Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Is It Time to Supplement Desktop Security Protections?

Internet users are acutely aware of their exposure on the Internet and clearly concerned about their safety. Increased downloads of scareware as Conficker made headlines in the mainstream media are only the latest evidence. Desktop software is often viewed as a one-stop shop for fighting Internet threats such as viruses, worms and other forms of malware and phishing. These solutions have served us well but more protections are needed to address the dynamic and increasingly sophisticated web based exploits being launched... more

ICT in Agriculture: A Travel to Australia’s Outback Queensland

In October 2020, I went on a two-week tour into Queensland's Outback, traveling through various landscapes from pastoral and agricultural lands to savanna and the desert. Leaving Brisbane, past Toowoomba, you enter the Darling Downs. This is one of the richest agricultural areas in Australia. British Botanist Alan Cunningham first explored it in 1827. However, only after the penal colony of Moreton Bay (now Brisbane) was closed, free settlers were allowed in the area. more

State of Broadband Report 2014

Last Sunday I attended the 10th meeting of the UN Broadband Commission for Digital Development in New York, where we launched this new report -- State of Broadband Report 2014. Here are some of the highlights of the report. Over 50% of the global population will have Internet access within three years' time, with mobile broadband over smartphones and tablets now the fastest growing technology in human history, according to the 2014 edition of the State of Broadband report. more

Zero-Rating and the Creation of Digital Castes

During the last Internet Governance Forum in Istanbul, a day was devoted to Net Neutrality with three panels devoted to the subject. The first was exactly about Zero-Rating: Net Neutrality, Zero-Rating & Development: What's the Data? the second was Network Neutrality: a Roadmap for Infrastructure Enhancement and last, the main session Network Neutrality: Towards a Common Understanding of a Complex Issue and Zero-rating was discussed on all three panels. more

Just Make It Stop

In a recent discussion among mail system managers, we learned that one of the large spam filter providers now has an option to reject all mail from ESPs (e-mail service providers, outsourced bulk mailers) regardless of opt-in, opt-out, spam complaints, or anything else, just block it all. Some of the ESPs wondered what would drive people to do that... more

First Impression: FCC Rules for the 700MHz Auction

The FCC has issued rules which will govern the auction of valuable radio spectrum which could make a huge difference in the price and quality of communications in America. The glass is definitely half something: I'd say closer to empty than full but there are some things to like and some hope for competition. The decision is a compromise. Republican Chairman Martin was joined by Democrat Commissioners Adelstein and Copps in setting some open access conditions for 22MHz out of the 62MHz which will be auctioned. Republican Commissioner Tate reluctantly went along with these conditions and Republican McDowell voted against them. more

Assessing Intent to Cybersquat

It, perhaps, does not have to be said that cybersquatting is an intentional tort. No one would expect the respondent to admit unlawful intention, but complainant's proof must nevertheless support that contention. The Panel in Hästens Sängar AB v. Jeff Bader / Organic Mattresses, Inc. FA2005001895951 (Forum July 31, 2020) reminds us that it takes more than bad faith use of a domain name to find cybersquatting. more

IP Addresses and Privacy Sensitive Data - A Level Playing Field Needed

Reading Peter Olthoorn's book on Google (a link is found here), I ran into a passage on IP addresses. Where Google states that it does not see an IP address as privacy sensitive. An IP address could be used by more than one person, it claims. The Article 29 Working Party, the EU privacy commissioners, states that it is privacy sensitive as a unique identifier of a private person. It got me wondering whether it is this simple. Here is a blog post meant to give some food for thought and debate. I invite you to think about the question 'how private is an IP address'? more

Yes, 3 Billion Net Users by End of Year, but What Will the Majority in Emerging Markets Do Online?

The United Nations International Telecommunications Union (ITU) announcement that by end 2014, there will be nearly three billion Internet users -- two-thirds of them from the developing world -- with mobile-broadband penetration approaching 32 per cent. This information is so timely that it needs to be put in proper perspective by asking: What will the majority of these two-thirds do online? And how do we in the ICANN community deliver on our mandate of serving the global public interest? more

A New Undersea Cable - Landing in Cuba?

Deep Blue Cable is planning a Caribbean cable - phase one, the solid line shown on the map, bypasses Cuba but phase two shows two Cuban landing points. The phase two cities are not shown, but one appears to be near Havana and the other near Playa Girón. The phase one route survey is underway. Cable installation will begin in September 2018, and it is scheduled to be ready for service in December 2019. more

Future Network Forum to Be Held in Nanjing in December 2015

Between December 10th and 11th 2015, the China Future Network Development and Innovation Forum, jointly hosted by the Chinese Academy of Engineering and the Nanjing Municipal Government, is scheduled to be held in Nanjing, Jiangsu, China. The forum will be jointly organized by Jiangsu Future Networks Innovation Institute and Beijing Internet Institute, with the theme of "Building future network test facilities and promoting network development & innovation", and it will invite nearly a hundred industrial experts at home and abroad, to establish a platform marked by security, innovation, openness, cooperation where the policy, industry, academics, and application are integrated. more

Starlink Sales Are Straining Capacity in Parts of the U.S. And Canada

On June 5th Elon Musk said SpaceX had nearly 500,000 customers in 32 nations and 9 languages. By now, there must be 500,000 customers, most of whom are in the U. S. and Canada, and their performance is suffering. In the first quarter of this year, OOKLA reported that the median Starlink download speed fell from 104.97 to 99.55 Mbps in the U.S. and from 106.64 to 97.4 Mbps in Canada. more

How Global Trends Arising from COVID-19 May Influence Online Brand Protection Strategies

We're in an interregnum where society has paused, and there's no telling how things may turn. In such times of crisis, we are the explorer; exploring the uncharted waters of change, where dangers and opportunities lie. How the pandemic caused this greater societal change may not be something that an individual can alter, we may, however, take the helm and navigate. more

Virtual Extortion?

Maybe you saw this story: A Chinese man (whose name is not given) has been sentenced to serve three years in prison for extorting "virtual items and currency" from a "fellow Internet café user." The currency was worth 100,000 yuan or $14,700. The man who's sentenced to three years and the three friends who helped him also "extorted virtual equipment for online games" from their victim. The friends only seem to have been given a fine; the primary extortionist got both a fine and a jail time. The virtual currency was QQ coins... As I'm sure all of us know, there's a thriving market in virtual goods and currency... more

Internet as Non-Kinetic WMD

With each passing day, a new public opinion article appears or U.S. government official pronounces how the open internet is abetting some discovered catastrophic effects on our societal institutions. In just one week, the examples include increased information on FSB & GRU attacks on electoral systems and infrastructure, Trump's obliging tactical destruction of societal norms and propagation of the QAnon cult, U.S government agency officials playing "cyber security spin-the-bottle" at press conferences... more

Topics

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days