In a perfect world, consumers recognize authentic emails from fake, update their operating system, browser and anti-virus software, and have a healthy skepticism about the safety of the Internet. The bad guys hate perfect, so we should be working with consumers to stop them. ... Organizations like mine are joining forces to recruit consumers -- who are also your customers and employees -- in the fight against cybercrime. more
There was a recent article in JAMA Network Open, part of the monthly journals of the American Medical Association, that reported on a large study to quantify the benefits of using telemedicine with cancer patients. The study was conducted at National Cancer Institute - Designated Comprehensive Cancer Center in Florida from April 2020 through June 2021. The study wanted to quantify the cost savings for patients that were able to conduct visits via telehealth rather than drive to the cancer center. more
Exponential growth in network bandwidth requirements has created a need for large CAPEX investments for most service providers. Unfortunately, each provider faces limits on all expenditures and must upgrade only what is needed, when it is needed. Nobody should waste time or money by performing unnecessary network upgrades. To avoid needless upgrading, providers must have all the data they can get from their network to guide them through the decision-making process. more
The Secure Hosting Alliance has introduced a certification programme to establish clear, verifiable standards for internet hosting providers, aiming to improve accountability, boost transparency, and strengthen the trust that underpins global online infrastructure. more
The U.S. government has long had a far-reaching control over the internet's technical center. What will happen now when ICANN's Board puts together a proposal on how to transfer responsibility for certain key functions within the domain name system to the internet community? Last week, ICANN had its 55th conference in Marrakech. The most important result of the meeting is that all parts of the so-called internet community approved that ICANN's Board will send a proposal to the U.S. National Telecommunications and Information Administration (NTIA) which suggests how to transfer responsibility for certain key functions within the domain name system to the internet community... more
A recent article by Joe Brock for Reuters describes a new geopolitical battle over undersea fibers. There are about 400 undersea fiber routes that cross oceans and that connect the world with fiber. This is a huge business, and about 95% of all international broadband traffic passes through the undersea fibers. more
It's sometimes easy to forget that the broadband business is just over twenty-five years old. The telephone companies had a monopoly on copper-based technologies until Congress passed the Telecommunication Act of 1996, which forced the big telephone companies to allow competition for copper-based broadband services. more
In an era where our lives are increasingly intertwined with digital technologies, a recent development in the realm of digital sovereignty has sparked a pressing concern for nations and individuals alike. The concept of digital self-determination, once hailed as a great equalizer, has become a battleground for power, privacy, and control, with governments and tech giants vying for dominance in the digital realm. more
OpenVault's latest broadband report shows U.S. households using more data, with uploads rising faster than downloads and a major shift toward midrange speed tiers. Growing gaming, streaming, and cloud activity continues to reshape network demand and subscriber behavior. more
Picture this: you just completed hours of internal Web services preparations with your system administrative team prior to the holidays. You discovered possible points of failure and made appropriate modifications with the expectation of a perfect load test. You take a few minutes to relax, refill the coffee mug sitting in front of you, and connect to the conference bridge where real-time discussion about the load test will occur. Things go well for the first 20 minutes of the test... Then it happens: one of the simulated users logs an error stating that it has timed out. more
IPv4 scarcity turned regional internet registries from clerks into gatekeepers of a valuable resource. Yet liability caps remain trivial, leaving powerful institutions with little accountability and incentives for conflict and structural breakdown ahead. more
The .ORG Stewardship Council is, in a lot of ways, a natural progression or evolution from our current PIR Advisory Council. The Advisory Council is made up of independent .ORG community members from around the world that provide advice to PIR on policy issues affecting them. The "AC," or the Advisory Council, has been a key part of PIR's work since its inception. more
In part one of this post we introduced the cyber response curve. In this post, we have outlined some observations which illustrate how different level of maturity and approaches can affect your cyber response curve. more
Despite previous attempts1 I think it is safe to say that the discussion about Human Rights in ICANN was, until recently, fairly dead, even taboo. Nowadays, there seems to be a renewed demand for ICANN to have a future, and it needs to take Human Rights considerations seriously. During the ICANN Cancun meeting, representatives from several stakeholder groups mentioned HR and how they might support ICANN by informing its policy-making processes. more
Pew Research finds most Americans are online, yet access still tracks income, age and geography. Broadband gaps persist as subsidies fade, while smartphone dependence rises, reshaping how millions connect to work, services and civic life. more
Sponsored byVerisign
Sponsored byRadix
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byCSC
Sponsored byIPv4.Global
Sponsored byWhoisXML API