The numbers are big. Official figures quoted at the recent 21st annual China Content and Broadcasting Network (CCBN) conference indicate that China has 400 million TV households, of which 210 million subscribe to cable TV (CATV). Of these cable subscribers, 140 million receive digital service while the rest are still on analog systems. This means that the country's CATV network is still largely a one-way network, limiting the growth of on-demand and interactive services. more
Policies such as network neutrality and minimum speeds for broadband seek to limit the ability of carriers to favor some applications over others. Well-intended though these initiatives are, they still leave users negotiating for passage while confined to the carriers' "pipes". In this scenario, end users remain limited by how the incumbents choose to build their broadband content delivery networks. more
In my last blog post I shared some of the general security challenges that come with the Internet of Things (IoT). In this post, I will focus on one particular security risk: distributed denial of service (DDoS) attacks. Even before the age of IoT, DDoS attacks have been turning multitudes of computers into botnets, attacking a single target and causing denial of services for the target's users. By "multitudes" we can be talking about thousands or even millions of victim devices. Now add IoT into the equation... more
There soon will be a central place for Web surfers to dwell in a forbidden cyber land of adult fantasies, sex, dark rituals and total taboos. Finally, ICANN has given in to the pressure and has tossed a big rock across the turbulent e-commerce ocean. It has approved a new suffix, .xxx, for adult-only porn sites, creating ripples and debates in ever so confusing global cyber branding times when cyber global domain name challenges are being fought in the complex earthly trademark realities. Three things are bound to happen. more
Sam Gustin reporting in DailyFanance: "As Apple (AAPL), Amazon (AMZN), Netflix (NFLX) and Google forge ahead with highly publicized new plans to stream high-speed content like movies and TV shows to your living room, smartphone, telecom and cable giants like AT&T, Verizon and Comcast (CMSCA) have been intensely lobbying to maintain control over the broadband pipes they spent billions to build. Comcast is going so far as to buy a rich content factory, NBC Universal, a deal that would create a $35 billion media and delivery juggernaut." more
Public consultations on the new "Internet Governance Forum" being created by the United Nations will be held in Geneva February 16-17. The Internet Governance Project has released a new discussion paper explaining how the Forum could work. The Forum must be as open as possible and give all stakeholders equal participation rights. Its deliberations must be wide-ranging and resist politically motivated barriers to discussion. And its products must feed into other, more authoritative Internet governance forums. more
A report recently released by McAfee Advanced Threat Research (ATR) revealed a fileless attack targeting organizations involved with the Pyeongchang Olympics. more
ITU is 143 years old and it has done a lot of good work. But it is so huge and powerful that it has been monopolizing (or mono-unionizing) Telecommunications for the last 143 years. ITU's hold over communications has been sweeping. But during the last ten years, ITU's member Telcos have seen several challenges from the open Internet architecture... ITU and the Internet organizations did not quite get along for this and several other reasons Especially the ITU has had its share of differences with the ICANN. Dr. Hamadoun Toure, Secretary General of the ITU addressed the ICANN Annual Meeting at Cairo on 6 November 2008. Here are some excerpts from the Secretary General's speech with my comments. more
It's a story told a thousand times: founder of a company ousted by investors. It's a story so common you can find it any day of the week as a minor headline in a tech blog. Not much of a story at all really, until it happened to me. Minds + Machines, the company I founded in 2009, informed me last week that I was no longer wanted as CEO. Without going into details, which I can't, there were differences and disagreements. Still, it was a surprise. All the plans, the hopes -- pfhhht! into thin air. It sucked. Now what? more
It has become popular today around Washington and the venues of its coerced allies to issue threats to ban telecommunications equipment from certain countries - especially equipment intended for 5G use. The guise is vague assertions of "national security." It is an old tactic dating back to the turn of the last century and recurrent for decades. A combination of treaty instruments and collaborative industry standards activity several decades ago largely put an end to the banning tactic - significantly benefitting the entire world. more
Applications and devices like cell phones, email, search engines, and automated programs handle the error messages differently; it would be naive for VeriSign to think only humans with browsers rely on DNS. When a user enters a non-exist domain name on their cell phone the DNS error message would prevent downloading. Now cell phones download VeriSign's SiteFinder webpage and Service Providers bill the cell phone user for that extra usage. SPAM prevention programs also rely on this error message to check to see if the domain is real. more
ICANN's new Registry Service Technical Evaluation Service (RSTEP) process is definitely a positive step forward for ICANN. The comment period for the Tralliance proposed new service using the DNS wildcard feature closed Wednesday night. ...Ken Fockler commented "there are no right answers and no wrong answers, just judgments and decisions made on those judgments." In this light, I would be interested in hearing different perspectives on the following questions... more
While typosquatting is not a new phenomenon, recent research highlights that it is being used to collect sensitive corporate information from employees and lure consumers to interact with dubious websites. ... Security consultancy Godai Group recently uncovered the use of a specific type of typosquat - a "doppelganger domain" - to collect sensitive enterprise information via email-based attacks. more
The introduction of new generic top-level domains (gTLDs) to the Internet moved a step closer Friday, when the ICANN Board laid out its plan for the final stages of approving the new gTLD program. In a lengthy resolution, passed unanimously at the conclusion of a week of consultations in Cartagena, Colombia, the Board sought to draw a line under some policies where it believes the community has reached agreement, while highlighting others where further discussions are needed before the doors are opened to applications next year. more
It may not be widely-known but the big 3 search engines -- Google, Yahoo! and Bing -- have established procedures for removing natural search results on the basis of the Digital Millennium Copyright Act (DMCA). That's good news for brand owners: if consumers can't find infringing websites via the search engines, they're less likely to come across them at all... more