The last few decades have not been a story of unqualified success for European technology enterprises. The European industrial giants of the old telephone world, such as the former stalwarts Alcatel, Siemens, Philips, Ericsson and Nokia, have found it extraordinarily difficult to translate their former dominant positions in the telco world into the Internet world. To be brutally frank, none of the current generations of major players in the digital environment are European. more
Voice over IP (VoIP) represents a sharp break from the traditional telephony. The story of VoIP is important in helping us think beyond the simplistic framing of a "digital transition". The first stage of any technology is emulating the old. Indeed, digital telephony was just like traditional analog telephony -- just FBC (Faster, Better Cheaper) but not fundamentally different. Merely changing from analog to digital isn't transformational in itself. But it creates the opportunity for transformation. more
Nielsen recently published some statistics about how we watch videos that show a continuing trend of migration from traditional video to watching video online. One of the most striking statistics is the total volume of online videos. December 2021 saw an aggregate of 183 billion minutes of online video viewing. And even that, the number is likely small since there are many uses of video on the web that are not likely counted in the total. more
Nowadays, with increasing digitalization and internet usage, email is a central communication tool. This holds true even despite the high popularity of instant messaging apps and social media. Email remains the favorite means of business communication worldwide, both in B2B and B2C. In 2019, 293.6 billion emails were sent and received. By 2025, this number will grow even more. It is predicted that we will send and receive 376.4 billion emails per day. In this scenario, implementing security features for email communications has become absolutely essential. more
The EARN IT Act was reintroduced into Congress last Monday, with the promise that it would end Internet platforms' "blanket immunity" for "tens of millions of photos and videos" of child sexual abuse that they allow to circulate online. With the bill already scheduled for hearing in committee, it's on track to be passed quickly. And why shouldn't it be, if its sponsors' claims about it are true? Perhaps because they're not true. more
Time has come again, another year of general elections in Brazil. Some 30,000 candidates are running for Executive and Legislative seats: 1 President, 27 State Governors, 27 Federal Senators, 513 Federal Deputies, 1059 State Deputies, 24 District Deputies to govern 212+ million people and one of the largest economies in the world. For a few lucky industries, success and failure do not correlate with who is in power; for others, policy and regulation are everyday business. more
In 2020, China applied to operate GuoWang, a constellation of 12,992 low-Earth orbit (LEO) broadband Internet satellites, and in 2021, it became clear that it was intended to become China’s global LEO broadband constellation. Can they do it? Maybe, but it will take a long time. China does not have the capacity to launch 12,992 satellites today. I don’t know the mass of their planned satellites, but GuoWang is informally referred to as China’s answer to Starlink. more
NameFind is a GoDaddy company that holds registrations of domain names and seeks to make money off of them by placing pay-per-click ads on parked pages found at the domain names. Global Licensing owns the DEJA VU trademark that is used in connection with strip clubs and other adult-related services. When NameFind used the domain name dejavushowgirls.com to set up a page of pay-per-click ads, Global Licensing sued, raising claims under the federal Anticybersquatting Consumer Protection Act (ACPA), 15 U.S.C. 1125(d). more
There is an interesting battle going on to be the technology that monetizes the control of Internet of Things devices. Like a lot of tech hype, IoT has developed a lot slower than initially predicted -- but it's now finally becoming a big business. I think back to a decade ago when tech prognosticators said we'd soon be living in a virtual cloud of small monitors that would monitor everything in our life. According to those early predictions, our farm fields should already be fully automated, and we should all be living in the smart home envisioned by the Jetsons. more
We do live in turbulent times. There is such a lot happening, with many people feeling overwhelmed and lost. One of the reasons given why we do have these problems is technology. I would argue against that. In all reality, technology is a tool that we can use, and yes, we all know that we can use it for the wrong reasons (cars kill people, atom bombs, killer robots, chemical and biological warfare and so on). However, we have learned to live with it, and in general, the outcome from science, innovation and technology has been positive. more
I work at APNIC, the Regional Internet Registry that serves the Asia Pacific Region. APNIC provides common infrastructure services for the region that support the unique assignment of IP address blocks to Internet network operators within our region through the operation of an address registry. In short, IP addresses are what we do. So, when there are discussions in technology circles about evolving the Internet's address model in varying ways,... more
A few weeks ago, a new vacancy was added to the UN Webpage for Senior Leadership Positions, inviting applications to become the new Tech Envoy. This position has a long and unfortunate backstory. It was created in 2019 as a new role, as an outgrowth of the UN's High-Level Panel on Digital Cooperation and the UN Secretary General's Roadmap for Digital Cooperation -- with a vague remit to "advise senior leadership of the United Nations on key trends in technology and... more
Resource Public Key Infrastructure (RPKI) is a method to secure internet routing traffic by cryptographically verifying routes. As we begin 2022, we look back at 2021 and see how the year saw another significant step towards its adoption. High-profile issues with the old trust-based model of Border Gateway Protocol, designed several decades ago, have shown the continued importance of protecting popular networks from mistakes or hackers. more
Hackers are using company domain names for malicious attacks more than ever before. Established research shows that phishing and related malware attacks most commonly occur from a compromised or hijacked legitimate domain name, a maliciously registered, confusingly similar domain name, or via email header spoofing. Domain security intelligence is the first line of defense in preventing domain cyberattacks. more
From open standards and software to data, 'open' has been a defining word of the internet since its early days. However, most of the digital growth around major platforms has been driven by proprietary software and 'closed' systems. Recently, companies such as Microsoft and Google have been shifting towards open-source software more and more. Over the last few years, additional momentum was created with the USA adopting the open-source approach to cope with lagging behind, mainly, Huawei in the development of 5G networks. more
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byRadix
Sponsored byDNIB.com
Sponsored byCSC
Sponsored byWhoisXML API