/ Most Commented

The Supreme Court Decides that Compatible Software is Still Legal

Back in the 1980s, everyone used the Lotus 1-2-3 spreadsheet on their PCs. In 1989, Borland released a competitor, Quattro Pro. It used the same menu commands as 1-2-3 so that users could import their 1-2-3 spreadsheets with keyboard macros. Lotus sued Borland, and after a loss in the district court, Borland won on appeal, arguing that the keyboard commands are a "method of operation" and not subject to copyright. Lotus appealed to the Supreme Court... more

gTLDs Under the Microscope in Q1 2021: .kpmg Back in Focus and a Look at Past Launches

With the end of March upon us already, we take a fresh look at .kpmg and its ongoing .brand usage strategy in our first quarterly report of the year. A review of Alexa.com rankings for .brands and other new gTLDs is included as well as an examination of the factors that have affected registration rates for new gTLD launches from 2019 and 2020. Our MarkMonitor team of experts also analyzes the ICANN Final Report on the new gTLD Subsequent Procedures Policy Development Process... more

Time to Start Calling Facebook “The Dark Empire” and Regulate It Accordingly

It appears people, governments, regulators and legislators worldwide may have forgotten Facebook's complicit involvement with Cambridge Analytica (CA). It is possible that new priorities such as the Covid-19 pandemic in 2020 may have pre-occupied them, and rightly so. But an unprecedented data breach in 2019 unfolded this weekend, bringing a recurring nightmare of the past back into today's reality. more

Time of Registration in Determining Cybersquatting

While Panels under the UDRP and judges under the ACPA draw upon a similar body of principles in determining infringement -- both mechanisms, after all, are crafted to combat cybersquatting -- and though arbitration panels and judges undoubtedly view alleged tortious wrongdoing by abusive registrations of domain names through similar lenses and apply laws that may be outwardly similar, each protective mechanism has developed its own distinct and separate jurisprudence. more

The $100 Billion National Broadband Plan for America

The new Administration in the USA laid out a $100 billion proposal for broadband investment as part of its $2 trillion infrastructure plan. Under the proposal, the plan is to provide national broadband coverage. The Administration will use better competition measures, such as price transparency, the use of public utility infrastructure, and subsidies for low-income households to achieve its goals. more

$400B China-Iran Deal Includes a $Billion 4G-5G Network, Most Likely Huawei

China has agreed to buy $16 billion/year of Iranian oil in what amounts to a barter arrangement for Chinese goods. Telecommunications is specifically included, with a $billion or more for an upgraded mobile system. Huawei & ZTE will probably split the contract. Iran's population is 84 million, about the same as Germany or Turkey. That's as much as Ireland, Norway, Finland, Denmark, Switzerland, Austria, Sweden, Belgium, and the Netherlands combined. Nothing's announced, but it will be a big deal. more

Are the LEOs Going to Disrupt the Telco Market?

We are getting closer to using alternative broadband solutions offered by international companies. Local telecommunication entities will, in this respect, be relegated to resellers. The reality of accessing low Earth-orbiting satellite (LEO) services is now clearly on the horizon. Most of the telcos and governments are not prepared for the potential shock this might cause to the structure of local telecommunications markets. more

The Insecurity of Ambiguous Standards

Why are networks so insecure? One reason is we don't take network security seriously. We just don't think of the network as a serious target of attack. Or we think of security as a problem "over there," something that exists in the application realm, that needs to be solved by application developers. Or we think the consequences of a network security breach as "well, they can DDoS us, and then we can figure out how to move load around, so if we build with resilience (enough redundancy)... more

The Path to Combatting Domain Abuse

Completely eradicating malware, botnets, phishing, pharming, and spam from the Domain Name System is not possible. That may be an odd statement from someone who just took the leadership position at the DNS Abuse Institute, but it's meant to underscore the scope of the work ahead of us. There will always be bad actors exploiting the DNS for their own criminal purposes, but working together, we can mitigate their impact. more

Cord Cutting in the US Continues in 4Q 2020

The largest traditional cable providers collectively lost over 1.3 million customers in the fourth quarter of 2020 -- an overall loss of 1.7% of customers. To put the quarter's loss into perspective, the big cable providers lost 14,158 cable customers per day throughout the quarter. The numbers below come from Leichtman Research Group, which compiles these numbers from reports made to investors, except for Cox, which is estimated. more

Guowang, Renamed China SatNet, Will Be China’s Global Broadband Provider

In an earlier post, I described what looked like two forthcoming Chinese broadband constellations, Hongyun and Hongyan and in another post, I described a third, identified as "GW" at the time. All three were projects of state-owned enterprises China Aerospace Science and Technology Corp. (CASC) and China Aerospace Science and Industry Corp. (CASIC). There was pushback from those contending that a broadband constellation was redundant ... more

Four-Pronged Approach to Keep Your Domain Names and DNS Secure from Cyberattacks

Domain names, domain name systems (DNS), and digital certificates are fundamental components of the most important applications that enable your company to conduct business - including your website, email, voice-over IP, and more. However, these vital applications are being attacked with an increasingly high level of sophistication and severity. more

ICANN Must Release the Single-Character .com Hostages from the IANA Impostor’s Warehouse

Most of the single-character .com labels were initially registered in 1993 by Dr. Jon Postel while performing work pursuant to a contract with, and funded by, the U.S. government and are currently assigned to a "shell registrar" created and controlled by ICANN. This shell - which is the 376th entry on ICANN's list of accredited registrars - is misleadingly identified as the IANA registrar while being engaged in the illicit warehousing of domain names for speculative purposes. more

Developing the Next Generation of Internet Champions – Internet Society’s Early Career Fellowship

How do we help develop the next generation of champions for an open Internet? As many of us who were involved in the early years of the Internet are getting older, how do we help inspire a new wave of advocates for an open Internet available to everyone? As we face so many threats to "the Internet way" from many different forces - governments, corporations, criminals, and other organizations - how do we help build the corp of people who understand Internet technology and policy issues and can help shape the future of this Internet we have all come to rely on? more

A Look at Cuba’s Digital Revolution

In spite of having a slow, expensive, government-controlled Internet infrastructure, Cuba is undergoing what Ted Henken and Sara Garcia Santamaria refer to as a digital revolution. The digital revolution might be said to have begun in 2007 when Yoani Sánchez launched her blog "Generation Y." Internet access was difficult -- she would get illegal connectivity at tourist hotels, and the blog was initially hosted in Germany. Soon, the Huffington Post began publishing her posts, and she has subsequently received many international awards, including the Ortega y Gasset Award for Digital Journalism in 2008. more