News Briefs Security Experts Criticize Obama's New Cybersecurity Plan, Say It's Full of Holes Jun 02, 2009 - Include Your Comments China Starts Coordinated Internet Blackout Ahead of Tiananmen Anniversary Jun 02, 2009 (Updated: Jun 02, 2009) - Include Your Comments Mass Hacker Attack Reported on 40,000 Legitimate Websites Jun 02, 2009 (Updated: Jun 02, 2009) - Include Your Comments IBM, Syracuse Team Up to Build Greenest Data Center in the World May 29, 2009 - Include Your Comments Obama: From Now On Digital Infrastructure Treated As Strategic National Asset May 29, 2009 - Include Your Comments Hearing Scheduled to Examine Future Relationship of US and ICANN May 28, 2009 - Include Your Comments 2.5 Billion New Broadband Subscribers By 2013 May 28, 2009 - Include Your Comments Michigan Man Sentenced to 8 1/2 Years for Phishing May 28, 2009 - Include Your Comments Survey Finds "Complexity" as Most Common Challenge in Deploying DNSSEC May 28, 2009 - Include Your Comments FCC Releases Report on Rural Broadband Strategy, Net Neutrality Key Says Chairman May 27, 2009 - Include Your Comments (1 posted) New Research Finds Over 80% of Domain Names Used by Phishers Are Legitimate Domains May 27, 2009 - Include Your Comments (1 posted) FUD for Thought: ARIN Releases Comic Books May 26, 2009 - Include Your Comments (2 posted) Released: Planning Guide/Roadmap Toward IPv6 Adoption Within the US Government May 26, 2009 - Include Your Comments Featured Blogs China Blocks Twitter, Flickr, Bing, Hotmail, Windows Live, etc. Ahead of Tiananmen 20th Anniversary On Herdict, the global crowd-sourcing censorship-tracking website, people are reporting censorship of Twitter on networks all over China… with some people adding frustrated commentary, often including the f-word. You can also see blockage reports for Hotmail, Windows Live, Bing, Flickr, YouTube, Blogspot... more » Jun 02, 2009 - by Rebecca MacKinnon - Comments: 0 Related Topics: Censorship, Internet Governance Policy Beyond the Potholes I cringe whenever I hear the arguments that we can't have community owned infrastructure for connectivity because local governments can't fix potholes. I wouldn't mind it so much if that argument wasn't used to shut off further discussion. We should be asking why we are denied the "dumb-pipes" that provide vital infrastructure and why we allow phone (and TV) companies to horde vital infrastructure. Instead we accept the "pothole" argument as a reason we can't be trusted to communicate on our own. more » Jun 01, 2009 - by Bob Frankston - Comments: 0 Related Topics: Access Providers, Broadband, Policy & Regulation, Telecom Do You Care About Your Privacy? ICANN is currently going through a complicated process in order to introduce more Top-Level Domains (TLDs). While the launch of new TLDs is something that a lot of people will welcome it is not without its issues. One of the areas that has been receiving quite a bit of attention is in relation to intellectual property rights. So what has this got to do with privacy? more » Jun 01, 2009 - by Michele Neylon - Comments: 0 Related Topics: Domain Names, Internet Governance, Law, Privacy, Top-Level Domains, Whois The Right to Internet Access President Sarkozy of France recently managed to get his 'Création et Internet' law passed by the National Assembly, and if all goes well in the Senate then French internet users will soon find their activities being supervised by HADOPI, the grandly named 'Haute Autorité pour la Diffusion des Œuvres et la Protection des Droits sur Internet.' The rights it is concerned with are not those of ordinary net users but of copyright owners, and especially the large entertainment companies that have lobbied so hard and so successfully for the power to force internet service providers to terminate the accounts of those accused of downloading unlicensed copies of music, films and software... more » May 31, 2009 - by Bill Thompson - Comments: 0 Related Topics: Access Providers, Broadband, Internet Governance, Policy & Regulation, Telecom How a Resilient Society Defends Cyberspace Seventy-five years ago today, on May 29th, 1934, Egyptian private radio stations fell silent, as the government shut them down in favor of a state monopoly on broadcast communication. Egyptian radio "hackers" (as we would style them today) had, over the course of about fifteen years, developed a burgeoning network of unofficial radio stations... It couldn't last. After two days of official radio silence, on May 31st, official state-sponsored radio stations (run by the Marconi company under special contract) began transmitting a clean slate of government-sanctioned programming, and the brief era of grass-roots Egyptian radio was over... more » May 30, 2009 - by Jim Cowie - Comments: 0 Related Topics: Cyberattack, Cybercrime, Policy & Regulation, Security Contributory Cybersquatting and the Impending Demise of Domain Name Proxy Services? This case involves an alleged domain name theft. Solid Host is a web host and initial owner of the domain name solidhost.com, which it registered through eNom in 2004. Solid Host claims that in 2008, a security breach at eNom allowed an unknown interloper (Doe) to steal the domain name and move the