/ Most Viewed

Will the Fast-Approaching Deadline for .brands Catch Many by Surprise?

29 July 2015 is a big day for .brands. It's the date when all ICANN Registry Agreements (RA) must be signed. Once the RA is signed, the fees to ICANN and your Registry Services Provider kick in. As certain as you can be that ICANN will begin sending invoices, you can also expect to receive increased scrutiny internally. Questions are inevitable. People will want answers; what is the plan for this thing? How does it fit into our long term corporate goals? Do marketing have a plan to use the TLD in the upcoming launch of our new product? more

Bangladesh Faces Total Internet Shutdown Amid Violent Student Protests

Bangladesh is experiencing a complete internet shutdown and severe mobile service disruptions due to escalating student protests that began earlier this week. more

ICANN Shows Safe Decisions Aren’t Always the Right Decisions

When ICANN selected Deloitte and IBM to provide technical database administration services for a key part of its new gTLD program, it became quickly clear that the choice was not made on whose proposals scored highest, but rather it was based on which partner presented the least perceived business risk but at a much higher than necessary cost. I know this because I wrote a response to the original RFP and as a result am pretty familiar with what the original specification required. more

Aligning Broadband and Healthcare

For many years I have been saying that in order to generate business cases that will support the developments of national broadband networks it is necessary to take into account the social and economic benefits of such investments. The reality is that these benefits do not show up on the balance sheets of the traditional telecoms infrastructure companies and this is a key reason they are reluctant to make such investments. more

Trademark Registrations on the ‘Supplemental Register’ Don’t Count (in Domain Name Disputes)

The Uniform Domain Name Dispute Resolution Policy (UDRP) has never required that a complainant own any trademark registrations to succeed in a domain name dispute, given that common law trademark rights (if properly established) are sufficient. But, as a pair of recent UDRP decisions reminds us, even some registrations are inadequate. The issue relates to the first element of every UDRP complaint, which requires the party seeking relief to prove that the "domain name is identical or confusingly similar to a trademark... more

From Concept to Reality: A Roadmap to Acquire Your gTLD in 2026

In today's rapidly evolving internet landscape, staying up-to-date with the latest developments and trends is crucial for businesses looking to strengthen their online presence. One highly anticipated development that organizations have eagerly awaited is the next round of new generic Top-Level Domains (gTLDs). more

Challenging UDRP Awards in Federal Court: Recent Outcomes

Challenging UDRP awards in actions under the Anticybersquatting Consumer Protection Act (ACPA) is infrequent though steady. There are currently a number of court filings in U.S. district courts that are in the early stages, most notably the ADO.com case reported on in an earlier essay and several others have either been referred to mediation (the IMI.case) or settled or discontinued. more

The Internet in Cuba - a Periodismo de Barrio Anthology

Periodismo de Barrio has edited a collection of 13 articles on the Cuban Internet in collaboration with the Internet Policy Observatory at the University of Pennsylvania. The articles cover the history of the Cuban Internet, the legal framework, services, communities, and projects. It is a diverse collection -- something for everyone. Here are thumbnail summaries of each article. more

Global Surveillance: Towards Convergence?

Built for the most part during the Cold War, surveillance systems on a global scale were considered a vital necessity with the onset of nuclear weapons, if only to keep Mutually Assured Destruction at bay. Today, these systems are also used for domestic surveillance and universal data harvesting, including on one's own citizens. Should we still consider these systems with the same reverence as if we were, say, in the midst of some Cuban Missile Crisis? more

Providers Eye OTT Content at The Independent Show 2013

The future of broadband was the main focus of The Independent Show 2013. In particular, the event highlighted how the convergence of video, phone, Internet, and wireless broadband is shaping the industry. As with previous years, the show focused strongly on the programming community and there was no shortage of new, emerging programming to keep attendees interested. One of the breakout sessions focused on the growth of high-quality over-the-top (OTT) content distribution and how NCTC members could take advantage of this trend to target subscribers drifting away from traditional cable. more

More on Private Auctions for New gTLDs

My recent post on private auctions for new gTLDs under contention generated many responses from applicants. Here I follow-up with answers to the questions raised... Many, but certainly not all, applicants have a strong motivation to participate in a private auction. This incentive is especially strong for domains for which the community, geographic, and other factors are not compelling. more

How To Build A Cybernuke

The Internet infrastructure has been having a bad month. Not as bad as, say, the world's aviation infrastructure, but bad enough. First, Chinese Internet censorship leaked out to a few massively unlucky users of the I root server. Then China Telecom failed to filter someone who leaked thousands of hijacked routes to other people's networks through them, probably by accident. And then, inexplicably, Forbes went where no one had gone before... more

Investigation Reveals Massive Security and Privacy Breaches Affecting Chinese Version of Skype

Canadian human-rights activists and computer security researchers have released a report on the extensive surveillance system in China that monitors and archives text conversations that include politically charged words. The research group, called Information Warfare Monitor, is a joint project of The SecDev Group, and the Citizen Lab, at the Munk Centre for International Studies, University of Toronto. The following are introductory excerpts from the study... more

Wireless Carriers Clashing with FCC Over Proposed Regulations on Mobile Advertising

US Federal Communications Commission is proposing privacy rules that wireless companies claim could hurt their ability to compete with the likes of Facebook and Google. more

Bug Bounty Programs: Are You Ready? (Part 1)

The premise of crowdsourcing the task of uncovering new bugs and vulnerabilities in an organization's web applications or consumer products sounds compelling to many. What's not to like with the prospect of "many eyes" poking and prodding away at a corporate system for a minimal reward -- and preemptively uncovering flaws that could have been exploited by hackers with nefarious intent? more