Back in the 1980s, everyone used the Lotus 1-2-3 spreadsheet on their PCs. In 1989, Borland released a competitor, Quattro Pro. It used the same menu commands as 1-2-3 so that users could import their 1-2-3 spreadsheets with keyboard macros. Lotus sued Borland, and after a loss in the district court, Borland won on appeal, arguing that the keyboard commands are a "method of operation" and not subject to copyright. Lotus appealed to the Supreme Court... more
The percentage of zones under .com, .net and .org that support IPv6 has increased by 1,900% over the past 12 months according to a new census conducted by the Measurement Factory, sponsored by Infoblox. According to the census, this dramatic increase can be primarily attributed to the introduction of support of IPv6 by a single domain name registrar, Go Daddy. more
The European country code top-level domain (ccTLD) market is at a crossroads, facing a confluence of challenges that could reshape its trajectory in the coming years. From slowing growth and rising renewal prices to shifting user behaviour driven by AI, the market is undergoing profound changes. These trends suggest a potential decline in domain volumes and a shift in how domains are valued and used. Here's a closer look at the factors contributing to this "perfect storm" and what it means for the future of European ccTLDs. more
ETECSA, Cuba's monopoly ISP, has been running free tests of their forthcoming mobile access. It seems that the latest test is over for now, but Andy Garcia (@Dancuba96) ran a speed test before it ended... ETECSA has not announced when commercial 3G service will commence, where it will be available at first and what it will cost, but the following image at the start of the @ETECSA_Cuba Twitter page suggests that service will begin soon they are serious about mobile #Internet access. more
As governments convene to discuss the UN Cybercrime Treaty, Google is urging caution, warning that the current draft could endanger online security and free expression. more
The risks of fraud and disinformation in the U.S. election process have been hiding in plain sight. CSC's new research finds that a large majority of web domains closely linked to the campaign websites for Joe Biden and Donald Trump lack basic domain security protocols and are prone to domain spoofing tactics. This makes them a potential target for hackers looking to spread disinformation ahead of the election, and criminals who want to take advantage of voter intentions... more
The jurisprudence applied in adjudicating disputes between mark owners and domain name holders under the Uniform Domain Dispute Resolution Policy (UDRP) is essentially a system that has developed from the ground up; it is Panel-made law based on construing a simple set of propositions unchanged since the Internet Corporation for Assigned Names and Numbers (ICANN) implemented them in 1999. Its strength lies in its being a consensus-based rather than dictated jurisprudence. more
With the alarming increase in cyberattacks, criminals are literally turning businesses against their own customers in order to steal consumer's personal data, warns the latest annual X-Force Trend and Risk report from IBM. "The security industry puts a lot of effort into the technical evaluation of security threats, examining, sometimes at great length, the potential threat that each issue might present to corporations and consumers. Criminal attackers out for profit, however, have considerations that the security industry does not always take into account, such as monetization cost and overall profitability." more
SES's first multi-orbit partnership was Cruise mPOWERED + Starlink, providing a managed blend of SES MEO and Starlink LEO service for maritime operators, and we can expect similar bundled services in aviation and enterprise markets. more
NordVPN, a leading VPN service provider, has unveiled its first application featuring quantum-resilient encryption – a significant advancement in cybersecurity. Post-quantum cryptography support is currently available on NordVPN’s Linux client, with plans to extend this enhanced security to all applications by early 2025. more
On August 30, CenturyLink experienced a major network outage that lasted for over five hours and disrupted CenturyLink customers nationwide as well as many other networks. What was unique about the outage was the scope of the disruptions as the outage affected video streaming services, game platforms, and even webcasts of European soccer. more
Some inevitable changes are hard to see in prospect, yet are 'obvious' in retrospect. The next communications revolution is 'made for cloud' access. A colleague pointed me to a Forbes article "For Today's Telecoms Companies, Customer Experience Is Just As Important As Download Speeds". It was written by Huawei's global president of assurance and managed services. Well, I told you so! more
Have you ever wanted to quickly find out information on key Internet policy issues from an Internet Society perspective? Have you wished you could more easily understand topics such as net neutrality or Internet privacy? This year, the Internet Society has taken on a number of initiatives to help fill a need identified by our community to make Internet Governance easier to understand and to have more information available that can be used to inform policymakers and other stakeholders about key Internet issues. more
The European Commission has just published a communication which describes the broad lines of its Internet policy in the coming years. Vint Cerf, on the Google Public Policy blog sees this as a very interesting vision. Indeed, it closely links the issue of openness of the Internet to several obvious and not-so-obvious factors. more
A widespread compromise of consumer-grade small office/home office (SOHO) routers has been discovered by threat intelligence group Team Cymru. According to the report, "attackers are altering the DNS configuration on these devices in order to redirect victims DNS requests and subsequently replace the intended answers with IP addresses and domains controlled by the attackers, effectively conducting a Man-in-the-Middle attack." more