the PSTN to new technologies. The workshop started streaming live this morning at 9:30am US Eastern. The FCC's note about the workshops mentions that people watching the live stream can send in questions to panelists using either of two methods... more

Networks and Nationalization

This post isn't about -- or isn't only about -- the use of computer technology to commit crimes. It's more about the use of computer technology to commit war. A few weeks ago, I was part of a conversation about the legal issues cyberwarfare raises. We were talking about various scenarios -- e.g., a hostile nation-state uses cyberspace to attack the U.S. infrastructure by crippling or shutting down a power grid, air traffic control systems, financial system, etc. Mostly, we were focusing on issues that went to the laws of war, such as how and when a nation-state that is the target of a cyberattack can determine the attack is war, rather than cybercrime or cyberterrorism. more

Thoughts on IPv6 Security, Take Two

A few months ago, I made a post about IPv6 security. I've caught some flak for saying that IPv6 isn't a security issue. I still stand by this position. This is not to say that you should ignore security considerations when deploying IPv6. All I claim is that deploying IPv6 in and of itself does not make an organization any more or less secure. This point was made by Dr. Joe St. Sauver, of the University of Oregon... more

EU Presidency Pushing Other Member States for Substantial Internet Surveillance

A leaked document by Statewatch reveals the current EU Presidency (Estonia) has been pushing the other Member States to strengthen indiscriminate internet surveillance and to follow in the footsteps of China regarding online censorship. more

The U.S. Fiber Expansion Craze

I've written several times recently in blogs that there is a growing backlog in buying fiber cable. Some of the backlog is due to the general supply chain malaise that seems to be affecting almost everything we buy. During the recent gas shortages in North Carolina, I found out that there is a shortage of truck drivers. Apparently, many truck drivers found something else to do during the pandemic, and now there is a shortage of drivers to deliver the many goods that are shipped by truck. more

Email Snooping Can Be Intrusion Upon Seclusion

Analysis could also affect liability of enterprises using cloud computing technologies... Local elected official Steinbach had an email account that was issued by the municipality. Third party Hostway provided the technology for the account. Steinbach logged in to her Hostway webmail account and noticed eleven messages from constituents had been forwarded by someone else to her political rival. more

RIAA Loses Again: No Legal Wins Against P2P File Sharers So Far

The Recording Industry Association of America (RIAA) has been taking a lot of people to court -- basically, harassing folks in an attempt to curb file-sharing. The $220,000 verdict against Jammy Thomas got a lot of news (and probably worried a lot of folks). However, on appeal (i.e., after a new court not cherry-picked by the RIAA to try the case looked things over), the RIAA lost... again. ...At its heart, the verdict reaffirms that simply making a copyrighted work available is not the same as actually distributing the work. more

Does the iPhone Keep dotMobi Awake at Night?

We've had a number of questions (and seen plenty of commentary) regarding the recent launch of the iPhone and how it might affect us and the mobile web in general. ...the iPhone changes the way that tastemakers think about their online existence. Interacting with the web, clearly, is no longer a solitary, sedentary and constrained activity.Now I've personally believed this for a while, so arguably it's no big deal -- the long-term evolution of the web to become a largely mobile (and, by the way, subtly different) medium is inevitable. more

Amazon Web Services Targets Startups and Creators With .aws

It will come as no surprise to those who've read my blogs that I get pretty excited about seeing .brand domains launch. At Neustar we're all in on promoting .brand usage in any industry, from all around the world and as such, we're always watching closely for any signs of new domains on the horizon, trawling for case studies or any hint of new activity. So imagine my surprise when a brilliant .brand example jumped out in front of me at JFK airport. more

What Happens If Two Applications for a New gTLD Are a City and a Family Name?

When applying for a new gTLD, what happens if two applications for the same extension are a city and a family name? Which one wins? Let's imagine that a person whose family name is "Marseille" applied for the .MARSEILLE new gTLD in the next round of the ICANN new gTLD program. What if there was a .MARSEILLE new gTLD too but as the name of the French city? more

Considerations on the High-Level Panel’s “Internet Governance Forum Plus” Model

The Fourteenth Annual Meeting of the Internet Governance Forum (IGF) will convene in Berlin three weeks from tomorrow. One of the highlights of the meeting could be the main session on Internet Governance and Digital Cooperation that is to be held on Day 1, 26 November 2019. The session is to consider some of the recommendations contained in the June report from the UN Secretary-General's High-level Panel on Digital Cooperation, most notably the panel's proposal to revamp the IGF... more

Overcoming Cloud Storage Security Concerns: 7 Key Steps

According to a 2013 TwinStrata survey, 46 percent of organizations use cloud storage services and 38 percent plan to adopt this technology in the near future. Cloud storage capacity demands are increasing 40 to 60 percent year-over-year, while storage density lags behind at 20 percent. The result? More data, growing demands for space and increasing security concerns. How do enterprises overcome cloud storage security challenges? more