Recently, there were news articles about a large software provider who experienced a global outage due to an expired digital certificate - and this is not the first time this kind of issue has hit the news. Digital certificate outages, when an organization forgets to replace an expiring certificate for a business-critical domain name, continues to cause business disruption and security risks. more
Geoff Daily reports today on the App-Rising.com: "A new model is emerging in Brigham City, a city of less than 20,000 in northern Utah, for how user-owned open fiber networks can be financed and deployed. It used to be that the only way you could get fiber was if you were lucky enough to have a private provider lay it or to live in a city that did it itself. Today in Brigham City, for $3,000 you can buy your own fiber. And in fact more than 1,600 local residents have already bought in to this new opportunity." more
The Biden administration is poised to support a contentious United Nations cybercrime treaty, a move likely to spark debate over potential abuses, according to top officials. more
Trust is the lifeblood of the Internet and central to everything that is done here. In order for the current 3.5 billion users to continue using the Internet and its services, and for the next billion users to connect to the Internet, trust is required. The importance of trust is seen even more in Africa where, though there is a high growth of Internet users, the e-commerce uptake rate is very low. Users are very reluctant to carry out financial transactions over the Internet because of fear of being attacked by cybercriminals. more
The coalition led by Engine, Y Combinator, and Techstars, along with over 800 tech startups sent a letter to Federal Communications Commission (FCC) Chairman Ajit Pai urging him to focus "on policies that would promote a stronger Internet for everyone," rather than dismantling the existing net neutrality framework. more
The Canadian Radio-television and Telecommunications Commission (CRTC) today announced that it will strengthened its commitment to net neutrality. more
It is rather amazing to follow the reporting on the FBI vs Apple case in relation to the FBI's order to Apple to provide them with software that would allow them to crack the security code on all Apple phones. In some of those reports spin doctoring from the FBI -- especially through the public media -- led you to believe that Apple is not willing to assist the FBI in the San Bernardino murder case. This is, however, blatantly false. more
Trump and his enablers are well known to disrespect if not disdain legal systems, including public international law. He has effectively abrogated every treaty instrument relating to international communications at the whim of a tweet. His behavior has dishonoured the USA in a way that will take years to remedy. Trump's actions to ban access to Android Operating System updates on Chinese products have significantly harmed cybersecurity worldwide. more
When the scale of global surveillance carried out by the NSA (USA) and by the GCHQ (UK) was exposed by Edward Snowden through The Guardian, people around the world were shocked to discover how two established democracies routinely resort to methods that they have long deplored -- and rightly so -- in dictatorships, theocracies and other single-party arrangements. In a previous article, I lamented the fact that by carrying out this surveillance on an unprecedented scale, the US and the UK are, in fact, converging with the very regimes they criticize. more
The latest technology on the horizon is the metaverse, which, stated simply, is the creation of online environments. While the primary focus of the metaverse is to create alternate realities, an application with a possible immediate big uptake is vertical presence for business meetings. Ciena, a manufacturer of fiber optic transmission equipment, recently did a survey worldwide of 15,000 business people to understand the interests and expectations of the metaverse. more
Cuba, one of the least connected countries, has started providing internet on the mobile phones of select users as it aims to roll out the service nationwide by year-end. more
In a software-defined and virtualised world, who will integrate the complex dynamic systems, and take responsibility for the result? It is unclear if telcos have the skills, but someone else likely does... The included image caught my eye whilst I was reviewing presentations from last October's Metro Ethernet Forum gathering in Florida on behalf of a consulting client. At first glance, it's just a marketing pseudo-Venn diagram peppered with telco tech buzzword bingo. But... more
A recent study conducted by Brandsight has revealed that 28% of the top 500 most-highly trafficked sites now employ registry locking. In contrast, only 15% of the top 500 most highly-trafficked sites were leveraging registry locking in 2013. Back in 2013, only 356 of the top 500 most-highly trafficked sites could be registry locked, but that number has also risen significantly so that now 396 of the top 500 most-highly trafficked sites are eligible. more
China's home grown firms are not only grabbing domestic businesses but also venturing to different countries across the world. On the other hand, foreign players face regulatory walls that make it difficult to tap businesses in China." Saibal Dasgupta reporting today in VOA more
This is the first post in a series from Corey Grant, Senior Industry Consultant at ARI Registry Services, on what .brand TLDs need to do to get started and make the most of their TLDs... If you are a .brand Top Level Domain (TLD) and have a Registry Agreement from ICANN which you have not yet signed, you need to sign it by July 29, 2015. You're not alone; there are many others in the same boat -- all staring at their Registry Agreement trying to figure out what to do next. more