64,643 research outputs found

    Undetected Conflict-of-Laws Problems in Cross-Border Online Copyright Infringement Cases

    Get PDF
    This article provides and analyzes data on copyright infringement cases filed in U.S. federal district courts in 2013; it focuses on infringement cases involving activity on the internet and discusses actual and potential conflict-of-laws issues that the cases raised or could have raised. The article complements the report entitled Private International Law Issues in Online Intellectual Property Infringement Disputes with Cross-Border Elements: An Analysis of National Approaches (the Report ), which was published by the World Intellectual Property Organization in September 2015. In the Report its author, Professor Andrew F. Christie, discusses his empirical findings about the intersection of intellectual property ( IP ) law and conflict of laws and concludes that training activities, further research, and development of soft law would be the optimal means to address conflict-of-laws issues associated with cross-border IP infringements. This article arrives at a different conclusion: while training activities, further research, and the development of soft law may raise awareness of the issues, they will not solve the core problems that IP rights holders face when they strive to protect their rights against infringements on the internet. Development and coordination of conflict-of-laws rules, improvements in judicial cooperation, and streamlining of judicial proceedings in cross-border cases will be indispensable for addressing the issues effectively

    Design and implementation of the node identity internetworking architecture

    Get PDF
    The Internet Protocol (IP) has been proven very flexible, being able to accommodate all kinds of link technologies and supporting a broad range of applications. The basic principles of the original Internet architecture include end-to-end addressing, global routeability and a single namespace of IP addresses that unintentionally serves both as locators and host identifiers. The commercial success and widespread use of the Internet have lead to new requirements, which include internetworking over business boundaries, mobility and multi-homing in an untrusted environment. Our approach to satisfy these new requirements is to introduce a new internetworking layer, the node identity layer. Such a layer runs on top of the different versions of IP, but could also run directly on top of other kinds of network technologies, such as MPLS and 2G/3G PDP contexts. This approach enables connectivity across different communication technologies, supports mobility, multi-homing, and security from ground up. This paper describes the Node Identity Architecture in detail and discusses the experiences from implementing and running a prototype

    The Road Ahead for Networking: A Survey on ICN-IP Coexistence Solutions

    Full text link
    In recent years, the current Internet has experienced an unexpected paradigm shift in the usage model, which has pushed researchers towards the design of the Information-Centric Networking (ICN) paradigm as a possible replacement of the existing architecture. Even though both Academia and Industry have investigated the feasibility and effectiveness of ICN, achieving the complete replacement of the Internet Protocol (IP) is a challenging task. Some research groups have already addressed the coexistence by designing their own architectures, but none of those is the final solution to move towards the future Internet considering the unaltered state of the networking. To design such architecture, the research community needs now a comprehensive overview of the existing solutions that have so far addressed the coexistence. The purpose of this paper is to reach this goal by providing the first comprehensive survey and classification of the coexistence architectures according to their features (i.e., deployment approach, deployment scenarios, addressed coexistence requirements and architecture or technology used) and evaluation parameters (i.e., challenges emerging during the deployment and the runtime behaviour of an architecture). We believe that this paper will finally fill the gap required for moving towards the design of the final coexistence architecture.Comment: 23 pages, 16 figures, 3 table
    • …
    corecore