/ Recently Commented

Trademarks and Domain Names Composed of Common Terms

The lexical material from which trademarks are formed is drawn from the same social and cultural resources available to everyone else, which includes domain name registrants. Since trademarks are essentially a form of communication, it is unsurprising that a good number of them are composed of common terms (dictionary words, descriptive phrases, and shared expressions) that others may lawfully use for their own purposes. more

Google to Distrust Symantec-Issued Certificates Amid Misuse

In a post on a developers’ forum, software engineer on the Google Chrome team Ryan Sleevi has announced Google’s plan to start gradually distrust all existing Symantec-issued certificates. more

The Future of Fully Automated and Robot-Driven Transportation and Supply Chain Management

Today, we are in a way naturally connected to automation and robotics. In the industrial revolution, people realized that many tasks could be performed better and more efficiently by a machine. The rise of our dependence on technology has greatly risen since then, and thanks to scientific and technological advancements, we are on the breach of a new era. more

Use STIX to Block Robocalls

It is one of those oddities that occurs around Washington from time to time. During the same hour today, the Federal Communications Commission (FCC) was meeting at its downtown headquarters trying to stop robocalls, while a large gathering of government and industry cybersecurity experts were meeting a few miles away at Johns Hopkins Applied Physics Lab advancing the principal means for threat information sharing known as STIX. more

U.S. Senate Voted to Eliminate Broadband Privacy Rules

"The US Senate today voted to eliminate broadband privacy rules that would have required ISPs to get consumers' explicit consent before selling or sharing Web browsing data and other private information with advertisers and other companies," Jon Brodkin reporting in Ars Technica. more

How Long Does a URS Case Take?

The Uniform Rapid Suspension System (URS) -- which allows a trademark owner to suspend certain domain names, especially those in the "new" gTLDs -- was designed as a quicker and less-expensive alternative to the Uniform Domain Name Dispute Resolution Policy (UDRP). As I've written frequently before, there are significant differences between the URS and the UDRP. One of those differences is how long a typical proceeding lasts. more

ISPs May Be Required to Remove Content, Shutdown Websites Under New EU-Wide Rules

Under a draft legislation approved by the Internal Market and Consumer Protection Committee on Tuesday, national enforcement authorities would be required to have a set of powers to detect and halt online breaches of consumers' rights across the European Union. more

The Future of Networking (In One Slide)

I recently ran a workshop in Asia and to guide attendees through the content; I put together an overview slide which you might also find of interest and use. It is a description of the quality attenuation framework, originally developed and defined by Predictable Network Solutions Ltd, and documented and extended by myself and colleagues at Just Right Networks Ltd. more

2017 North American IPv6 Summit to Be Held at LinkedIn Headquarters

??The collective North American IPv6 Task Forces announced the 2017 North American IPv6 Summit will be held at LinkedIn headquarters in Sunnyvale, CA. more

Owner of .Feedback in Breach of Registry Agreement, Rules ICANN

"The Internet Corporation for Assigned Names and Numbers (ICANN) has ruled that .feedback owner Top Level Spectrum (TLS) is in breach of its registry agreement," Barney Dixon reporting in IPPro The Internet. more

New Ad Fraud Schemes Utilize Alpha-Numeric Domains

The breach of the Democratic National Committee e-mail system and a massive digital advertising fraud believed to be run by alleged actors in Russia share a common thread beyond their ability to capture the news cycle. Although each event targeted a different weakness in brand/online security platforms, the common denominator is the use of fraudulent domain names. more

Cisco Warning Software Used in Hundreds of Its Products Vulnerable to Critical Security Flaw

The security flaw was discovered by the company's own security researchers in WikiLeaks' most recent disclosure of classified information, released last week. more

Shedding Light on How Much Energy the Internet and ICTs Consume

Ever since I published an essay exploring the relationship between climate change and the Internet, I have endeavored to bring this subject to the fore as often as possible (and in relevant fora and discussions) since the responsibility of creating a more sustainable world falls on all communities and stakeholder groups. It is particularly pressing now -- at a time when international interest in curbing climate change is strengthening, while it is juxtaposed with the receding commitments of the United States government... more

Alliance for Safe Online Pharmacies Honors Leading Companies at ICANN

Last week the Alliance for Safe Online Pharmacies (ASOP Global; www.BuySafeRx.pharmacy) presented its inaugural Internet Pharmacy Safety E-Commerce Leadership Award to two organizations during the Generic Names Supporting Organization (GNSO) Joint Meeting of the Registries and Registrars Stakeholder Groups at ICANN58 in Copenhagen, Denmark, it was announced on Tuesday. more

How Long Does a UDRP Case Take?

The Uniform Domain Name Dispute Resolution Policy (UDRP) was designed as a quicker and less-expensive alternative to litigation. Although the UDRP policy and rules provide strict timelines for various stages of a UDRP case, how quickly a dispute is actually resolved can vary based on numerous factors. A typical UDRP case results in a decision in about two months, but the facts of each case -- including actions both within and outside the control of the parties -- may shorten or extend that timing. more