/ Most Viewed

The Need for Major Structural Changes

In keeping with the discussion that I have been involved in over the last decade, 'structural changes' should be today's key phrase - not just for the telecoms sector but for every sector in our economies. It has been clear for a long time that structural change is well overdue. It doesn't really matter which sector you pick, you will see that some of these reform debates go back at least a decade - and often longer -- in healthcare, education, environment, energy, finance and banking and media. more

Much Ado About Nothing

With much fanfare last month, Uniregistry announced that proposals for dispute resolution between New TLD applicants in lieu of ICANN's so-called "Auction of Last Resort" posed significant antitrust risks. Their claim of concern was not based on any critical antitrust analysis, but rather on the fact that they had sought a "Business Review" letter from the Antitrust Division of the U.S. Department of Justice (DOJ), and, according to Uniregistry, the DOJ failed to provide them a positive response and discussed the issue with them. more

Long-held Domain Names Transferred to Complainants

There has lately been a number of long-held investor registered domain names transferred to complainants under the Uniform Domain Name Dispute Resolution Policy (UDRP). Two of the domain names were registered 23 years ago. This has provoked several commentators to complain that the UDRP is tilted in favor of mark owners and trademark-friendly panelists expressing hostility to the domain industry. I think we have to dig deeper than this. more

It’s Official: Value Moving to Edge

It's official. A team of market analysts from Oppenheimer are saying [PDF] what I've been saying since 1997, that the apps are separating from the network, and this is driving a wave of "explosive innovation." more

Blaming Technology and the Rule of Law

Imagine that Ford was held responsible every time one of its Mustangs broke the speed limit. Imagine that the company responded by limiting the speed of its vehicles to 65 MPH, or that the company was required by the government to report every speeding car to highway patrol. It sounds far-fetched, but is actually a good metaphor for the way that many want technology companies to respond to infractions. more

Phishers Expand Number of Top Level Domains Abused, Policy Changes Found Effective in Prevention

The new Global Phishing Survey released by the Anti-Phishing Working Group (APWG) this month reveals that phishing gangs are concentrating their efforts within specific top level domains (TLDs), but also that anti-phishing policies and mitigation programs by domain name registrars and registries can have a significant and positive effect. The number of TLDs abused by phishers for their attacks expanded 7 percent from 145 in H2/2007 to 155 in H1/2008. The proportion of Internet-protocol (IP) number-based phishing sites decreased 35 percent in that same period, declining from 18 percent in the second half of 2007 to 13 percent in the first half of 2008. more

Ask Not What ICANN Can Do for You, But What You Can Do for ICANN

In recent weeks, you may have seen several articles asking that "ICANN", the Internet Corporation for Assigned Names and Numbers, move more expeditiously to open up the next application window for new gTLDs. As one commenter wrote "Ask a Board member or ICANN staff when they expect the next application window to open, and they will inevitably suggest 2020 -- another three years away. more

Internet Society Activities at EuroDIG 2016: Trust, Collaborative Security, Zero Rating and More…

Over the next two days (9-10 June), the European Dialogue on Internet Governance (EuroDIG) takes place in Brussels, Belgium. With a theme of "Embracing the digital (r)evolution", EuroDIG has a full agenda and Internet Society staff will be participating in many aspects of the programme. For us, a primary focus will be at 11:30 CEST (UTC+2) on Thursday, June 9, when our President and CEO Kathy Brown opens the first Plenary with a keynote speech. more

So, How Big Is the Internet?

The results of an excellent study made, for reasons that will become clear, by an anonymous author reaches this conclusion... The problem is, to make the study, the author created a botnet - that is he wrote a small program that took advantage of insecure devices to enlist additional machines to help in the study. more

The Web’s Benevolent Dictators

Jeffrey Rosen has a great article in the New York Times Magazine this weekend titled Google's Gatekeepers. In it he deals with the question of whether we are becoming too overly dependent on a few big web companies like Google – and whether it's wise over the long run for us to trust their team of (currently) very nice, well-meaning people who are trying hard to do the right thing when faced with government censorship demands and surveillance pressures. He writes... more

Malware Reach Is Expanding, Ransomware on the Rise

We live in an online age, one where malware infections have become commonplace. Some might say this is the price of doing business online. News headlines report damaging attacks on well-known brands with depressing regularity. Consumer confidence suffers as customers look to organizations to sort out the issue, secure their transactions and fix the problem. more

Dealing With Non-Compliant Infringers – “The Other 50%”

I often read marketing material from Online Brand or Content Protection vendors, especially some of the newer ones, that make IP rights enforcement sound very straightforward. In some scenarios, given the correct processes are followed, this can be the case - using eBay's VERO program or similar offerings from the major legitimate platforms, counterfeit listings can be removed very quickly. more

Revisiting Internet Governance

You might recall that I played an advisory role to the World Conference on International Telecommunications (WCIT) in 2012 in Dubai. In the run-up to that event -- as well as during and after it -- I gave my opinion on the role of internet governance, plus an analysis of what was happening. At that time I held a more conciliatory position on the issue, but you may have noticed that, in the wake of the Snowden revelations and the illegal NSA activities, as well as many other similar activities from ASIO in Australia and no doubt the Russian, Israeli and Chinese authorities, my position has shifted significantly. more

Call for “ISP Point of Contact” Database for Neutrality “Event” Concerns

When I initiated NNSquad (Network Neutrality Squad), one of my primary concerns was that many seemingly reportable "events" that can occur on the Internet -- and that might seem on their face to be network neutrality "violations" -- might actually be caused by innocent technical issues related to ISP operations, testing anomalies, or misinterpretation of test or otherwise observed data. Analysis of these situations -- which may invoke security and privacy concerns -- can be quite complex, and without a reasonably complete picture of events can also be considerably problematic... more

Mobile Consolidation - A Threat to Competition

The global financial crisis and the very rapid growth in mobile broadband, thanks to smartphones, have combined to create havoc in the mobile market. On the one hand, we see that customers, especially those in countries seriously affected by the GFC, such as Southern Europe and Ireland, have reduced their mobile use, with the result that there has been a significant drop in Average Revenue per User (ARPU). On the other hand, phenomenal growth has taken place in mobile broadband, but without a significant increase in ARPU... more