Web

Web / Most Viewed

Regulation of Algorithmic Regulation Begins

A Chinese law that went into effect six months ago required online service providers to file details of the algorithms they use with China's centralized regulator, the Cyberspace Administration of China (CAC). In mid-August, CAC released a list of 30 algorithms used by companies such as Alibaba, TenCent and Douyin, the Chinese version of Tiktok, with a brief description of their purpose. more

When CDA Immunity is Not CDA Immunity

Here's a question: If 47 USC 230(c) (the Good Samaritan provision of the Communications Decency Act) says that online services are not liable for third party content, then can you even sue the online service? Shouldn't the online service be immune from lawsuit? Because, after all, what would be the point of being sued for something for which you cannot be liable? more

Study Reveals 76% of Internet Users Vulnerable to Browser History Detection

A recent study reveals a browser history detection method, largely dismissed as an issue with minimal impact, can in fact be used against a vast majority of Internet users with significant malicious potential. Researchers, Artur Janc and Lukasz Olejnik, analyzed real-world results obtained from 271,576 Internet users and have reported the results in a paper titled, "Feasibility and Real-World Implications of Web Browser History Detection"more

Internet Companies in Negotiations for Agreement on Code of Conduct in China

Google, Microsoft and Yahoo, in negotiations with other Internet companies and human rights organizations, have reached an agreement on a voluntary code of conduct for activities in China and other countries that censor the Internet. The participants are reviewing the agreement for final approval. more

Do You See What I See? Geotargeting in Brand Infringements

Geotargeting is a well-established online technique for delivering tailored web content based on a user's geographic location. From an internet technology point of view, this is usually based on the user's IP address, which is converted to a physical location through a standard look-up process performed by network infrastructure. Geotargeting is commonly used by websites for several legitimate reasons, including providing users with relevant advertising and other content... more

Web Localization: Sometimes as Simple as a Black and White

The death of Thailand's King Bhumibol Adulyadej has led to stores running out of black and white clothing as the population mourns its leader in color-appropriate clothing. What does this mean for website localization? ...Web localization isn't just about creating a localized website and forgetting about it. It's about creating a living and breathing website that responds quickly to local events. Web localization is about respect. more

How the Internet Grew in 2009

Internet 2009 in numbers as reported by Royal Pingdom: In 2009 there were 90 trillion emails sent; 100 million new email users; 24 percent increase in spam; 47 million new websites; 8 percent increase in domain names with the total reaching 187 million; 18 percent increase in overall Internet users with the worldwide total reaching 1.73 billion; and new zombie computers created reach 148,000 per day. more

Join InterCommunity 2020 on Feb 26 About Internet Society’s Open Standards Everywhere Project

How can you use the latest open Internet standards to make web servers as secure and as fast as possible? How can you ensure your web site is available to everyone across the global network of networks? Please join me on Wednesday, February 26, 2020, from 13:00 – 14:00 UTC in our first InterCommunity 2020 event to learn about the Internet Society's new "Open Standards Everywhere" project. more

Bug Bounty Programs: Are You Ready? (Part 2)

In Part 1 of "Bug Bounty Programs: Are You Ready?" we examined the growth of commercial bug bounty programs and what organizations need to do before investing in and launching their own bug bounty. In this part, we'll discuss why an organization needs to launch a bug bounty program, and what limits the value they will likely extract from such an investment. more

Google Ordered to Remove Search Results of ‘Right to Be Forgotten’ Removal Stories

Google has been ordered by U.K.'s Information Commissioner's office to remove nine links to current news stories about older reports which themselves were removed from search results under the 'right to be forgotten' ruling. more

Team Behind Google Chrome Wants to Challenge How URLs are Displayed in the Browser

Google's Chrome browser has turned 10 and to commemorate the occasion, the company is rolling out a revamped design along with a series of new features, including a more powerful omnibox. more

Security as a Major Factor for Online Consumers

There is no doubt that the number of online consumers is on a rise and that this is a trend that will not stop any time soon. Over the last couple of years, the number of digital buyers has grown by a steady 150 million each year. This number is expected to stay stable for a few more years to come. By 2020, about two billion people will be purchasing things online and making online money transactions on a regular basis. more

U.S. Homeland Security Launches Website Crackdowns, A Dozen Sites Already Seized

TorrentFreak reports: "Following on the heels of this week's domain seizure of a large hiphop file-sharing links forum, it's clear today that the U.S. Government has been very busy. Without any need for COICA, ICE has just seized the domain of a BitTorrent meta-search engine along with those belonging to other music linking sites and several others which appear to be connected to physical counterfeit goods. more

Web Performance: Real vs. Virtual Browsers

Real browsers vs. virtual browsers. It's a hot topic among Web performance testing providers and customers. Which is the better choice? Well, it depends. They're not intended for use under the same circumstances and requirements, so you aren't comparing apples to apples, instead, you are comparing apples to grapples. more

Technology: Doomsday or Godsend – the Choice Is Ours

Following the American insurrection and the role the media played -- social media, particularly the "doomsday scenario," started to appear again in relation to technological developments. Only a few years ago, a group of hi-tech companies, including Tesla, warned against the negative aspects of artificial intelligence (AI). Other technologies that could seriously affect human developments include gene editing, nanotechnology and synthetic biology. more