/ Most Viewed

The Myth of 5G and Driverless Cars

A colleague sent me an article that had been published earlier this year in MachineDesign magazine that predicts that driverless cars can't be realized until we have a ubiquitous 5G network. When looking for the original article on the web I noticed numerous similar articles like this one in Forbes that have the same opinion. These articles and other similar articles predict that high-bandwidth, low-latency 5G networks are only a few years away. more

The Future of Software Patents

What should we do with software patents? I've seen both sides of the debate, as I work a great deal in the context of standards bodies (particularly the IETF), where software patents have impeded progress on a community-driven (and/or community-usable) standard. On the other hand, I have been listed as a co-inventor on at least 40 software patents across more than twenty years of work, and have a number of software patents either filed or in the process of being filed. more

CallService.biz Shut Down by the FBI

Gary Warner over at Cyber Crime and Doing Time has a good post up this week about the CallService.biz website being shut down. I have posted a few good excerpts and added my comments to the end. ... Warner's take on the world of spam, malware, hacking and phishing is that unless people actually go to jail because they are spamming, the problem of spamming will never get better. That's because when the security industry fixes the latest hole or comes up with a new technology to stop the newest threat, spammers simply move onto another. more

Cybersecurity Workforce Needs to Grow 145% to Close Skills Gap Worldwide, Says New Study

The cybersecurity workforce needs to grow by 145% to close the skills gap and better defend organizations worldwide according to a report released by (ISC)², a nonprofit membership association of certified cybersecurity professionals. more

Undone! Failure of Persuasion in UDRP Proceedings

A split Panel in an early decision under the Uniform Domain Name Dispute Resolution Policy (UDRP) held that parties deserve more than "[i]t depends [on] what panelist you draw." Time Inc. v. Chip Cooper, D2000-1342 (WIPO February 13, 2001). That's one side of the paradigm; the other side makes demands on the parties to prove their contentions, either of cybersquatting (one element of which is proving that respondent lacks rights or legitimate interests) or rebutting the claim (one element of which is respondent demonstrating it has rights or legitimate interests). more

Comments on Economics Study of ICANN’s New TLDs

ICANN has taken another crack at the question of the economics of launching new top-level domains (TLDs). The first report that the group commissioned on the subject was greeted by a loud and unhappy uproar. Now we have the preliminary draft of a new report, this one by professors Katz, Rosston, and Sullivan. It is insightful and analytic, but the final version needs to consider the theoretical and empirical issues... more

Human Network, Human Challenges

It has now been about eight months since I joined the Internet Society as the Director of Deployment & Operationalization and I still get asked on a fairly regular basis "what do you do?" Well, with ISOC's Chief Internet Technology Officer Leslie Daigle's recent departure, and with my time here having exceeded both my first 120 days and my first 6 months, this seems like the right moment to reflect on my brief tenure here so far and perhaps pontificate a bit on where we're going - and why. more

Showing our Ethos with .ORG

I recently stepped into a new role as Chief Purpose Officer of Ethos Capital, a specialized investment firm focused on helping companies drive growth and transformation through technology. In doing so, we are committed to operating ethically, responsibly, and in the best interests of all stakeholders, including employees, customers, vendors and the broader community. more

So, You Claim to Have an Unregistered Mark! Is there Cybersquatting?

Complainants have standing to proceed with a claim of cybersquatting under the Uniform Domain Name Dispute Resolution Policy (UDRP) if the accused "domain name is identical or confusingly similar to a trademark or service mark in which the complainant has rights" (4(a)(i) of the Policy). Quickly within the first full year of the Policy's implementation (2000) Panels construed "rights" to include unregistered as well as registered marks, a construction swiftly adopted by consensus. more

ITU’s Wise WTSA DOA Decision

The venerable old International Telecommunication Union (ITU) tradition finished up yesterday. Indeed, very late yesterday. The 568 representatives from 92 National Administrations met in a Tunisian town on the Mediterranean to make some key decisions about intergovernmental standards meetings for the next four years -- a body known as the WTSA (World Telecommunications Standardization Assembly). In the end, they avoided what could have been a dreadful mistake and emerged a better organization. more

Thinking Ahead on Privacy in the Domain Name System

Earlier this year, I wrote about a recent enhancement to privacy in the Domain Name System (DNS) called qname-minimization. Following the principle of minimum disclosure, this enhancement reduces the information content of a DNS query to the minimum necessary to get either an authoritative response from a name server, or a referral to another name server. more

The Path Towards Centralization of Internet Governance Under UN: Part 1

This essay is the first of a three-part series, written by Anonymous, and published by the Publius Project of the Berkman Center for Internet and Society at Harvard University. It focuses on the steps of a possible roadmap for centralizing Internet governance under the United Nations. more

TV White Spaces Just the Beginning: Secondary Use of the Spectrum

Yesterday, the US Federal Communications Commission (FCC) voted to allow qualified devices to operate on a license-exempt basis in unused portions of TV channels 2-51, spectrum commonly referred to as "TV white spaces." A lot has already been written about this move... But what is missing in these discussions is the bigger picture. more

The Changing Mobile World

Today's Internet is undoubtedly the mobile Internet. Sales of all other forms of personal computers are in decline and the market focus is now squarely on tablets, "smart" phones and wearable peripherals. In 2014 these providers sold 1.5 billion such devices into the global consumer market, and doubtless 2015's numbers will be greater. Half of all Internet-visible devices are now mobile devices and they generate 75% of all access provider revenues. more

IETF Chair’s Statement On Security, Privacy And Widespread Internet Monitoring

This weekend Jari Arkko, Chair of the Internet Engineering Task Force (IETF), and Stephen Farrell, IETF Security Area Director, published a joint statement on the IETF blog titled: "Security and Pervasive Monitoring"... They go on to outline some of the IETF's general principles around security and privacy as well as some of the new developments. They also point out a vigorous (and still ongoing) discussion within the IETF around how to improve the security of the Internet in light of recent disclosures. more