/ Most Viewed

Characterizing the Friction and Incompatibility Between IoC and AI

Many organizations are struggling to overcome key conceptual differences between today's AI-powered threat detection systems and legacy signature detection systems. A key friction area -- in perception and delivery capability -- lies with the inertia of Indicator of Compromise (IoC) sharing; something that is increasingly incompatible with the machine learning approaches incorporated into the new breed of advanced detection products. more

A Call to Action for an Inclusive WSIS+20 Review

Last week, GPD, together with 114 organisations and 57 individual experts from civil society, the technical community, industry and academia, presented a set of cross-stakeholder community recommendations aimed at operationalising the modalities for the twenty-year review of the WSIS (WSIS+20). The open letter responds to the adoption on 25 March of a UN General Assembly resolution on WSIS+20 modalities, advocating for a transparent and inclusive review process that meaningfully engages all relevant stakeholders. more

Telecoms Development Booming in the French Pacific Territories

After the nuclear submarine debacle with France, political ties have been restored, and both France and Australia have agreed on further cooperation in the South Pacific, where France has several overseas territories. Also, here telecoms is a key issue. Such cooperation has become more urgent with the increased political interest of China in the region. more

ICANN Cancels Jordan Meeting Due to Middle East Turmoil

Following reports by various sources yesterday, ICANN today has officially announced that it will not hold its Jun 20-24 Public Meeting in Amman, Jordan. ICANN's Board of Directors made the decision in light of recent developments in the Middle East. "The Board reluctantly made its decision after closely monitoring the rapidly changing developments affecting the Middle East. The decision reflects the Board’s view that regional developments could have a negative impact on attendance at the meeting," says ICANN's via a blog post today. more

Cybersecurity Standards Competition

The conventional wisdom in the world of legacy standards-making is that monolithic standards produce, if not accelerate, better products and services. Conformance, certification, and associated labelling schemes to implement those standards were believed essential to trust. Although competition law seems now evolving in the other direction, regulatory standards-making bodies themselves have been accorded considerable anticompetitive cartel liability protection. more

Freedom to Connect

Over the last ten years, Andrew Odlyzko has been writing about a pricing algorithm that would assure reasonable service levels at reasonable prices. If you're going to F2C, you might want to read that brief article or this slightly more complex one to learn (or refresh your sense of) PMP -- Paris Metro Pricing models to deal with network congestion. You'll also get a sense of why throwing bandwidth at the network will not be sufficient. Here's a great article from 1995... more

ISOC Will Not Participate in NETmundial Initiative

The Internet Society Board of Trustees has issued an announcement stating that it cannot agree to participate in or endorse the Coordination Council for the NETmundial Initiative. "We are concerned that the way in which the NETmundial Initiative is being formed does not appear to be consistent with the Internet Society’s longstanding principles," says the statement released today. more

FCC Chairman: It’s Time to Settle Net Neutrality Questions

Federal Communication Commission (FCC) Chairman, Tom Wheeler, today in an open letter in the Wired Magazine writes: "After more than a decade of debate and a record-setting proceeding that attracted nearly 4 million public comments, the time to settle the Net Neutrality question has arrived..." more

Several Models of Android Devices Discovered Collecting and Transmitting Sensitive Personal Data

Several models of Android mobile devices discovered containing firmware that collect sensitive personal data about their users and transmitted this sensitive data to third-party servers without disclosure or the users' consent. more

ICANN’s Registration Data Request Service: Open Working Session at ICANN79

Last November, ICANN launched a ticketing system for those interested in obtaining domain name registration data ("WHOIS"). Titled Registration Data Request Service, or RDRS, the portal aims to direct requests for WHOIS data to participating registrars, who then decide whether or not to disclose the data. more

Website Monitoring Practices Taking Advantage of Critical Loopholes in Privacy Protection

Researchers at the University of California, Berkeley's School of Information have released a report raising concern over website monitoring practices which appear to be taking advantage of critical loopholes in privacy protection. According to the study, most popular websites in the United States "all share data with their corporate affiliates and allow third parties to collect information directly by using tracking beacons known as 'Web bugs' -- despite the sites' claims that they don't share user data with third parties." more

How Are You Solving the Digital Divide

One of the most common questions I'm being asked these days is from local politicians and economic development folks who want examples of other communities that are tackling and solving the digital divide. I'm able to trot out the big-picture stories because they come to my attention in reading about the industry. As an example, just before I wrote this blog, I read an article that says that the State of Maryland will be providing 150,000 laptops to homes... more

Google Fiber Pauses Operations Until Further Notice

Access, the Alphabet internet division containing Google Fiber, is laying off about nine percent of its staff and "pausing" fiber operations while looking for alternate ways to deliver internet service to new cities. more

White House Announces Historic $42 Billion Investment in Nationwide Broadband Access

In an effort to universalize access to high-speed broadband by 2030, the White House has allocated $42 billion to the 50 states and U.S. territories under the Broadband Equity Access and Deployment Program. more

U.S. Federal Government Response Too Slow to Friday’s Internet Attack, Warns Cybersecurity Official

"We often refer to the Cuyahoga River in Cleveland that caught on fire over 20 times before we actually did something to introduce the Clean Water Act," says Allan Friedman, the director of cybersecurity initiatives for the Department of Commerce's National Telecommunications and Information Administration (NTIA), in conference call on Monday. more