The Uniform Domain Name Dispute Resolution Policy now has seventeen years of history. A high percentage of disputes are indefensible and generally undefended. As the history lengthens, early registrants of dictionary word-, common phrase-, and arbitrary letter-domain names have been increasing challenged in two circumstances, namely by businesses who claim to have used the unregistered terms before respondents registered them and later by emerging businesses with no history prior to the registrations of the domain names. more
Singapore government has waived telecom frequency fees for 5G trials until December 2019 in order to catalyze market growth and discovery of potential use cases. more
At least 21 news sites critical of the government in Egypt, including the Qatari channel Al-Jazeera and Huffington Post’s Arabic-language site HuffPost Arabi, have been blocked. more
The team behind the free networking software Samba has issued and emergency patch for a remote code execution vulnerability. more
Just as the number of domain names and domain name disputes have expanded significantly in recent years, so, too, has WIPO's "Overview," which has been updated to address the growing complexity of cases under the Uniform Domain Name Dispute Resolution Policy (UDRP). WIPO has just published the third edition of its "WIPO Overview of WIPO Panel Views on Selected UDRP Questions" -- commonly referred to as "WIPO Jurisprudential Overview 3.0." more
Hundreds of country and territory domain names are likely to be finally released this year based on the new resolution that calls for ICANN to take "all steps necessary" to do so. more
I like a conference that's "Live". Not just a lively crowd coalescing together to passionately discuss and debate matters of common interests, but more so in the sense of physical presence: things you can feel and touch. In the case of the TM Forum Live! 2017 event, held last week at Nice, France, it's the Catalyst Pavilions where innovative solutions, best practices, and even exploratory experimentations were on full display. Do I mean that for an IT Operation Support Systems (OSS) and Business Support Systems (BSS) trade show, you can touch it? Yep. more
The U.S. Federal Communications Commission voted 2-1 on Thursday to advance a Republican plan to reverse the Obama administration's 2015 'net neutrality' order. more
It is not much of an exaggeration to say that the Digital Millenium Copyright Act of 1998 makes the Internet as we know it possible. The DMCA created a safe harbor that protects online service providers from copyright suits so long as they follow the DMCA rules. One of the rules is that the provider has to register with the Copyright Office to designate an agent to whom copyright complaints can be sent. The original process was rather klunky; send in a paper form that they scan into their database, along with a check. more
Google today announced a fully-managed Google Cloud Platform (GCP) service called Google Cloud IoT Core, aimed at allowing companies to securely connect and manage IoT devices at scale. more
Is there any act more primary than naming? It comes before all else and makes possible what follows. For the most part, names are drawn from cultural assets: collections of words, geographic locations, family names, etc. They can be valuable, which is why they are guarded, protected, and hoarded. The balancing of rights among those competing for names is a deliberate feature of the Uniform Domain Name Dispute Resolution Policy (UDRP). more
Bell Canada, nation’s largest telecommunications company, disclosed late on Monday the illegal access of Bell customer information by an anonymous hacker. more
"If investment is the FCC's preferred metric, then there's only one possible conclusion: Net Neutrality and Title II are smashing successes," says Free Press Research Director S. Derek Turner, author of a new report released by the consumer advocacy group. more
The recent heavy news coverage of WannaCry has overshadowed the latest WikiLeaks release of critical CIA malware documentation: user manuals for two hacking tools named AfterMidnight and Assassin. more
WannaCry, originated firstly in state projects but spread by other actors, has touched upon myriads of infrastructure such as hospitals, telecommunication, railroads that many countries have labelled as critical. IT engineers are hastily presenting patching codes in various localized versions. The other patch needed, however, is more than technical. It is normative and legislative. The coding of that patch for a situation like this is in two layers of dilemma. more