[DNS] auDA Domain News - 9 January

[DNS] auDA Domain News - 9 January

From: David Goldstein <david>
Date: Thu, 9 Jan 2014 15:13:23 +1100

The domain name news is supported by auDA


Navigating the multi-stakeholder morass: The past, present and future of Internet governance by Chris Disspain & Paul Szyndler

New gTLD launches: registrar coverage at less than 40% of the market

Going Going Gone: ICANN Auction Rules Cause a Stir by Stephanie Duchesneau

Warning: how social media is a danger to brands

Navigating the multi-stakeholder morass: The past, present and future of Internet governance by Chris Disspain & Paul Szyndler
Abstract: 2013 marks the tenth anniversary of the United Nations? World Summit on the Information Society (WSIS). Although neither a forum focussed exclusively on ?Internet governance? nor the first discussion of the topic, WSIS marked the start of a global, decade-long debate on how the Internet is, and should be, managed. A decade later, the Internet has grown exponentially, bringing about massive cultural, social and economic change. And yet, many of the political and policy issues around its governance largely remain the same and are regularly debated in a wide range of fora. This article draws upon historical experiences in the Internet governance debate to explain and assess current discussions and to cast a wary eye into the future.

What do the .XXX disputes tell us about Internet governance? ICANN?s legitimacy deficit in context by David Lindsay [subscription]
Abstract: ICANN is a private, not-for-profit corporation incorporated under Californian law, which is responsible for managing and developing policies for the Domain Name System (DNS), a valuable global resource. As a non-state actor, with no clear source of authority under international law, ICANN has weak claims to formal legitimacy. To bolster its normative claims to legitimacy, ICANN has introduced internal structural and procedural safeguards to ensure transparency and accountability.

Rights protection in new gTLDs: The multi-stakeholder Internet governance model at work by Heather Ann Forrest [subscription]
Abstract: In June 2008, ICANN embarked upon an ambitious program of expansion at the top-level of the DNS. The policy underpinning expansion is notable for its adoption of new mechanisms that target the unauthorised use in new gTLDs of names the subject of legal ? in particular trademark ? rights. These mechanisms are the product of several years of policy development and implementation; they are proof of the functioning of ICANN?s unique multi-stakeholder model of Internet governance. Yet even as new TLDs near the launch phase, questions remain as to the scope and mechanics of rights protection offered by agreed-upon mechanisms. A ?strawman solution? emerged at the end of 2012 to address these questions. This article examines the ?strawman solution?, the rights protection mechanisms it seeks to clarify, and the ICANN organisational structure and operational processes into which it does not perfectly fit.

Elements for a successful gTLD: Lessons from the .cat experience for new community gTLDs by Jordi Iparraguirre [subscription]
Abstract: ?.cat?, the gTLD designed to fulfil the needs of the worldwide Catalan speaking community on the Internet, has been praised as a success in the Internet domain name sector after seven years of operation. So much so that some long established TLDs have started to develop a similar community approach and use language as a market segmentation tool to engage new registrants. 

Translating diversity to Internet governance by Philip M. Napoli, Kari Karppinen
Abstract: This paper examines the emergence of diversity as a guiding principle of Internet governance. This paper compares how diversity is being interpreted and applied in Internet governance discourse and related research with its interpretation and application in traditional communications policy-making and policy research. As this paper illustrates, a somewhat more narrow conceptualization of diversity has developed within the Internet governance context than has been the case in traditional communications policy contexts. 

WEBINAR: ICANN Strategy Panel on ICANN's Role in the Internet Governance Ecosystem
You are invited to an update on the activities of the Strategy Panel on ICANN's Role in the Internet Governance Ecosystem. ICANN Strategy Panels' work will inform ICANN's new, overarching vision and five-year strategic plan.

Draft Criteria and Process for Selection of Multistakeholder Ethos Award Pilot Program
Purpose (Brief): ICANN proposes establishment of a pilot award program to recognize ICANN community participants for both multistakeholder collaboration efforts as well as years of service.

Spreading Knowledge in 2014 ? Technical Training with NSRC by Patrick Jones
ICANN is a long time supporter of the University of Oregon?s Network Startup Resource Center technical training and education programs (NSRC). In the coming weeks and months, ICANN and NSRC will be collaborating to bring continuing education and capability building workshops for ccTLDs and network operators. These workshops support the regional engagement strategies currently underway in Africa, Asia-Pacific, Latin America & the Caribbean, and Oceania.

