Feeds

W3C tells US Copyright Office: IE is not the only fruit

Browser plans under fire

Choosing a cloud hosting partner with confidence

The US Copyright Office wants to limit the number of browsers that can submit online forms to its site. The agency has proposed that, temporarily at least, it will accept copyright claims via forms submitted from only Microsoft Internet Explorer or Netscape browsers.

Perhaps it is just feeling very retro, but whatever the reason, the W3C is not impressed, according to a report from InfoWorld.

In a letter to the Copyright Office, Tim Berners-Lee and Daniel Weitzner, W3C director and W3C technology and society domain leader respectively, wrote: "The proposed system would be contrary to at least the spirit of federal information policy adopted by the E-Government Act of 2002."

The office says that it does intend to be compatible with a wider variety of browsers, such as Mozilla, Firefox and Safari. It said that it is developing its systems using off-the-shelf Siebel Systems software which has only been tested with IE and Netscape.

Julia Huff, the Copyright Office's COO said that the agency was under tight time constraints as it is obliged to have a pre-registration system up and running by 24 October. "It [our system] may work well with other browsers, but they haven't tested those yet with the version of the Siebel software we're using right now."

She went on to say that the agency plans to upgrade next year, to a version of the Siebel software that does support other browsers.

Meanwhile, Berners-Lee and friends, called for a vendor neutral approach from the agency, and warned that single browser compatibility would restrict access to the agency's services. Many MacOS, Linux and Unix users wouldn't be able to access the service, and disabled users could also have difficulties, Berners-Lee said. ®

Internet Security Threat Report 2014

More from The Register

next story
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Post-Microsoft, post-PC programming: The portable REVOLUTION
Code jockeys: count up and grab your fabulous tablets
Twitter App Graph exposes smartphone spyware feature
You don't want everyone to compile app lists from your fondleware? BAD LUCK
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.