What should we do with software patents? I've seen both sides of the debate, as I work a great deal in the context of standards bodies (particularly the IETF), where software patents have impeded progress on a community-driven (and/or community-usable) standard. On the other hand, I have been listed as a co-inventor on at least 40 software patents across more than twenty years of work, and have a number of software patents either filed or in the process of being filed. more
Craig Moffett sees this as I do: "If LTE networks are going to be usage-capped, then the last pretense that LTE can be positioned as a substitute for terrestrial broadband would seem to be gone." The heart of the U.S. broadband plan is to release more spectrum - enough for 10-20 networks like Verizon's LTE now building - and pray that will be enough competition in five to seven years to check price increases. more
The granddaddy of Pay TV programmers continues to create ground-breaking content especially with its new series "Veep". The edgy new sitcom produces uninterrupted and raunchy situations for a fictional Vice President who cannot get out of her own way, making it hilarious and award-winning. Yet, HBO GO is tied to Cable TV/Satellite economics by an umbilical cord that will be hard to break. more
This essay is the first of a three-part series, written by Anonymous, and published by the Publius Project of the Berkman Center for Internet and Society at Harvard University. It focuses on the steps of a possible roadmap for centralizing Internet governance under the United Nations. more
Earlier this year, I wrote about a recent enhancement to privacy in the Domain Name System (DNS) called qname-minimization. Following the principle of minimum disclosure, this enhancement reduces the information content of a DNS query to the minimum necessary to get either an authoritative response from a name server, or a referral to another name server. more
Just in case you've been out of the country for the last 12 months, a new scourge is hitting the Internet and the world of email and it's called phishing. The Anti-Phishing Working Group defines phishing as identity theft "attacks using 'spoofed' e-mails and fraudulent Websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords..." According to various experts, the incidents of phishing are rising at an alarming rate: there were 13,000 unique phishing attacks in January alone - that's a 42 percent surge over the previous month. The real problem is that phishing works. more
Today's Internet is undoubtedly the mobile Internet. Sales of all other forms of personal computers are in decline and the market focus is now squarely on tablets, "smart" phones and wearable peripherals. In 2014 these providers sold 1.5 billion such devices into the global consumer market, and doubtless 2015's numbers will be greater. Half of all Internet-visible devices are now mobile devices and they generate 75% of all access provider revenues. more
Announced today, Google Inc. along with the New America Foundation's Open Technology Institute, PlanetLab Consortium, and academic researchers are launching a new initiative called Measurement Lab, or M-Lab. According to Google's announcement, M-Lab is an open, distributed server platform for researchers to deploy Internet measurement tools. "The goal of M-Lab is to advance network research and empower the public with useful information about their broadband connections. By enhancing Internet transparency, M-Lab helps sustain a healthy, innovative Internet." more
The Canadian International Pharmacy Association (CIPA) has posted here previously about the realities of people using the Internet today to purchase prescription medications. We've written extensively about the importance of access to safe online pharmacy websites -- run by licensed, legitimate pharmacies -- dispensing legally manufactured maintenance drugs to individuals with valid prescriptions. more
On March 25th, 2016, the Ministry of Industry and Information Technology (MIIT) officially posted its revisions to the "Chinese Measures for the Administration of Domain Names" (2016 edition) for public comment. A decade has gone by since the latest administration measures were introduced in 2004 (2004 edition). Registries and registrars have been longing to see this update for a while, and it is therefore no surprise that the new edition has drawn substantial attention at home and abroad. more
This weekend Jari Arkko, Chair of the Internet Engineering Task Force (IETF), and Stephen Farrell, IETF Security Area Director, published a joint statement on the IETF blog titled: "Security and Pervasive Monitoring"... They go on to outline some of the IETF's general principles around security and privacy as well as some of the new developments. They also point out a vigorous (and still ongoing) discussion within the IETF around how to improve the security of the Internet in light of recent disclosures. more
Recent comments on the name collisions issue in the new gTLD program raise a question about the differences between established and new gTLDs with respect to name collisions, and whether they're on an even playing field with one another. Verisign's latest public comments on ICANN's "Mitigating the Risk of DNS Namespace Collisions" Phase One Report, in answering the question, suggest that the playing field the industry should be concerned about is actually in a different place. The following points are excerpted from the comments submitted April 21. more
The venerable old International Telecommunication Union (ITU) tradition finished up yesterday. Indeed, very late yesterday. The 568 representatives from 92 National Administrations met in a Tunisian town on the Mediterranean to make some key decisions about intergovernmental standards meetings for the next four years -- a body known as the WTSA (World Telecommunications Standardization Assembly). In the end, they avoided what could have been a dreadful mistake and emerged a better organization. more
A split Panel in an early decision under the Uniform Domain Name Dispute Resolution Policy (UDRP) held that parties deserve more than "[i]t depends [on] what panelist you draw." Time Inc. v. Chip Cooper, D2000-1342 (WIPO February 13, 2001). That's one side of the paradigm; the other side makes demands on the parties to prove their contentions, either of cybersquatting (one element of which is proving that respondent lacks rights or legitimate interests) or rebutting the claim (one element of which is respondent demonstrating it has rights or legitimate interests). more
Sometimes you get what you are asking for. And this seems to be one of those occasions... and the US government can give itself a pat on the back for having listened to other stakeholder opinions. For years the world of Internet governance has been seen as its own special corner of the technosphere, full of arcane acronyms and quiet power deals. Despite efforts to make ICANN and the broader Internet community more transparent and user-friendly, many observers, including many African governments, still saw the stage as too much of an insider's game -- with the ultimate insider being the US Department of Commerce. more