registration to NameCheap. Doe also acquired NameCheap's "WhoisGuard" service, a domain name proxy service that masked Doe's contact information in the Whois database. Solid Host contacted Doe and sought the domain name; Doe asked for $12,000, and Solid Host took a pass... more » May 29, 2009 - by Eric Goldman - Comments: 2 Related Topics: Cybersquatting, Domain Names, Law, Privacy, Whois IPv6 and LTE, the Not So Long Term Evolution? The Wall Street Journal reported that AT&T saw wireless networks about to drown under a deluge of data. To see YouTube content uploaded form an iPhone or Slingbox rerouting a favourite television program to your smart phone gives mobile network operators the shivers. Skype over 3G in the meantime gives sleepless nights, not because of surging megabyte floods but due to nightmares of considerable voice and roaming revenues washing away. Not easy to plan and engineer "managed transitions" under those circumstances. more » May 29, 2009 - by Yves Poppe - Comments: 10 Related Topics: Access Providers, Broadband, IPv6, Mobile, Telecom, Wireless Will ICANN Drop Its Biggest Revolutionary New Idea? Five Reasons ICANN, the Internet Authority is up against the wall, and here are the top five reasons for which it may simply drop its greatest revolutionary idea of offering a brand new type of a designer domain name to fit the next generation of widely expanded Internet and cyber realities of tomorrow. This new proposed platform will surely revolutionize the marketing and branding for big and small businesses around the world, offering highly affordable tools for global reach than ever before but the strong opposition would like to kill this idea. more » May 28, 2009 - by Naseem Javed - Comments: 0 Related Topics: Cybersquatting, Domain Names, Internet Governance, Top-Level Domains, Web New Top-Level Domains Emerging With all the buzz surrounding new Top-Level Domain (nTLDs) at the last ICANN meeting in Mexico, I am sure many of you have already encountered or read information regarding the latest applications. For those who haven't been staying abreast of the latest, here is a quick review... There are two different general types of TLDs -- gTLDs and ccTLDs. ICANN is now opening the possibility of adding further TLD extensions, which can virtually be anything... more » May 27, 2009 - by Robert Birkner - Comments: 0 Related Topics: Domain Names, Domain Registries, Top-Level Domains Virtual Extortion? Maybe you saw this story: A Chinese man (whose name is not given) has been sentenced to serve three years in prison for extorting "virtual items and currency" from a "fellow Internet café user." The currency was worth 100,000 yuan or $14,700. The man who's sentenced to three years and the three friends who helped him also "extorted virtual equipment for online games" from their victim. The friends only seem to have been given a fine; the primary extortionist got both a fine and a jail time. The virtual currency was QQ coins... As I'm sure all of us know, there's a thriving market in virtual goods and currency... more » May 27, 2009 - by Susan Brenner - Comments: 0 Related Topics: Cybercrime, Law Crawford Likes Aussie Utility Network Susan Crawford, special assistant to the president for science, technology and innovation policy and a member of the National Economic Council, is reported to be favorably inclined towards a U.S. network much like Australia's recently announced $33B broadband plan. Of course, the U.S. is some 15 times bigger than Australia, and that'd make the price tag closer to $500B by straight multiplication. But the U.S. would get a fiber network done right... more » May 27, 2009 - by David Isenberg - Comments: 6 Related Topics: Access Providers, Broadband, Policy & Regulation, Telecom Valuing Trademarks in Domain Names My new essay, "Valuing Trademarks in Domain Names," outlines the various approaches to valuing trademarks, pointing out the approaches’ different strengths and weaknesses, with emphasis on domain names. Using court cases, the essay points out that there is no one right way to value intangible assets but there are wrong ways. more » May 26, 2009 - by Alex Tajirian - Comments: 0 Related Topics: Domain Names, Law | Hot Topics • Security • Broadband • Telecom • Cybercrime • Cyberattack • Access Providers • Internet Governance • more... Industry Updates Expanding Internet Access Driving Software Piracy, Study Says May 22, 2009 - by MarkMonitor DNSSEC Industry Coalition Symposium is Announced May 21, 2009 - by PIR dotMobi Names AutoTrader.mobi as Millionth Site Tested by Acclaimed mobiReady Tool May 20, 2009 - by dotMobi NeuStar's UltraDNS to Power Growth of NDTV Convergence May 19, 2009 - by UltraDNS SPIL GAMES Chooses MarkMonitor for Global Domain Management May 19, 2009 - by MarkMonitor Advertise on CircleID If your advertising and marketing objectives entail reaching high-ranking experts and professionals within the IT and Internet industry, CircleID can help you achieve it. Find Out More... Survey Please Take a Moment to Answer this CircleID Survey We really appreciate your participation. The survey should only take a couple of minutes of your time. |
No comments:
Post a Comment
Keep a civil tongue.