The incredible pace of change of the Internet -- from research laboratory inception to global telecommunication necessity -- is due to the continuing pursuit, development and deployment of technology and practices adopted to make the Internet better. This has required continuous attention to a wide variety of problems ranging from "simple" to so-called "wicked problems". Problems in the latter category have been addressed through collaboration. This post outlines key characteristics of successful collaboration activities. more
As is normal with a change of administration, there are articles in the press discussing the likely legacy of the outgoing administration. Leading the pack in singing his own praises is former FCC Chairman Ajit Pai, who recently published this document listing a huge list of accomplishments of the FCC under his Chairmanship. Maybe it's just me, but it feels unseemly for a public servant to publish an official self-praise document. more
Every day, new technologies bring us closer to ubiquitous connectivity. If the capabilities of technology is advancing at a fast pace, the same is not always true of regulations; when creating or marketing a new technology, regulation is likely to act as a bottleneck. Understanding regulatory challenges is therefore the foundation that your next move rest on. Although the target may be a global or regional market, it's essential that strategies are designed both well in advance and target each jurisdiction individually. more
The Caribbean is under virtual siege as incidents of cyber attacks and cyber crimes surge across the region. "The sophisticated use of technology by highly incentivised criminal organisations has created unprecedented opportunities for transnational crime elements that no one region, country or entity can fight on its own. More inter-regional cooperation and collaboration are needed to develop and implement smart and integrated approaches to fight new and emerging cyber threats." more
Leaving the Public Forum yesterday at the ICANN meeting in Costa Rica I had learned of a couple of decisions which to me goes against serving the global public interest. At an ICANN Board meeting a few months ago which I unfortunately missed the Board resolved matters related to how financial support and batching will take place in the new gTLD Program. I would like to put forward proposals for adjusting these... more
Vint Cerf has posted comments in support of the pending sale of PIR and the .org registry to Ethos Capital. Vint's Comments . Vint is a respected member of the Internet community, and his comments need close attention and careful assessment. Some of his comments have been discussed here earlier. Other comments, posted here and elsewhere, have either supported the sale or raised questions. more
Earlier this year, The Alliance for Safe Online Pharmacies (ASOP) released findings from their 2021 survey on American Perceptions and Use of Online Pharmacies. According to ASOP's data, U.S. residents' use of online pharmacies to purchase prescription medications continues to increase yearly. In 2021, 42% of Americans purchased medications from online pharmacies, either for themselves or family members under their care. This is a significant increase of 7% since just last year. more
Nokia has developed a framework that will enable governments to implement smart cities. The framework is designed to aid regions to design and obtain services for smart city concepts. However, Nokia states that more emphasis needs to be put on developing an overarching strategy rather than small projects. The Australian government announced that they are interested in building smart cities, but there are still major gaps in figuring out how to do so. more
Over the last 20 years or so we have regularly revisited the developments in virtual reality (VR). I remember experiencing VR for the first time in the late 1980s, so this technology has been in the making for a very long time. And we are still uncertain about its growth over the next decade. There is no doubt that VR is going through a period of revival. more
While jogging along LacLeman in Geneva I caught up with Dr. Kim Seang-Tae, the President of the National Information Society Agency of South Korea. He is also one of the Commissioners of the ITU/UNESCO Broadband Commission for Digital Development. Dr. Seang-Tae is the chief architect of the FttH miracle that is transforming South Korea. His broadband journey began in 1994, when he developed the country's first broadband plan. more
Final echoes of the US Senate committee's questions of Facebook this week will only fade in the UN Security Council where, in a few years, Member States will adopt a treaty on regulation of the Internet Economy. By opening wide the door to questions on privacy, revenue, security and purpose, Congress showed its well-placed concern and signaled that others can too. more
Every year I write a blog talking about the trends that I think we're likely to see in the coming year. But 2021 was such an unusual year for all of us that I thought it would also be useful to talk about what we accomplished in the industry over the last year while fending off a pandemic. All in all, it was quite a year. more
I'm asked at least twenty times a year how a small ISP can compete against the big cable companies. The question comes from several sources - a newly-formed ISP that is nervous about competing against a giant company, a rural ISP that is entering a larger market to compete, or investors thinking of funding a new ISP. These folks are rightfully nervous about competing against the big cable companies. more
In part 1, I talked about some of the risks associated with BYOD. But there are actions you can take to greatly reduce this risk. One effective method for limiting the risk of BYOD is to employ DNS-based security intelligence techniques. DNS-based security intelligence makes use of an enterprise's caching DNS server to monitor and block DNS queries to known botnet command and control (C&C) domains. more
In Part 1 of "Bug Bounty Programs: Are You Ready?" we examined the growth of commercial bug bounty programs and what organizations need to do before investing in and launching their own bug bounty. In this part, we'll discuss why an organization needs to launch a bug bounty program, and what limits the value they will likely extract from such an investment. more
Sponsored byCSC
Sponsored byDNIB.com
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byVerisign
Sponsored byRadix
Sponsored byWhoisXML API