No, not the COVID curve - the curve of U.S. engagement in global industry 5G activities. Let me explain. What is known as 5G actually consists of a broad array of fundamentally revolutionary virtualization platforms that are constantly, collectively developed by industry in several dozen open global bodies. These bodies meet every few weeks, and several score companies around the world process scores to hundreds of input documents to produce many hundreds of effectively mandatory... more
With the COVID-19 pandemic persisting, online shopping will be the preferred method for the 2020 holiday shopping season. While staying home to shop is the safest option right now, it means consumers are more vulnerable to online fraud, counterfeits, and cyber crime. Increased online activity provides opportunities for unscrupulous infringers to abuse trusted brand names to drive visitors to their own fraudulent content. more
The Domain Name System (DNS) has become the fundamental building block for navigating from names to resources on the internet. DNS has been employed continuously ever since its introduction in 1983, by essentially every internet-connected application and device that wants to interact online. Emerging from an era where interconnection rather than information security was the primary motivation, DNS has gradually improved its security features. more
Donuts and Afilias announced today that Donuts is acquiring Afilias in a deal that is expected to close in December 2020 for an undisclosed amount. The combined entities will support over 25 million domain names spanning well over 400 TLDs. The deal will not include certain Afilias businesses, such as the mobile software and registrar businesses, which will remain with Afilias' original group of investors. more
Speculation in one form of another has an ancient and honorable history. It not only creates entrepreneurial activity but fuels markets for selling wares and offering services, but also generates competition for consumers and wars over loyalty. The commercialization of the Internet in the 1990s, which extended market activity into virtual (cyber) space, has many of the virtues of the actual but also its vices: cheating and fraud, and other skullduggery. more
The U.S. military is buying the granular movement data of ordinary people worldwide, harvested from innocuous-seeming apps, reports Motherboard. Among the apps connected to this type of data sale is a Muslim prayer and Quran app with more than 98 million downloads worldwide. more
The Electronic Frontier Foundation (EFF), along with over forty other cybersecurity experts and organizations, are urging the White House to keep politics out of securing this month's election in the U.S. more
SpaceX is now serving customers (aka beta testers) in the northern United States. They will soon be doing so in Southern Canada and recently announced that Germany, where they have applied for permission and have begun construction on two ground stations, will probably be next. Early customers in the US are paying $499 for their user terminals and $99 per month for Internet service. more
It was interesting to see that, albeit belatedly, the American media started to stop giving Trump opportunities to spew out his lies across the country and beyond. It obviously had now reached a point where the media realized that if they continued to provide Trump with their avenues, this would make them accomplices in inciting violence. Is this going to be a turning point? more
On August 30, CenturyLink experienced a major network outage that lasted for over five hours and disrupted CenturyLink customers nationwide as well as many other networks. What was unique about the outage was the scope of the disruptions as the outage affected video streaming services, game platforms, and even webcasts of European soccer. more
The Silent Librarian advanced persistent threat (APT) actors have been detected once again, as the academic year started in September. With online classes increasingly becoming the norm, the group's phishing campaigns that aim to steal research data and intellectual property could have a high success rate. Dozens of phishing domain names have been reported, although some may have already been taken down. more
In the first article in this two-part series, we looked at the impact of brand abuse and infringements against intellectual property (IP) on an organization's brand value. In this second article, we delve into how action against enforceable infringements can deliver tangible return on investment (ROI) for a brand, and demonstrate the importance of a robust brand protection program. more
In this two-part blog series, we take a closer look at brand abuse and intellectual property (IP) infringements. In this first article, we explore the components making up a company's IP and how online content can affect a brand's value, both actual and perceived... The IP held by an organization -- i.e., the portfolio of brands, trademarks, and other intangible assets that provide it with its distinctiveness, and protect it from unfair competition in the marketplace... more
Marilyn Cade was an exceptionally hardworking, always gracious leader in ICANN and IGF. She was a strong supporter of U.S. interests at ITU and a member of the U.S. delegation at the WCIT. Dozens have spoken of her at a memorial site, including Vint Cerf: "Marilyn was an elemental force in the ICANN, IGF and policy worlds. She was an advocate who could be counted upon to speak passionately for the causes to which she was dedicated..." more
On February 2, 1989, the Soviet Union launched its Cosmos 2004 satellite and the Chinese launched a rocket on December 15, 2009. Cosmos 2004 is now defunct, as is the third stage of that Chinese rocket, but both remain in orbit. They were long forgotten until recently when LeoLabs, a satellite tracking service, predicted that they had a good chance of colliding at 971 km over the sea near Antarctica. more