ICANN Is Hiring For Positions In The United States to Belgium to Singapore to Turkey
Looking for a Job? ICANN Is hiring. From the United States to Belgium to Singapore to Turkey, if your in need of a Job ICANN is hiring.

 - ccTLD & gTLD NEWS
.ee domains can be protected using the DNSSEC
Starting today, .EE domains can be protected using the DNSSEC, which protects against hostile attacks and helps minimise Internet security risks. Protecting the domain system with DNSSEC is an important step towards a more secure Internet in Estonia.

Iceland, Liechtenstein and Norway Set For .EU 8 January
Residents, companies and organisations based in Iceland, Liechtenstein and Norway will be eligible to register .eu domain names from 8 January 2014 at 10:00 CET.

.eu extends to Iceland, Liechtenstein and Norway tomorrow 10:00 AM
Residents, companies and organisations based in the European Economic Area (EEA) countries of Iceland, Liechtenstein and Norway will also be eligible to register domain names under the .eu TLD from tomorrow, 8 January 2014, at 10:00 CET.

EEA residents to become eligible to register '.eu' domain names [registration]
>From January 8 2014, residents, companies and organisations based in the EEA will be eligible to register domain names under the ?.eu? TLD. This means that residents, companies and organisations based in Iceland, Lichtenstein and Norway will be able to register such domain names. Currently, only private persons, companies or organisations resident or domiciled in the European Union are able to register a ?.eu? domain name.

.ME Announces Loyalty Programme... With Prizes!
The .ME Registry has announced the .ME Loyalty Program where among other perks and prizes you can win t-shirts, domain name and hosting packages, gift card vouchers and much more.

.ME Registry Targets Bloggers with New Loyalty Program
As thousands more gTLDs are set to be released, existing TLDs must be creative in marketing domains. On Friday at the New Media Expo in Las Vegas, the .ME Registry launched a new loyalty program, offering perks to .ME users.

.ME Announces .ME Loyalty Program at NMX in Las Vegas
The .ME Registry, operator of the most personal domain extension available, is proud to announce the .ME Loyalty Program, a platform to connect all .ME users into one community and reward them with exciting perks and prizes, including T-shirts, domain name and hosting packages, gift card vouchers and much more. The platform has been launched at NMX in Las Vegas, and will be available as of January 4, 2014.

New rulebook for '.mk' domain names introduces major changes [registration]
The registry for ?.mk? domain names, Marnet, has adopted a new rulebook which implements a number of changes, including the introduction of a registrar system to handle the administrative and technical aspects of Macedonian domain name registrations and the liberalisation of second-level extensions under ?.mk?.

gTLD market passes 150 million names
There were over 150 million domain names registered in gTLDs at the end of September, according to the latest registry reports.

New gTLD launches: registrar coverage at less than 40% of the market
Registrars representing less than 40% of the gTLD market are ready to offer new gTLDs during their launch phases, according to the latest stats from ICANN.

Top 10 gTLDs to Watch in 2014
As 2014 begins, the moment every gTLD applicant has been waiting for is finally here - the first gTLDs will actually start to launch this year. For most digital marketers, mobile, social and big data have been driving forces in their plans and little attention has been given to TLDs.

Going Going Gone: ICANN Auction Rules Cause a Stir by Stephanie Duchesneau
The applicant community is working its will on the rules for gTLD auctions published by ICANN. But, as always, ICANN is no pushover. ICANN posted the new gTLD auction rules for public comment last month after community outcry over the preliminary rules during ICANN's Public Meeting in Buenos Aires in November.

Controlled interruption as a means to prevent name collisions by Jeff Schmidt, CEO of JAS Global Advisors LLC
One of JAS? commitments during this process was to ?float? ideas and solicit feedback. This set of thoughts poses an alternative to the ?trial delegation? proposals in SAC062. The idea springs from past DNS-related experiences and has an effect we have named ?controlled interruption.?

NamesCon will be biggest new gTLD show yet
The inaugural NamesCon new gTLDs conference, set to run for three days in Las Vegas next week, has attracted roughly 525 registrations, making it the largest such event to date.

Regina company aims to be merchant of .love
A Saskatchewan law firm says it would love to acquire the new .love web domain.

