/ Most Viewed

Reflections on the 2013 Caribbean Cable Telecommunications Association Conference

We're jamming! Well, jamming in the cable industry, in the Caribbean. This year's Caribbean Cable Telecommunications Association (CCTA) annual conference ran from January 22 to 24 and was billed as "the Caribbean meets the future of cable TV." Indeed, the topics were all forward-looking -- network upgrades, new plant expansions, delivery of content over multiple devices, search and navigation tools -- the list goes on. It's an event where folks in the broadband business get together to share ideas and best practices. more

Risk vs Benefit: The Impact of Shorter 90-Day SSL Certificate Life Cycles

In today's digital age, securing your website and ensuring your users' safety has never been more critical. Secure sockets layer (SSL) certificates are the go-to solution for securing websites by encrypting the data transmitted between web servers and browsers. Historically, SSL digital certificates could be valid for years, after which they had to be renewed or replaced.  more

Rumor: Rod Beckstrom Next ICANN CEO

Sources indicate former director of the US Homeland Security Department's National Cybersecurity Center (NCSC), Rod Beckstrom, will be replacing the current ICANN CEO, Paul Twomey, who announced his resignation earlier this year. Milton Mueller in a blog post on the IGP website writes: "This is still unconfirmed by ICANN but comes from well-informed sources. We also hear that David Eisner, the CEO of the Corporation for National and Community Service under G.W. Bush and former VP at AOL, was also in the running." Beckstrom recently made headlines for his sudden resignation from his post at NCSC, criticizing the lack of funding from the NSA and its move to try to "rule over" the NCSC. more

Understand the Value of Defensive Domain Registrations

The bulk of corporate domain portfolios largely consist of defensive registrations which often include common misspellings, product names, and abbreviations in countries where they may not even be doing business. More than ever, with the launch of new generic Top-Level Domains (gTLDs) expected to occur next year, companies are now taking a hard look at their defensive holdings and asking themselves whether or not they really need all of these registrations. more

US Should Take More Aggressive Counter-Measures On IP Theft, Including Use of Malware

A bipartisan Commission recently produced a report titled, "The Report of the Commission on the Theft of American Intellectual Property". Karl Bode from dslreports.com writes... more

Ukraine: What Are the Likely Implications for Norms and Discussions in Cyberspace?

The invasion of Ukraine by Russia on 24 February, and the events since, have shocked and horrified the world. The immediate focus must be on protecting the safety, security and human rights of the Ukrainian population. But we can already see how the war will also impact broader global events, discussions and behaviour, particularly relating to the digital environment. more

Unraveling the Myths of the Internet’s Origins - Part I

There are several myths that dominate the public perception of the Internet. These myths make it hard to understand the needs and nature of the Internet and its future development. One of the most dominant myths equates the early U.S. packet switching network known as the ARPANET with the metasystem linking diverse networks that we call the Internet. One such example is demonstrated by the time line at the AT&T web site. They write... more

IPv6: Do as I Say or Do as I Do?

How important is it for a vendor, service provider or integrator to be using a service or technology that it is pushing on its clients? When Voice over IP (VoIP) came out Cisco began a gigantic push, having its salespersons pitch it to anyone and everyone on their client list. But Cisco had not yet deployed VoIP within its own corporate network. It was still making use of traditional voice systems from vendors that today it probably considers competitors. Many people on the receiving end of a sales pitch recognized this... more

ISPs Saw a 30% Increase in Traffic During the Pandemic, 40% During Peak Business Hours

ISPs in the U.S. saw a significant surge in both downstream and upstream traffic, increasing at least 30% and as much as 40% during peak business hours and as much as 60% in some markets, according to a new report from the Broadband Internet Technical Advisory Group (BITAG).  more

Petya Ransomware Spreading Rapidly Worldwide, Effecting Banks, Telecom, Businesses, Power Companies

A large scale ransomware attack today is spreading rapidly worldwide, shutting down computers at corporates, power supplies, and banks across Russia, Ukraine, Spain, France, UK, India, and Europe and demanding $300 in bitcoins. more

SpaceX Introduces Affordability-Based Starlink Pricing

When SpaceX announced the price of the Starlink service, Elon Musk said it would be the same everywhere but I wrote that eventually it would be priced to be affordable in different nations. (If you predict enough things, you are bound to get something right). The fixed cost of a satellite Internet constellation is high -- satellites are expensive to make and launch -- but the cost of adding and servicing a new customer is low, and the market is global. more

Let’s Face Facts: We Need a New Industrial Internet

The Internet is a great success and an abject failure. We need a new and better one. Let me explain why. We are about to enter an era when online services are about to become embedded into pretty much every activity in life. We will become extremely dependent on the safe and secure functioning of the underlying infrastructure. Whole new industries are waiting to be born as intelligent machines, widespread robotics, and miniaturized sensors are everywhere. more

IP Address Information Misused by Authorities Says EFF, Not Enough to Justify Police Raids

"Law Enforcement, Courts Need to Better Understand IP Addresses, Stop Misuse," says EFF in whitepaper released on Thursday. more

Freedom of Expression Part 2: Blocking, Filtering and Removing Online Content

The Internet is a catalyst for what has revolutionised and transformed human societies in giving extraordinary access to information that has catapulted development and economic growth. It also comes with threats of exploitation by those who wish to do harm. In Part 1 of these series, we looked at how Twitter banned Graham Linehan for his tweet where we saw that to an extent, it was justifiable under Californian law but that a Judge in the Fiji courts would disagree with. more

ICA Posts Position Paper and Analysis of Snowe “Anti-Phishing” Legislation

The Internet Commerce Association (ICA) has posted a position paper and analysis of S. 2661, introduced on 2/25/08 in the US Senate. While we are firmly opposed to phishing and other criminal activities that may utilize domain names we are very concerned about the provisions of the proposal that appear to provide trademark owners with a means to avoid both UDRP and ACPA actions and alternatively bring private claims against domain names with a lower burden of proof and the potential for far higher monetary damages, without even requiring an allegation that the DN was in any way being utilized in a phishing scheme... more