Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Broadband in Emerging Markets

Today, over half the world's population now has access to a mobile phone, with 5.37 billion mobile subscriptions and over two billion internet users worldwide by the end of 2010. However, these are more than just bald statistics -- today, modern ICTs are genuinely changing people's lives for the better. more

Cuba Rolls Out 3G Mobile Access

After several months of trials, ETECSA announced the availablity of third-generation mobile access to their national intranet and the global Internet in a televised "round table." The prices are quite steep for a typical Cuban and I suspect there would be relatively few subscribers among the 34% of the population that is not yet covered. Furthermore, many users will have to buy new phones to use the service. (There are still 1,084 second-generation mobile base stations in Cuba). more

How Can We Improve for ICANN 58?

Hyderabad set a new record in terms of attendance with a total of 3,141 participants registered and 1,400 attendees identified as 'locals' from the region. It was also, theoretically at least, one of the longest ICANN meetings with seven days baked into the schedule. Unfortunately, the development of the schedule itself was the source of much community criticism throughout the meeting, resulting in a chunk of time devoted to the topic during the second Public Forum. more

In a Networked World Knowing the Right Time Is Essential but How Accurate Are the Computer Clocks?

Computers have always had clocks. Well maybe not clocks as you might think, but digital computers have always had oscillators, and if you hook the oscillator to a simple counter then you have a clock. The clock is not just there to tell the time, although it can do that, nor is it there just to record the time when data files are created or modified, though it does that too. Knowing the time is important to many functions, and one of those is security. more

Enough About Apple and Encryption: Let’s Talk System Security

This week, the RightsCon Silicon Valley 2016 conference is taking place in San Francisco. Since the use of encryption in general and the Apple/FBI case in particular are likely to be debated, I want to share a perspective on system security. My phone as a system The Apple/FBI case resolves around a phone. Think of your own phone now. When I look at my own phone I have rather sensitive information on it. more

M-Government Requires Mobile ID

More and more governments are now looking at electronic ways to deliver services to their citizens. With the enormous growth in mobile penetration this infrastructure is now becoming a viable alternative in the delivery of services. But personal authentication is required to make this happen. This is recognised throughout the industry for a range of services and the GSMA has launched a project 'Mobile Contact' aimed at developing a standardised mobile ID. more

VoIP Security FUD

I'm continually amazed by the amount of FUD being spread with regard to VoIP security threats. People...the sky is not falling. VoIP isn't e-mail. It isn't implemented like e-mail, it won't be implemented like e-mail (maybe "it shouldn't be implemented like e-mail" is a more appropriate statement). Following best security practices will ensure at least a level of security equivalent to current TDM systems. Best FUD I've heard this week: VoIP is insecure because you can simply put a bridge on an ethernet line and capture a stream. Hey, has anyone ever heard of alligator clips? more

The Internet in Cuba - a Periodismo de Barrio Anthology

Periodismo de Barrio has edited a collection of 13 articles on the Cuban Internet in collaboration with the Internet Policy Observatory at the University of Pennsylvania. The articles cover the history of the Cuban Internet, the legal framework, services, communities, and projects. It is a diverse collection -- something for everyone. Here are thumbnail summaries of each article. more

How Can Greater Security, Safety and Trust in the Internet Be Created?

In the coming days, the Internet Governance Forum Dynamic Coalition on Internet Standards, Security and Safety will be announced on the IGF website. The following is an invitation to participate, share ideas and best practices, the willingness to take on a new approach towards mass deployment of internet standards and ICT best practices. Feel free to reach out to us and start working towards a kick-off meeting at the global, virtual Internet Governance Forum in November. more

Internet Politics: Developed vs Developing

It is not so convincing how the developed world looks at the rest of the hemisphere with the same attitude of equality and control. On one hand there are voices of equality where as in the other there is greed of power and control that lures them with an unending fight of power vs power in safeguarding their own survival. From the participation and development of policies to running the concept of any kind of technology platform, the sense of control and collaboration that catalyzes and leads the overall process. more

Is There a Role for ICANN in Satellite Internet Governance?

A recent invitation to participate in a webinar to discuss ICANN's Role in Satellite Internet Governance as an enabler of UN Sustainable Development Goal (SDG) 9 prompted me to consider this issue. As a legal scholar with expertise in telecommunications infrastructure, I had much to say and discuss about the new mega-constellation phenomenon and its potential role in achieving SDG9, which, for me, is a multifaceted and fascinating subject. more

One More Trump 5G Minefield

As the saying goes, it's not over until it's over. So, it wasn't surprising that Trump's minions just got one last 5G minefield out the door. On 15 January, his followers at Dept. of Commerce's NTIA published the "National Strategy to Secure 5G Implementation Plan". The 40-page document consists of a fairly standard Washington policy playbook of 18 activities with six annexes that "details how the United States along with like-minded countries will lead global development, deployment, and... more

Net Neutrality Advocates: Wireless Carriers’ Network Management Must Be ‘Reasonable’

Emboldened by their summertime victory against Comcast, advocates of network neutrality said Thursday that the next front in battle for the principle would be against wireless carriers who make "unreasonable" network management decisions. In a panel discussion on managing wireless networks at the Wireless Communications Association conference here, Free Press Policy Director, Ben Scott and Google Telecom Counsel, Richard Whitt said that the FCC's Net neutrality principles would bar discrimination over wireless networks -- while conceding that the networks are, for the time being, more bandwidth-constrained than wired-based network. more

Defending the Network Several Times Over

Modern networks can be attacked in a variety of ways, meaning that companies need different types of protection. This article explains some of the risks involved, and provides some easy ways to deal with them. more

The Growing Rate of Standalone Broadband Adoption

Parks Associates recently announced its Home Services Dashboard release, a for-pay service that tracks consumer adoption of telecom services like Internet, pay-TV, and cellphones. As part of the announcement, the company released a blog that shows that at the end of the first quarter of 2021 that 41% of US homes are buying standalone broadband - meaning broadband that's not bundled with cable TV or a home telephone. more

Topics

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days