Artificial Intelligence

Artificial Intelligence / Recently Commented

ICT Sectors Are Merging Into a New Wholesale Platform for the Networked Economy

There certainly is a lot of interest in the IoT (personal devices) and M2M (industrial applications) market. But what we are seeing is only what is happening on the surface. Most of the IoT and M2M activities are taking place unseen. For example, all new electronic devices (smartphones, tablets, set-top boxes, game consoles) are now IoT devices. Wearable technology has also become a thriving part of the IoT industry, with an ever-broadening range of possible uses and devices, including smart watches, glasses, clothing items, skin patches, and even implants for health monitoring. more

Anti-Cybersquatting Lessons from IP Strategy

The post reconsiders a cooperative solution to cybersquatting that I proposed in 2007. I also draw on examples of success and failure of legal actions to protect intellectual property (IP) licensing. Cybersquatting has gone unabated with the new gTLDs despite the introduction of new protection instruments such as the Trademark Cleaning House (TMCH) database and the availability of Uniform Rapid Suspension (URS) services, as well as declarations by registries of their intentions to block unauthorized registrations. more

Limitations of .Brand Search Engines

The essay outlines the necessary success factors for a niche search engine and raises doubt regarding the role of .Branding in niche engines' success. Some search engines want to target a niche market, not Google. Unlike Google, they're targeted and they are profitable that way. Consider Kayak (travel), Zillow (real estate), Yelp (reviews), and .xxx (adult websites). more

INET DC, Weds, July 24: Surveillance, Cybersecurity and the Internet’s Future (Livestream available)

Are you concerned about the recent reports about government surveillance programs? Are you concerned about security and privacy online? If so, you may want to attend (in person or remotely) the INET Washington DC event happening on Wednesday, July 24, from 2:00 - 6:00 pm US Eastern time at George Washington University. Sponsored by the Internet Society and GWU's Cyber Security Policy and Research Institute, the event is free and open to the public and will also be streamed live on the Internet for those who cannot attend in person. more

Beyond Smart Cards and Guns in Schools

On January 8, 2013, a Judge from the United States District Court in Texas ruled against a high school sophomore's refusal to wear a smart identity card embedded with a radio frequency chip which is part of the school's smart ID card student locator project. The Judgment show the Testimonies of Superintendent and the Principal in stating that the sensors do not give exact readings nor are they able to pinpoint the exact location of the students. more

A Link to Eternity

While Google is as secretive about its internal processes and systems as Apple is about product development, every now and then senior people post articles on the official Google blog and offer their thoughts on the development of the web. In the latest posting, two Google engineers, Alfred Spector and Franz Och, look at how search strategies will benefit from the faster computers, greater volumes of data and better algorithms we are likely to see in the next decade, speculating that "we could train our systems to discern not only the characters or place names in a YouTube video or a book, for example, but also to recognise the plot or the symbolism." more

Iran’s Digital Arsenal: When Invisible Fences Rise in the Conflict

Iran's near-total internet blackout during airstrikes reveals how cyberattacks, sanctions and platform power can isolate a nation. The conflict shows digital infrastructure, satellites and cloud services becoming decisive weapons in modern geopolitical competition worldwide today. more

How Bad Actors Are Leveraging DNS: Looking at the Latest Trends

Bad actors are exploiting DNS with growing sophistication. New domains dominate threat infrastructure, daily user exposures are rising, and AI is accelerating attack creation, making DNS intelligence an increasingly critical early-warning system for modern cyber defence. more

The Rapid Evolution of Transport Lasers

Exploding internet traffic and AI demand are driving a rapid upgrade in fibre transport lasers, from early one gigabit systems to 400, 800 and even 1.6 terabit links reshaping backbone capacity worldwide as networks scale. more

The AI Effect: Why Brand Impersonation Is Becoming Industrialised

Generative AI has turned brand impersonation from a nuisance into an industrial-scale threat, eroding trust. As ICANN's 2026 round approaches, DotBrand domains promise a structural fix to spoofing that strategies failed to deliver in 2012. more

AI: The Squandered Opportunity in India

India's AI summit promised a Global South rethink of digital governance. Instead, a weak declaration and Delhi's accession to America's Pax Silica exposed widening power asymmetries, leaving countries like Brazil outside the real circuitry of control. more

Munich Cybersecurity Conference 2026: Moving Into the Twilight Zone

At Munich's twin security gatherings, leaders warned that cyber conflict, transatlantic rifts and weaponised AI are pushing the rules-based order into a perilous transition, where deterrence falters, norms erode and digital sovereignty trumps multistakeholder ideals. more

NANOG 96: Gigawatt AI Data Centres and the Risk of a Bubble

At NANOG 96, the AI boom dominated discussions as firms race to build gigawatt-scale data centres packed with advanced GPUs, liquid cooling, and lossless networks, raising fears of overinvestment, neglected security priorities, and a looming infrastructure bubble. more

Starlink Flexing Its Market Power

Starlink is leveraging its growing dominance with data-hungry AI ambitions, regulatory demands, and space infrastructure plans. A merger with xAI could solidify its position as an unregulated gatekeeper of orbital connectivity and intelligence. more

Undersea Cables as a Layer of the AI Tech Stack

As AI shifts from experimentation to real-world deployment, its unseen foundation - undersea cables - emerges as a strategic frontier. Their resilience may shape not only infrastructure policy but the outcome of US-China AI competition. more