In rem actions over domain names are powerful tools. A trademark owner can undertake these actions when it identifies an infringing domain name but cannot locate the owner of that domain name. In a sense, the domain name itself is the defendant. The Anticybersquatting Consumer Protection Act (which is a part of the federal trademark statute dealing with the unauthorized registration of domain names) says that a court can enter ex parte orders requiring a domain name to be turned over when... more
New top-level domains will quickly be upon us, and if you are ramping up to get your application ready, part of your launch plan should address what you will do with valuable keyword or generic names -- what we often refer to as "premium names." ... Choosing appropriate domains to reserve is an important first step which must be included in your application to ICANN. more
A beacon of transparency and true international cooperation packed up this week as participants in the 5th Internet Governance Forum (IGF) made their muted good-byes. No one is sure whether they will meet again next year or, if they do, under what circumstances. That's because the UN is looking to fix the IGF, a puzzling task for the busy UN since the IGF is manifestly not broken. more
At the IGF2010 in Vilnius, two folk are floating a trial balloon about separating the allocation function from the registry services function. Currently, these functions are seen as indivisible by the Internet addressing community. In other words, one gets an allocation or assignment from a RIR and the RIR adds the assignment to their database... The question being asked is "Is it time for a split between allocation and services for Internet number resources as was the case for domain name resources?" My answer is no more
Apparently, along with trying to change who gets paid when the music gets played, the National Association of Broadcasters is lobbying Congress to require FM radio receivers to be built into phones and other mobile devices. I'm sure this is in part a reaction to the rise of streaming music apps like Pandora and the Public Radio Player, but they want FM receivers in not-so-smart phones too. more
The future of broadcasting has been under discussion for close to two decades and, while changes are certainly happening, they are rather slow and therefore new opportunities or threats (depending on where you sit) continue to arise. On the one hand we are now starting to see the more widespread availability of digital TV and this has revealed a clear point of difference between the strategic directions being taken by the telecoms and the broadcasting industries. more
At the beginning of 2008, the South Korean government passed a law that allowed telecoms operators to broadcast programmes in real-time over their broadband networks. The KCC awarded IPTV licences to KT Corp, Hanaro Telecom and LG Dacom. KT was banking on real-time Internet TV services because growth in the traditional broadband and telephone markets had slowed. The company planned to invest more than KRW1.7 trillion (US$1.5 billion) in IPTV services by 2012 as part of efforts to cultivate new sources of revenue. more
Micorsoft has released a 253 page cybersecurity ebook primarily intended for teens but also serves as a useful resource for adults interested in overall understanding of various Internet security topics. more
Sam Gustin reporting in DailyFanance: "As Apple (AAPL), Amazon (AMZN), Netflix (NFLX) and Google forge ahead with highly publicized new plans to stream high-speed content like movies and TV shows to your living room, smartphone, telecom and cable giants like AT&T, Verizon and Comcast (CMSCA) have been intensely lobbying to maintain control over the broadband pipes they spent billions to build. Comcast is going so far as to buy a rich content factory, NBC Universal, a deal that would create a $35 billion media and delivery juggernaut." more
The National Institute of Standards and Technology (NIST) issued today its first Guidelines for Smart Grid Cyber Security, which includes high-level security requirements, a framework for assessing risks, an evaluation of privacy issues at personal residences, and additional information for businesses and organizations to use as they craft strategies to protect the modernizing power grid from attacks, malicious code, cascading errors, and other threats. more
IPv6 a major catalyst for billions of dollars worth of deals? The Intel announcement of their McAfee purchase for 7.7 billion seems to indicate as much when Dave DeWalt , McAfee CEO is quoted as saying during a conference call; "If we look at the transition from IPv4 to IPv6, we're seeing an explosion of billions of devices and they all need to be secured." more
Reading through Brian Kreb's blog last week, he has an interesting post up on the White House's call upon the industry on how to formulate a plan to stem the flow of illegal pharmaceuticals...It is unclear to me whether or not the goal of this initiative is to stem the flow of online crime in general or to reduce the flow of illegal pharmaceuticals flowing into the United States (since presumably this cuts into the profits of large pharmaceutical companies... more
Brian Krebs reporting in Krebs on Secruity: "The Obama administration is inviting leaders of the top Internet domain name registrars and registries to attend a three-hour meeting at the White House next month about voluntary ways to crack down on Web sites that are selling counterfeit prescription medications..." more
Eric Vyncke reporting in the NetworkWorld: "IPv6 exists for more than 15 years and it is rumored to be deployed extensively in Asia and especially in Japan and China with Africa being the last continent to deploy IPv6. Another place where there should be a lot of deployments is of course in the USA with the US Government IPv6 mandates. But, when it comes to measure where web sites are actually deployed over IPv6, the rumor proves to be just a myth..." more
In an interview with GovInfoSecurity, Sen. Thomas Carper said that the U.S. Senate is considering attaching cybersecurity legislation to a defense authorizations bill. Though clearly a ploy to be able to say "we did something about those evil hackers" before the elections, CAUCE applauds the attempt. There can be no doubt that the United States (and many other countries) sorely needs better laws to deal with these threats. more