Gold is not a clearly delineated community, panel rules
An International Chamber of Commerce panelist has ruled that ?gold? is not a clearly delineated community, and has thus rejected a community objection filed by World Gold Council against Donuts? application to run .gold.

Donuts picks young British firm for Sunrise disputes
A newish UK company managed by some old internet policy hands has been appointed by Donuts to handle disputes arising from its Sunrise and Domain Protected Marks List policies.

dotAfrica receives boost from African governments
African governments through the African Union Commission (AUC) have endorsed the plan to create the dotAfrica initiative through issuing an official statement by African ICT ministers announcing their support.

ICA and DNA to Share Stage at NamesCon
The Internet Commerce Association and the Domain Name Association will be represented together at a Breakout Panel Session during the NamesCon domain industry conference slated to take place next week in Las Vegas.

Republican National Committee loses fight over .republican
RNC loses objection against Demand Media?s application to run .republican TLD.

Verisign files patent application for automatically creating Whois service for TLDs
Verisign has filed a patent application with the U.S. Patent and Trademark Office related to automatically creating Whois for new TLDs.

Latest Go Daddy phishing attack unrelated to 2013 RAA
Fears that the 2013 Registrar Accreditation Agreement would lead to new phishing attacks appear to be unfounded, at least so far.

2013 was the year of cybersecurity
Cybersecurity came up so many times in 2013 that it was easy to miss how quickly and completely it became a central feature of how we think about U.S. foreign policy and national security. Partly, this was an inevitable result of technology becoming more pervasive. And partly it was just an extension of things that had begun in earlier years, such as the U.S. use of cyberattacks on the Iranian nuclear program, which started in 2010.

Wanted: More Vigilance on Data Security
Your data is out there, and people are coming for it. If you're lucky, the villains will only get the most harmless stuff. Perhaps they'll filch just your phone number from Snapchat, a number you thought would be kept confidential because the messaging company makes a show of its commitment to your privacy. You believed it would actually take steps to keep its promise (so did I). In fact, Snapchat was lax, and now your selfie-stained number is out there, dangling in the wind.

Talk of cyberwarfare meaningless to many companies, experts say [CSO]
While government leaders often use attention-grabbing buzzwords like cyberwarfare, such expressions do not have much impact on security budgets within private industries, experts say.

DoS attacks that took down big game sites abused Web?s time-synch protocol
Miscreants who earlier this week took down servers for League of Legends, EA.com, and other online game services used a never-before-seen technique that vastly amplified the amount of junk traffic directed at denial-of-service targets.

Melbourne schoolboy exposes security flaw in Public Transport Victoria's website
A Melbourne schoolboy has exposed a security flaw in the website of Public Transport Victoria (PTV), the government authority that provides details about train, bus and trams.

Schoolboy hacks Public Transport Victoria website
Personal information about public transport users in Victoria has been exposed to potential identity theft because government authority Public Transport Victoria failed to secure its website.

Innocent Bystanders Of Cybersquatting: Neutral Domain Name Registrars
Addressing for the first time the issue of whether the Anticybersquatting Consumer Protection Act (ACPA), which added two cybersquatting causes of action to the Lanham Act, provides for secondary liability, the U.S. Court of Appeals for the Ninth Circuit affirmed that it did not. Engaging in traditional statutory interpretation, the court concluded that the ACPA did not create a cause of action for contributory cybersquatting which would have extended liability to neutral domain name registrars. Petroliam Nasional Berhad (Petronas) v. GoDaddy.com, Inc., Case No. 12-15584.

Brazilian company guilty of reverse domain name hijacking
A three person WIPO panel has found JJGC Industria E Comercio de Materiais Dentarios S.A. of Curitiba, Paran?, Brazil, guilty of reverse domain name hijacking.

Warning: how social media is a danger to brands
A Marketing Week investigation has found that a range of brands, including Ugg Australia, Mulberry, Ray-Ban and Louis Vuitton are being targeted by unauthorised websites that use social media to promote their claims of selling luxury goods. We uncovered a number of sites not listed in these brands? published networks of resellers that use links and paid-for advertising space on platforms such as Facebook, Twitter and Pinterest to bring in web traffic, using brands? photographs, logos and trademarked words.

INTA reveals future direction, and the battles that lie ahead [registration]
INTA has published its 2014-2017 strategic plan, which sets out its core goals for the next four years. The document suggests a more outward-looking focus for the association when compared to the previous strategic plan, with consumer benefit to be central to its activities in the trademark world.

