US hospitals have been severely affected by a substantial cyberattack, leading to the closure of emergency rooms in multiple states and the redirection of ambulances. more
In the case of Avon Products, Inc. v. Jenika Mukoro, Heirs Holdings, a 3-member WIPO Panel denied the Complainant's efforts to have the domain name avonhealthcare.com transferred because the Complainant failed to sustain its burden of establishing that the Respondent had no rights or legitimate interests in the disputed domain name. The Panel found that the Complainant proved that its trademark AVON (which has been in use since 1929) is well-known in the field of cosmetics... more
I've always been impressed by the marketing folks at the big cable companies. They are masters of extracting money from customers willing to pay for better broadband. The latest example comes from Comcast. The company is introducing a new product in the Northeast that offers faster upload speeds -- for a price. Comcast knows that its biggest weakness is upload speeds. more
Tel-Aviv, Israel was rejected as a possible venue for one of ICANN's 2020 public meetings due to its proximity to the Gaza strip and the escalation of an Iran/Israel conflict. more
You can't put the telecom sector into perspective without looking at the performance of the biggest players in the industry. The pandemic has been an interesting year for both big ISPs and telecom vendors. Smaller ISPs should care about big ISP performance for many reasons. For many smaller companies, the big companies are the competition, and the big providers' strength or weakness can foretell stiffened competition or increased opportunity. more
Pingdom has conducted a study on how today's two billion internet users around the world are spread over different time zones. Study found two time zones stand head and shoulders above the others in terms of the amount of Internet users they contain: UTC+8, which passes through eastern Asia, and UTC+1, which passes through Europe and Africa. more
During the recent pandemic, many homes came face-to-face with the realization that their home broadband connection is inadequate. Many students trying to finish the school year and people trying to work from home found that their broadband connection would not allow them to connect and maintain connections to school and work servers. Even families who thought they had good broadband found they were unable to maintain multiple connections for these purposes. more
When you plug into a broadband socket, what you are accessing is a distributed computing service that supplies information exchange. What is the service description and interface definition? For inspiration, we can look at the UK power plug. One of the great unsung fit-for-purpose innovations in British society is the BS1363 13 ampere power plug and socket. This is superior to other plugs by virtue of its solid construction and safe design. more
The only Cyber law passed in Pakistan till date is the famous ETO-2002 (Electronic Transaction Ordinance - 2002). It required Ministry of IT&T to set up a Central Repository for all digital certificates and in addition to set up a body to be named as Electronic Certification Accreditation Council (ECAC) to accredit Electronic Certification Authorities to be established in the country... In this regard, government has not only closed its eyes and has blindly trusted the only certificate authority (CA) in the country operated by a private business group, it has also mandated the citizens and business to trust it. Case in point is Central Board of Revenue (CBR) that has told all taxpayers to digitally sign the emails using the certificates issued by this private party... more
U.S. National Security Agency Director, Army Gen. Paul M. Nakasone, has announced the formation of the AI Security Center, a new entity designed to oversee the development and integration of artificial intelligence within the nation's security systems. more
ICANN and the mobile network operators trade body, GSM Association (GSMA) today signed a Memorandum of Understanding (MoU) at the Mobile World Congress being held this week in Barcelona. more
In the final of my three-part post series about how to protect your trademark against misuse, I will focus on proactive searching and policing and the benefits these can provide to brand owners. ... Proactive searching and policing of your brand is a prudent step in making sure your name is protectable. This is an advisable first step in naming a product or service. more
The small West African country of Benin has been working quietly over the past few years to become a regional hub for international fibre bandwidth. The national telco, Benin Telecoms (BT) has been building terrestrial fibre routes to landlocked neighbouring countries such as Burkina Faso and Niger, allowing them to connect to its landing station for the SAT-3/WASC cable, the only one serving the region. more
German companies have suffered substantial financial losses due to cybercrime and sabotage, totaling approximately €267 billion ($298 billion) over the past year. This represents a 29% increase compared to the previous year, according to a survey released on Wednesday by the industry association Bitkom. more
More than two months after authorities shut down a massive Internet traffic hijacking scheme, the malicious software that powered the criminal network is still running on computers at half of the Fortune 500 companies, and on PCs at nearly 50 percent of all federal government agencies, new research shows," reports Brian Krebs. more