/ Most Viewed

Seeing the Opportunity for IP Communications Within the Smart Grid Space

Having followed IP communications as an analyst since 2001, I've seen a few cycles come and go, and Smart Grid reminds me a lot of VoIP. Telcos and utilities both operate large, complex and costly networks, and prior to 1984, both were heavily regulated. Following the deregulation of telecom came a wave of unprecedented innovation and disruption built largely around IP technologies. We all know what that's done for telcos -- and communications in general. more

Five Security Blind Spots from Prolonged Implementation of a Business Continuity Plan Amid COVID-19

The novel coronavirus outbreak (COVID-19) has prompted many organizations in Mainland China and Hong Kong to execute their business continuity plan (BCP). During the last epidemic in 2003, the SARS outbreak lasted for nine months – and with an infection rate that is increasing rapidly, this new coronavirus has the potential to cause prolonged periods of commercial disruption, and heavy reliance on BCPs. more

Secret Doors in Phones and Computers

An article appeared in Computer World that alleges: in exchange for the Indian market presence" mobile device manufacturers, including RIM, Nokia, and Apple (collectively defined in the document as RINOA) have agreed to provide backdoor access on their devices. Could it be true that Nokia, RIM and Apple opened up to Government interception? more

ICANN Must Simultaneously Reveal TLD and Second-Level Registration Rules

I outline two possible drawbacks with the idea of first revealing rules for the new proposed Top-Level Domains (TLDs) and then for second-level registrations. I propose a lottery process to initially allocate second-level domain names. A number of people have voiced concerns about the idea of automatically granting the winner of the TLD a monopoly power over second-level domain registrations. We should also be worried about the financial interest ICANN has in not providing the rules for the two-level registrations simultaneously. more

No Surprise: Verisign’s Shift on New gTLDs

Five years after ICANN approved the new gTLD policy in Paris, two years after it approved the implementation plan in Singapore, and a year after the application window closed and some concrete steps were taken toward delegation of new gTLDs, a series of scary-sounding "what if" scenarios have mysteriously taken over discussions at ICANN. From colliding names and failing life support systems to mass confusion and technological outages, the profusion of horror stories has rivaled the hype for the Y2K conversion, with about as much basis in fact. more

The Free Internet in Jeopardy

The venerated BBC World Service recently commissioned a polled involving more than 27,000 people across 26 countries. The findings are unremarkable: some 87% of Internet users believe that Internet access should be a basic right, and more than 70% of non-users believe that they should have access to it. more

Yahoo Collaborating With US Intelligence Agencies

It was revealed yesterday that Yahoo has been scanning people's email for the federal government. This activity was, apparently, authorized by Yahoo CEO Marissa Meyer but not the former CSO Alex Stamos. Mr. Stamos left Yahoo in June 2015. He also publicly disagreed with the director of the NSA back in February 2015 about the NSA having access to encrypted data. more

White House on SOPA: Protecting Intellectual Property Must Not Threaten Open, Innovative Internet

The White House today released a response to SOPA and PIPA petitions and the legislative approaches to combat online piracy. The response is prepared by Victoria Espinel, Intellectual Property Enforcement Coordinator at Office of Management and Budget, Aneesh Chopra, U.S. Chief Technology Officer, and Howard Schmidt, Special Assistant to the President and Cybersecurity Coordinator for National Security Staff. more

State-Sponsored Cyberattack Against Telecom Providers Is Targetting Data on Specific Individuals

The researchers at Cybereason Nocturnus have identified an advanced, persistent attack targeting global telecommunications providers carried out by a threat actor using tools and techniques commonly associated with the Chinese-affiliated threat actor APT10. This multi-wave attack is reported to have sought to steal communications data of specific individuals in various countries. more

Rewiring Internet Governance: Choice and Control (Part 2)

It is tempting to write off ICANN as a U.S. foreign policy lackey and that's all there is to say about ICANN. However, if the mantra for rewiring governance means "lets get ICANN" we risk missing forest for trees. ICANN is merely the symptom of a dysfunctional governance predicament that somehow (despite best efforts) skews oversight. Shapiro, for example, regards oversight as a "game" (1994). His "delegation dilemma" or "agency problem" stems from two options, neither of which are attractive vis-á-vis governance. more

Malaysian Government to Fully Adopt IPV6 by End of 2012

The Malaysian government is poised to fully adopt the Internet Protocol version 6 or IPv6 by the end of next year and may emerge as the first government in the world to achieve full IPv6 compliance, Deputy Information Communication and Culture Minister Datuk Joseph Salang said. According to the report several government agencies have already adopted IPv6 and several others are in the process of shifting from IPv4. more

Ten Countries Face Significant Internet Disruption After African Coast to Europe Submarine Cable Cut

The ACE (African Coast to Europe) submarine cable that runs along the west coast of Africa between France and South Africa (connecting 22 countries), was damaged on March 30. more

Global Technical Internet Related Issues That Need Fixing

Given its engineering background, many positive contributions can be made by the engineering community in the broader ICT world to assist in addressing some of the broader internet issues, often addressed within the more limited telecoms environment.. Of course some of this is already happening; however much more work would be needed to strengthen the technical foundations of the internet. Just as an example, the type of issues that could be addressed by a broader ICT engineering foundation could include... more

Meeting with ITU Secretary General Dr Hamadoun Touré

During the ITU Conference I had the honour of a private meeting with Dr Hamadoun Touré, Secretary-General of the ITU since 2006... Dr Touré has a fascinating background. Born in Mali and educated in Russia, he has brought with him a distinctly fresh approach to the ITU. He has been Africa's Regional General Manager for ICO Global Communications and worked at various levels at the International Telecommunications Satellite Organization (INTELSAT). more

Remedies for Cybersquatting: New gTLD Domain Names

In the discussions proceeding the World Intellectual Property Organization (WIPO) publishing The Management Of Internet Names And Addresses: Intellectual Property Issues (Final Report, April 30, 1999) that ultimately led to the ICANN implementing the Uniform Domain Name Dispute Resolution Policy (UDRP) (1999) commentators considered three remedies to combat cybersquatting: suspending, cancelling, and transferring infringing domain names. more