Combining Second Level Domain and Top Level Suffix to Determine Identity or Confusing Similarity of Domain Name Choice to Trademark
The suffix to the right of the dot, whether gTLD or country code, has no source indicating significance, but is a functional necessity panels generally disregard in comparing the second level domain with the trademark. 

GoDaddy?s Afternic gets another large Chinese domain name registrar on board
Domain name sales platform Afternic announced today that Xinnet has joined its fast transfer distribution network for selling domain names.

New escrow service Agreed.com launches
New domain name escrow service offers a good user experience to streamline domain transactions.

Crazy for Keynotes! Next Week's Inaugural NamesCon Conference in Las Vegas Will Feature Five Keynote Speakers
The countdown to the first ever NamesCon conference continues. The new domain show officially opens at the Tropicana Hotel in Las Vegas one week from tonight (Monday, January 13, 2014) with the .XYZ Opening Night Cocktail Party.

Are you going to NamesCon next week?
Are you going to NamesCon in Las Vegas next week? If you?re reading this post, there?s a good chance you are. With over 450 people expected to attend, NamesCon will be the biggest domain name conference in a year (excluding ICANN?s meetings).

Evolution and the Internet by Bob Frankston
Evolution isn't just about biology. Our focus on biology is part of the world-wide challenge in getting people to understand how systems evolve. Think of the resistance Galileo faced when he said that the universe didn't, literally, revolve round us. One reason people have difficulty accepting undirected evolution is that educators don't give people a good sense of why things "work". It's a difficult problem because we tend to look for a "reason" for why things are the way they are.

Leveraging New Opportunities in Emerging Markets For Domains Seminar Set For In London On Jan 29
The Multilingual Internet Group and Burson-Marsteller are holding a ?high level seminar investigating the opportunities and challenges presented by the ?New Internet?.?

Luxottica Announces Purchase Of Glasses.com To Drive North American Presence
Luxottica, owner of some of the world?s biggest eyewear brands including Ray-Ban, Oakley, Sunglass Hut and Australia?s OPSM Group, has announced it is acquiring the glasses.com domain name for an undisclosed sum to boost its North American presence.

Luxottica announces agreement to acquire glasses.com from WellPoint, Inc.
Luxottica Group S.p.A., a leader in the design, manufacture, distribution and sale of fashion, luxury and sports eyewear, announces today it has entered into an asset purchase agreement to acquire glasses.com from WellPoint Inc. subject to customary closing conditions.

Cisco Acquires A Domain In Stealth Mode That Represents An Industry They Say is Worth Trillions
Mike did a story the other day about IOT.com and it having a price tag of $2.8 million. The Internet of Things has become a very hot topic over the last couple years, Cisco has also been busy branding the Internet of Everything or IOE. IOE.com is now owned by Cisco although the sale was never made public.

Game.CN Most Expensive .CN Domain Name
Public auction of previously reserved .CN domain name Game.CN finally ended in bidding 3.098 million cny (~$512,000) with intensive competition of 686 bids in the last 1 hour.

Transaction costs, privacy, and trust: The laudable goals and ultimate failure of notice and choice to respect privacy online by Kirsten Martin
Abstract: The goal of this paper is to outline the laudable goals and ultimate failure of notice and choice to respect privacy online and suggest an alternative framework to manage and research privacy.

Viewing youth and mobile privacy through a digital policy literacy framework by Leslie Regan Shade, Tamara Shepherd
Abstract: Digital policy literacy is a critical element of digital literacy that emphasizes an understanding of communication policy processes, the political economy of media, and technological infrastructures. This paper introduces an analytical framework of digital policy literacy and applies it to young people?s everyday negotiations of mobile privacy, in order to argue for increased policy literacy around privacy and mobile phone communication.

Copyright Trolls, Defining the Line Between Legal Ransom Letters and Defending Digital Rights: Turning Piracy into a Business Model or Protecting Creative from Internet Lawlessness? by Luke S. Curran
Abstract: The scarlet letter of the term ?troll? has long been affixed to the lapel of businesses within the patent context. This pejorative term, however, has had little relevance or widespread public recognition within the domain of copyright law until 2010. Since the awakening of the ?copyright troll,? several non-author rights holders have recently adopted and propagated a substantially modified version of this sue-to-settle paradigm within the context of copyright law while introducing it to the scale of mass-litigation. Further, the amorphous term ?copyright troll? traditionally characterizes a business practice of acquiring unenforced copyrights that are being infringed upon through various online media vehicles while monetizing the fundamental disconnect between the current copyright law and Internet users? behavioral norms.

