/ Recently Commented

What Trademark Owners Need to Know to Avoid Reverse Domain Name Hijacking

A cybersecurity company recently attempted reverse domain name hijacking for an exact match domain name of its brand, and in so doing, failed in both its bid to take ownership of the domain and potentially damaged their reputation by using this somewhat nefarious tactic and abusing the Uniform Domain Name Dispute Resolution Policy (UDRP) process. more

Don’t Kid Yourself, dotCOM Is King for Branding Your Business

There are now more than 1,000 top-level domains (TLDs), but which is best for branding yourself or your business? With search engines, does it even make a difference? What does it matter which TLD you chose as long as you rank high enough on Google? That is what many would have you believe, but there is one power greater than any search engine... At one time, my brother and I owned Rate.com. more

Addressing Anticompetitive Behavior in Internet Standards Bodies

A significant focus is emerging today on the anticompetitive behaviour of Silicon Valley companies directed at dominating critical sectors of the on-line marketplace, and a U.S. Congressional hearing is scheduled. Such practices can be pursued in many ways. One of the more elusive, but very effective anticompetitive playbooks - known legally as the "antitrust conspiracy" - can occur in internet standards bodies. more

DNS: An Essential Component of Cloud Computing

The evolution of the internet is anchored in the phenomenon of new technologies replacing their older counterparts. But technology evolution can be just as much about building upon what is already in place, as it is about tearing down past innovations. Indeed, the emergence of cloud computing has been powered by extending an unlikely underlying component: the more than 30-year-old global Domain Name System (DNS). more

The State of DNS Abuse: Moving Backward, Not Forward

ICANN's founding promise and mandate are optimistic -- ensure a stable and secure internet that benefits the internet community as a whole. Recent months, however, have highlighted the uncomfortable truth that ICANN's and the industry's approach to DNS abuse is actually moving backward, ignoring growing problems, abdicating on important policy issues, and making excuses for not acting. Further, the impending failure of ICANN's new WHOIS policy to address cybersecurity concerns will add fuel to the fire, resulting in accelerating DNS abuse that harms internet users across the globe. more

Senate Report on 5G: Recipe for Disaster

The Democratic Staff Report Prepared for the use of the Committee on Foreign Relations United States Senate, July 21, 2020, entitled "The New Big Brother," is actually all about 5G technology. The report jumps on the runaway anti-China train chaotically flailing around Washington these days to "out-Trump, Trump." It characterizes 5G technology, longstanding international collaboration, and COVID-19 tracking as all part of a global conspiracy for "digital authoritarianism" run out of Beijing. more

Beware of Abandoned Domain Names in this Turbulent Time and as the Global Economy Changes

The outbreak of COVID-19 has caused worldwide disruption -- for whole nations and their economies. Unfortunately, there will be some side effects for businesses. A number of brands will disappear from the streets and shelves, as businesses that fail to weather the storm will have to fold. Companies that do survive will likely focus more on their core markets, pulling brands out of higher risk, less profitable markets... more

Macro Musings for Digital Strategies Using Unstructured Data

When Doug Dawson wrote his article in February on Artificial Intelligence, he felt that #ai is saddled with too much hype as is its current counterpart, 5G. Certainly, there is a great deal of technology out there that deserves the hype and others that do not. After receiving a certification (Intro to AI) from IBM (while using Watson), I'm here to share that artificial intelligence, and its subsets of machine learning and deep learning definitely deserve a soundbite. more

Explaining the Legal Enforceability of the PIC Proposed by Ethos for .ORG

Ethos Capital has recently announced that it has voluntarily proposed to add an amendment to Public Interest Registry's (PIR) .ORG Registry Agreement with ICANN in the form of a Public Interest Commitment, also known as a "PIC." In the press release Ethos indicated that the PIC would become "legally binding" and "enforceable" both by ICANN and by members of the community. I anticipate that some would ask a number of logical questions: How would that work in practice? more

Freedom of Expression Part 1: Hate Speech, Linehan, Trans as a Protected Class in California

Graham Linehan was banned from Twitter last week. Graham Linehan is an Irish writer and creator of Father Ted and Black Books. Twitter closed Graham Linehan's account for tweeting "men aren't women though" which twitter perceived as "hate speech" and offensive to the Trans community. Context always shapes meaning, and so I thought it would be useful to explore how hate speech is interpreted in California and then to see how it is treated in Fiji. more

Cybersecurity Is Failing Big-Time and This Is Hard to Fix

It has become clear that having a big cybersecurity war room is not enough to deliver true end-to-end security throughout the complex networks, systems and structures on which our modern society is based. Furthermore, looking at the forever changing draconian government interventions in this space, it is also obvious that they are often stabbing in the dark. more

Is Booking.com a Generic Term?

A fundamental rule of trademarks is that they have to be distinctive, and that nobody can register a trademark on a generic term like "wine" or "plastic." In a case decided today by the U.S. Supreme Court, the court decided 8-1 that online travel agent Booking.com could register its domain name as a trademark. In this case, I think the majority got it wrong, and Justice Breyer's lone dissent is correct. more

Many Libraries Still Have Slow Broadband

During the recent pandemic, many homes came face-to-face with the realization that their home broadband connection is inadequate. Many students trying to finish the school year and people trying to work from home found that their broadband connection would not allow them to connect and maintain connections to school and work servers. Even families who thought they had good broadband found they were unable to maintain multiple connections for these purposes. more

Japan Fueling China’s Leap to 5G, but for How Long?

As the U.S. is making it tough for American companies to help China roll out super-fast cellular networks, Japan, a U.S. ally, is fueling China with parts needed to blanket the nation with 5G cellular service. more

Marking the 30th Anniversary of the Internet and Cybersecurity Treaty

Next week on 1 July 2020 marks the 30th anniversary of one of the most significant treaty instruments in modern times. On 1 July 1990, the Melbourne Treaty came into force as the first and only global treaty that enabled worldwide internets and mobile networks to exist, together with the cybersecurity provisions designed to protect those infrastructures. The achievement remains as an enduring tribute to Richard Edmund Butler of Australia who was one of the most influential, and best-loved Secretaries-General of the ITU. more