The law set by U.S. Government for all agencies to fully remove the controversial Russian based Kaspersky Lab security software by October is proving a lot harder than anticipated. more
U.S. Republican politicians on Thursday introduced a bill that would require Internet service providers and network operators to track the use of and maintain records for their publicly accessible wired and wireless networks. Two bills have been introduced... Each of the bills carries the title "Internet Stopping Adults Facilitating the Exploitation of Today’s Youth Act," and is referred to as the "Internet SAFETY Act." more
Judging from the development of the Internet in the world, the popularity rate of domain names is one of the primary parameters to measure whether the Internet is well developed or not in a country. The popularity rate of domain names is 11 percent in North America and reaches as high as 12.5 percent in Europe, while in China, which has over 20 million enterprises, there are only more than 300,000 domain names under .CN and the total number of domain names is only 1.187 million, including a lot of governmental and individual websites. more
Are you interested in helping guide the future of the Public Interest Registry (PIR), the non-profit operator of the .ORG, .NGO and .ONG domains? Or do you know of someone who would be a good candidate? If so, the Internet Society is seeking nominations for three positions on the PIR Board of Directors. Read more for details if you are interested in being considered as a candidate or know of someone who should be considered. more
I stumbled upon a study conducted by Microsoft eons ago back in the paleolithic era of search; 2012... It is about how "premium domains" are perceived by the consumer when seeing them in the search results compared to a lower value "non-premium" domain. I like to use quotations sparingly, but I felt it was necessary because the varying opinions on premium v non-premium domains is a bridge I do not want to cross in this post. more
It, perhaps, does not have to be said that cybersquatting is an intentional tort. No one would expect the respondent to admit unlawful intention, but complainant's proof must nevertheless support that contention. The Panel in Hästens Sängar AB v. Jeff Bader / Organic Mattresses, Inc. FA2005001895951 (Forum July 31, 2020) reminds us that it takes more than bad faith use of a domain name to find cybersquatting. more
In May 2013, President Obama picked Tom Wheeler to head the Federal Communication Commission. The Internet community generally disapproved because Wheeler had been a lobbyist for both the cellular and cable industries and a major contributor to the Obama campaign. Internet service providers AT&T and Comcast lauded the appointment and a few months later, the President was spotted playing golf with Brian Roberts, chief executive of Comcast. more
I wonder how much botnets reuse IP addresses. Do they infect a system and spam, get blocked, discard the IP and move onto the next (new) one? This means that they have a nearly unlimited supply of IP addresses. Or do they infect a system and spam, get blocked, and then let it go dormant only to awaken it some time later? I decided to take a look. more
The much-maligned Uniform Rapid Suspension System (URS) is not only failing to catch on -- it's actually starting to fade. Once envisioned as a popular rights-protection mechanism for trademark owners under the new generic top-level domain names (gTLDs), the URS instead is seldom used. In fact, despite the growth in new gTLD registrations, the URS is in decline. more
DMARC is extremely useful, yet I've heard some vendors are putting their implementations on hold because of the IETF DMARC working group. You really shouldn't wait though -- it's been in wide use for nearly three years, enterprises are looking at DMARC for B2B traffic, and the working group charter is limited in it's scope for changes. Let's compare this to a similar situation in the past. more
With advancements in hardware and software, sophisticated filtering technologies are increasingly being applied to restrict access to the Internet. This happens at the level of both governments and corporations. .. given the open nature of the trust-based Internet, one country's restrictions, if not handled very carefully, can easily foul the global Internet nest we all live in. This blog is about one such story of Internet restrictions in China becoming visible (seemingly at random) from other parts of the world and going undetected for 3 weeks. more
Back in the 1980s, everyone used the Lotus 1-2-3 spreadsheet on their PCs. In 1989, Borland released a competitor, Quattro Pro. It used the same menu commands as 1-2-3 so that users could import their 1-2-3 spreadsheets with keyboard macros. Lotus sued Borland, and after a loss in the district court, Borland won on appeal, arguing that the keyboard commands are a "method of operation" and not subject to copyright. Lotus appealed to the Supreme Court... more
The Wall Street Journal is reporting the terms of a yet unannounced deal which will finance a massive rollout of WiMax by a Sprint-Clearwire joint venture. Outside funding is to be provided by Intel, Google, Comcast, and Time Warner Cable as well as Bright House, a small cable company. Assuming the deal is for real, this is good news for US users of broadband and, indirectly, other users around the world. more
In partnership with Momentum event group, CircleID will be updating this page to provide up to date information for the Digital Marketing & gTLD Strategy Congress taking place in London, September 26 - 27, 2013. more
ICANN's response to the European Union's Network and Information Security Directive (NIS2) is a litmus test on whether its policy processes can address the needs of all stakeholders, instead of only satisfying the needs of the domain industry. Early indications from the ICANN Hamburg meeting point to another disappointment for law enforcement, cybersecurity professionals, and the many businesses seeking to reinstate WHOIS as required by NIS2. more