Cyber-attacks and International law of armed conflicts; a ?jus ad bellum? perspective by Titiriga Remus
Abstract: This article highlights legal problems of cyber attacks from a ?jus ad bellum? perspective (international dispositions regarding the justification for entering a war). Since no international instrument whatsoever cover the cyber attacks the analogies with current international solutions are largely employed.

Swiss Information Privacy Law and the Transborder Flow of Personal Data by Sylvain M?tille
Abstract: Switzerland, like the European Union, has an extensive protection of privacy. An omnibus law, the Data Protection Act, ensures a high level of protection for every data relating to an identified or identifiable person, including legal persons. This Act applies both to data treated inside Switzerland and to data exported abroad.

Protocol Layering and Internet Policy by Christopher S. Yoo
An architectural principle known as protocol layering is widely recognized as one of the foundations of the Internet?s success. In addition, some scholars and industry participants have urged using the layers model as a central organizing principle for regulatory policy. Despite its importance as a concept, a comprehensive analysis of protocol layering and its implications for Internet policy has yet to appear in the literature. This Article attempts to correct this omission. It begins with a detailed description of the way the five-layer model developed, introducing protocol layering?s central features, such as the division of functions across layers, infor- mation hiding, peer communication, and encapsulation. It then discusses the model?s implications for whether particular functions are performed at the edge or in the core of the network, contrasts the model with the way that layering has been depicted in the legal commentary, and analyzes attempts to use layering as a basis for competition policy.

Sharing You with You: Informational Privacy, Google, & the Limits of Use Limitation by Kevin P. McLaughlin

Cyberbullying from Classroom to Courtroom, Panel 2?Cyberbullying In The Classroom: Educators, Policy, and Protecting Students - Remarks of Lawrence Paska
I will talk about the implementation side of state policy, and the kinds of services that we, as a state education agency, try to provide to empower school districts to talk to their communities about the responsible uses of technology in education. Perhaps starting less from a deficit model and more from an empowerment model.

Cyberbullying from Classroom to Courtroom, Panel 2?Cyberbullying In The Classroom: Educators, Policy, and Protecting Students - Remarks of Britton Schnurr
Just so that we are all on the same page, when I was speaking of cyberbullying, I?m talking about using technology to willfully harass, threaten, intimidate, or otherwise inflict harm on someone. In bullying in general we talk about an imbalance of power. And in dealing with the kids every day, we spend a lot of time trying to know the difference between conflict and bullying. Conflict is a normal part of human development. Bullying means something where there?s an imbalance of power.

Cyberbullying from Classroom to Courtroom, Panel 2?Cyberbullying In The Classroom: Educators, Policy, and Protecting Students - Remarks of Kimberly Young Wilkins
The information I want to share with you is really going to be hands-on?it?s what happens with the kids. I tend to be very open?my door is always open for my students. And what I?m saying to you are things that they?re saying to me. I do really get a lot into bullying because we really have tried our best to have an open door policy and really kind of stamp out bullying.

Exploring gender differences in Malaysian urban adolescent Internet usage by Patrick C-H Soh, Boon Heng Teh, Yong Hoe Hong, Tze San Ong, John P. Charlton
Abstract: This study explored gender differences in urban adolescent Internet access, usage and motives. Data were collected from 914 urban school students in Malaysia.

Patterns of ownership of child model sites: Profiling the profiteers and consumers of child exploitation material by Paul A. Watters, Christopher Lueg, Caroline Spiranovic, Jeremy Prichard
Abstract: Recent research has indicated that cybercrime thrives when a corrupt social, economic, and political environment emerges such that law enforcement impact is minimised and key elements of crime prevention are absent. In this paper, using a snowball methodology we analyse patterns of ownership of ?child model? sites which generate profits from advertising and/or subscriptions. 

Certainty at last? A ?new? framework for electronic contracting in Singapore by Eliza Mik
Abstract: Singapore is the first Asian country to accede to the UNCITRAL Convention on the Use of Electronic Communications in International Contracts. Singapore is not only the first Asian nation to accede to the CUECIC but also the first nation to implement some of its provisions locally.

