/ Most Viewed

The Impact of Reverse Domain Name Hijacking on Supplemental Filings in UDRP Cases

In another blog post, I wrote about the sometimes confusing circumstances in which domain name dispute panelists will consider supplemental, or additional, filings from the parties (in addition to a complaint and response) in cases under the Uniform Domain Name Dispute Resolution Policy (UDRP). I quoted the WIPO Overview, which states, in part, that supplemental filings may be appropriate where a party can "show its relevance to the case and why it was unable to provide that information in the complaint or response." more

Debugging Legislation: PROTECT IP

There's more than a hint of theatrics in the draft PROTECT IP bill that has emerged as son-of-COICA, starting with the ungainly acronym of a name. Given its roots in the entertainment industry, that low drama comes as no surprise. Each section name is worse than the last: "Eliminating the Financial Incentive to Steal Intellectual Property Online" (Sec. 4) gives way to "Voluntary action for Taking Action Against Websites Stealing American Intellectual Property". more

Belize to Host Caribbean Peering and Interconnection Forum

Belize will host the fourth Caribbean Peering and Interconnection Forum, known as CarPIF, on June 13 and 14. Since its inception in 2015, CarPIF has brought together regional and international technology experts and telecommunications industry execs to discuss a range of topics related to Internet peering and interconnection trends, and their relevance to the Caribbean region. more

Google to Let Users Block Sites Based on Domain Names

In pursuit of its efforts to improve Google search results, the company on Thursday announced the release of a new feature that enables users to block specific search results based on domain names. more

America’s Telecoms Market in Dire Straits

In late 2008 it was my good fortune to be asked to write a number of reports on broadband and trans-sector development for the Obama Transition Team. President Obama had just won office and this team was crucial in setting the policies for the future. I gathered together a team of international experts to assist in writing these reports. I was able to do this because the revolutionary plans of the Australian government in relation to the NBN very much appealed to the Obama Team. more

Measuring Canada’s Internet Performance One Test at a Time

As the head of the registry for the .CA top-level domain, I can tell you that few things get Canadians riled up as much as the performance of their Internet service. Their concerns aren't entirely unfounded -- according to OECD data, Canada's ranking for broadband speed and price relative to its OECD counterparts has been on a downward trend over the past dozen years. And for those of us who travel overseas, especially to countries with advanced Internet infrastructure like South Korea and Sweden, we've experienced firsthand just how green the grass is on the other side of the fence. more

U.S. Cable Industry Says to FCC That Consumers Don’t Need 25 Mbps Speed

Apparently, we consumers in the USA don't need to have broadband speeds of 25 Mbps or higher. And we certainly don't need upload speeds greater than 3 Mbps! At least, that's according to comments filed to the US Federal Communications Committee (FCC) by the National Cable & Telecommunications Assocation (NCTA) in response to the FCC's proposal to raise the definition of "broadband" from 4 Mbps downstream and 1 Mbps upstream to 25 Mbps down and 3 Mbps up. more

Ignore The Chicken Littles: Let’s Give New Web Domains a Try

Before the experiment has gotten off the ground, some critics have expressed concern about applications to operate domains referring to a "generic" product or service, like .car, .book, or .app. News reports indicate that Microsoft and other Google competitors have filed complaints about Google's applications, while authors' organizations have raised questions about some of Amazon's applications. These complaints assert that giving these applicants the right to operate these new domains would provide an unfair competitive advantage. more

What May Happen to GAC Advice? 3 Fearless Predictions

Many TLD applicants are likely to respond to the GAC Advice in a manner that is like story telling: Based on a mixture of fiction garnished with some facts from their applications, applicants will write savvy responses with only one aim -- to calm down the GAC's concerns and survive the GAC Advice storm. The "duck and cover" strategy... According to the Applicant Guidebook, material changes to applications need to go through a Change Request process. more

IPv6 Medics Without Borders

At its November 5th plenary, the Canadian ICT Standards Advisory Committee approved the recommendations of the Canadian IPv6 Task Group set up by isacc in april. The 50 members of the Task Group were invited to individually produce a list of seven recommendations. Received inputs were collated, debated, ranked and ultimately distilled down to a pair of quite straightforward recommendations for immediate action. more

Cybercrime, Underground Economy Booming, Stolen Credit Card Data Main Driver

Credit card information is the most advertised category of goods and services on the underground economy accounting for 31 percent of the total, according to recent data found by security experts. In a report released today by Symantec, stolen credit card numbers are reported to sell for as little as $0.10 to $25 per card with the average advertised stolen credit card limit at more than $4,000. According to calculations, the potential worth of all credit cards advertised during the reporting period was $5.3 billion. more

Why Is the Client-Side Scanning a Concern for Encryption?

As today is the Global Encryption Day, I decided to make my first post here on this topic. About two months ago, Apple caused a controversy by announcing the adoption of a measure to combat the spread of Child Sexual Abuse Materials (CSAM). The controversy was so huge that, a month after its announcement, Apple decided to postpone its plans for the new features to have more time to gather information from the various stakeholders and implement improvements before releasing the measures originally announced. more

Achieving a Cyber-Reliant Infrastructure

Don't worry about the bad guys turning out the lights. Worry about everything they're stealing while the lights are still on. The theft of intellectual property ranging from Hollywood films to defense secrets is underway by cyber-criminals of various stripes. Maintaining control over intellectual property may be the single most important challenge to American economic security. Implementing a cyber-reliant infrastructure is a national challenge which crosses the traditional boundaries between economic sectors and between public and private domains. more

IPv6 Shows a Pulse

On World IPv6 Day IPv6 showed a pulse! However faint that global pulse may have been, our network showed at least some form of IPv6-life occurred on that day. Long supporters of IPv6, with a significant global DNS footprint handling extremely large volumes of global traffic we, at CommunityDNS, were curious on what may result through an organized focus on the use of IPv6. more

Asia and Africa Top Mobile Web Usage

Highest share of mobile web usage isn't in the most developed nations, but rather in the developing nations of the world, based on StatCounter's October 2010 data. "The reason these countries have such high mobile web usage compared to desktop web usage (for lack of a better name) is very much a result of economics," says RoyalPingdom. "A relatively cheap mobile phone (most often from Nokia, as we have seen) will then be a much more realistic option, and it therefore becomes the way to reach the Web for many. " more