Open data as the standard for Europe? A critical analysis of the European Commission?s proposal to amend the PSI Directive by Katleen Janssen, Sara Hugelier
Abstract: In December 2011, the European Commission adopted its Open Data Strategy, aiming to make open data the standard in the Member States of the European Union. The strategy included a proposal to revise the 2003 Directive on the re-use of public sector information (PSI directive). This proposal has been discussed in a trialogue procedure and the Council's Committee of Permanent Representatives has adopted a final text on the 10th of April. 

Global technology market poised to shrink
Search for new innovation to replace smartphone and tablets

Pirate Bay plans new 'anti-censorship' browser
The Pirate Bay's own PirateBrowser web browser has been downloaded more than 2.5m times since its launch in August 2013, but the filesharing site is already working on a successor.

The Simpsons Cleverly Cover The Pirate Bay & Anti-Piracy Enforcement
The latest episode of The Simpsons is an absolute goldmine for anyone interested in the file-sharing phenomenon. Tired of the expensive and advert-ridden theater experience of today, Homer starts downloading from The Bootleg Bay and conducting movie screenings for the people of Springfield. With the FBI hot on his heels, Homer quickly learns that when Hollywood is the victim, no stone is left unturned.

More than 1 billion Android devices to ship in 2014 - Gartner
The number of smartphones and tablet computers shipped with Google's Android operating system will break the 1 billion barrier this year, research group Gartner said on Tuesday.

Gartner Says Android Device Sales to Top 1 Billion in 2014
GartnerIT latest device-sales forecast should bring smiles in the halls of Google.

Apple reports $1 bln app sales in Dec, $10 billion for 2013
Apple Inc said on Tuesday that its customers spent $1 billion on purchases in its applications store in December, leading to a total of $10 billion worth of apps sold in 2013.

The three types of NSA snooping that Edward Snowden revealed
The cybersecurity scholar Peter Singer has articulated an interesting new way to think about Edward Snowden's leaks revealing NSA snooping practices. Singer, in a Twitter chat earlier today, divided the leaks into three general categories:

CES 2014: Connected tech raises privacy fears
In the future, it might not just be your smartphone that leaks personal and private data, it might be your smart fridge too.

France fines Google over data privacy
France's data protection watchdog has fined Google ?150,000 after the U.S. search engine ignored a three-month ultimatum to bring its practices on tracking and storing user information in line with local law.

You won?t believe what viral content does to news - The fastest-growing forms of online ?content? are click-bait headlines and videos
?News is what somebody does not want you to print. All the rest is advertising,? runs the journalists? mantra, variously ascribed to publishers William Randolph Hearst and Lord Northcliffe. If so, news is being deluged.

Is the Internet a Mob Without Consequence?
The immediacy and fast pace of the Internet can be magical. But when someone makes a comment that the masses disagree with, a mob with 140-character pitchforks can develop in seconds and the Internet can become terrifyingly bellicose.

You think Facebook is free? Well, it'll only cost you your private life
An extensive European study last week found that Facebook was "dead and buried to teenagers" as the young sought refuge in messaging apps such as Snapchat and Whatsapp, away from the prying eyes of their parents. What could be worse than to be digitally stalked by parents, aunts and uncles? Teenagers want their privacy back.

Google Chairman Says Mistake Was Missing Social Networks
Google Inc. Executive Chairman Eric Schmidt said missing the rise of social media was the biggest mistake he made at the world?s largest search-engine operator.

Hackers reveal 4.6m mobile numbers after Snapchat claims it has safeguards
An anonymous group of hackers has dumped a vast database of what appeared to be 4.6 million Snapchat users? mobile numbers and users names, just days after Snapchat claimed it had safeguards in place to fix a security vulnerability that could divulge users? personal information.

Snapchat hack affects 4.6 million users
The usernames and phone numbers for 4.6 million Snapchat accounts have been downloaded by hackers, who temporarily posted the data online.

Snapchat Data Breach Exposes Millions of Names, Phone Numbers
Snapchat, a company that has made a name for itself by offering people a way to send very private correspondence, has suffered a very public leak of its users? information. And there doesn?t appear to be much that users can do about it.

Unfriending mum and dad: Fears that teenagers are deserting Facebook are overblown
Not long after being snapped up by News Corporation in 2005, MySpace became a much emptier space when many teenagers who had used the social network to share music and photos of themselves in various states of undress decided it was no longer the cool place to be online. A recent blog post has sparked a debate about whether Facebook, which has 1.2 billion users, is suffering a similar exodus.

Viewing Where the Internet Goes
 Vinton Cerf and Robert Kahn, who outlined the conventions of the Internet in a hotel room in 1973, spoke separately about what has become of it and where it is going.

Many more of us will work from home ? or a cafe ? says BT futurologist
When the American broadcaster Walter Cronkite made a programme about the office of the future in 1967, he forecast the end of commuting thanks to a desk at home laden with screens for making video calls, checking the news and tracking stock prices. There was even a closed circuit television system for monitoring activity in the other rooms ? on Cronkite's screen, women in pinafores were making the bed.

UK entertainment spending rises with surge in film and music streaming
After five years of decline, sales of entertainment products such as music, films and video games were growing again last year because of booming digital services such as Netflix and Spotify, according to figures published on Wednesday.

File-Sharing Boosts Creation of New Hit Music, Research Finds
New research published by Tulane University Law Professor Glynn Lunney shows that online piracy is linked to the creation of more hit music. The increase in output can be attributed to existing artists, who make up for a decline in new hits from newcomers. This counter-intuitive finding suggests that file-sharing advances the core purpose of copyright, and that it should be permitted under copyright law.

The case against Kim Dotcom, finally revealed
Nearly two years after Kim Dotcom's New Zealand mansion was raided by police, US authorities have made their case as to why the man behind Megaupload shouldn't simply go bankrupt like previous copyright violators before have?he should go to jail, they argue.

How Kim Dotcom became Hollywood's biggest villain
He's known as Kim Dotcom, and this former hacker-turned Internet entrepreneur lives in a lavish mansion on a vast estate outside Auckland, New Zealand. He leads a lifestyle that is part tech mogul, part Bond villain -- and he says, in many ways, his life was inspired by the movies. "Some characters had private islands and super tankers converted into yachts...underwater homes...I got inspired by that," he tells Bob Simon. But Kim thinks it is this outsized lifestyle that's also fueling the US government's prosecution of him for large-scale copyright infringement.

The copyright issue and censorship threat buried within Google's transparency report
The British Phonographic Institute has asked Google to remove over 45 million web addresses alleged to be hosting copyright infringing material. A new Google transparency report revealed that the recorded music conglomerates have demanded removal of such an astounding number that it dwarves companies like NBC Universal, Warner Brothers, Fox, and Microsoft.

2013 in Review: The Trans-Pacific Partnership Agreement
Negotiations over the Trans-Pacific Partnership (TPP) intensified in 2013, as trade delegates from the 12 participating countries aimed for (and ultimately missed) a year-end target for completing the sprawling agreement. Although the secretive nature of the negotiations means the public can't really know how far along it is, both leaked position documents and public statements indicate that there are still major unresolved areas of disagreement in the 29-chapter deal.

nz: Govt must resist Aussie corporate bullying over 'copper tax' - Coalition
Prime Minister John Key must resist attempts by Australian-based fund manager Investors Mutual Ltd (IML) to bully his government into imposing a 'copper tax' on every Kiwi household and business, the Coalition for Fair Internet Pricing says.

5G Wireless: Sorting reality, hype of next-gen Wi-Fi
Don?t feel bad if you don?t really know anything about 5G wireless networking because, by most standards, it doesn?t actually exist yet. The cross-pollination of codified specifications, new products, and technological innovation required hasn?t yet brought 5G to fruition.

Google looks to tap Australian telcos for its global balloon WiFi revolution
TELSTRA is among a group of telcos that have held high-level talks with Google about working together on a revolutionary project to beam wireless internet signals from stratospheric balloons into hard-to-reach and underserved rural and regional areas.

Broadband speeds a mixed bag, study finds
More than a third of Australian premises with access to fixed broadband never get more than moderate speeds of 9 megabits per second.

David Goldstein

 email: david at goldsteinreport.com

 web:   http://goldsteinreport.com/ / http://davidgoldstein.tel/
 phone: +61 418 228 605 - mobile; +61 2 9663 3430 - office/home

"Every time you use fossil fuels, you're adding to the problem. Every time you forgo fossil fuels, you're being part of the solution" - Dr Tim Flannery
Received on Thu Jan 09 2014 - 04:13:23 UTC

This archive was generated by hypermail 2.3.0 : Sat Sep 09 2017 - 22:00:11 UTC