/ Most Viewed

Models for Muni WiFi Completely Neglect Technology Evolution

Modern travel means interminable waits, but it's a good time for reading. I finally read Wireless Pittsburgh: Sustainability of Possible Models for a Wireless Metropolitan-Area Network by Jon M. Peha, published in February as a working paper of the New America Foundation. The good news: it's full of interesting cost estimates and projected subscriber take rates based on specific demographics in Pittsburgh, Minneapolis and Philadelphia... The flaws in this study...
 more

Beyond Telco 2.0 and Quadruple Play

One of the great challenges has been to conceive a business model for next generation telephone companies. This is constrained by their limited core competences which do not match well with many of the opportunities that lie in entertainment and complex/customised bundles for consumers. Frost & Sullivan, a leading firm of industry analysts, notes the enthusiasm of service providers to offer connectivity, entertainment and information services, within a digitally connected world... more

ICANN Gives .amazon Talks a March Deadline

ICANN's board of directors has voted to put a March deadline on discussions concerning .amazon top-level domain. more

How to Dispute a Third-Level ‘Country-Code’ .com Domain Name (Such as nike.eu.com)

Shortly after I recently wrote about WIPO's new role as a domain name dispute provider for the .eu ccTLD, the Forum published its first decision on another type of "eu" domain name: eu.com. The decision involved the domain name nike.eu.com. What makes this case interesting is that it represents one of the few .com domain name disputes that includes a country-code in the second-level portion of the domain name. more

German High Court Says No to Retaining Telecom, Email Data for Tracking Criminal Networks

The highest court in Germany has ruled against telephone and email data retention used to track criminal networks. Melissa Eddy of the Global and Mail reports: "A law ordering data on calls made from mobile or landline telephones and e-mail exchanges be retained for six months for possible use by criminal authorities violated Germans' constitutional right to private correspondence, the Federal Constitutional Court ruled. In its ruling, the court said the law failed to sufficiently balance the need for personal privacy against that for providing security."
 more

The McCain Campaign’s “Technology” Message

I look at this as the ideas of Mike Powell and Meg Whitman, and a lot of unimportant wordsmithing. Before the Dublin (Erie) IETF I wrote one for one of the top three DCCC targeted races. You, or One, or I (isn't voice fun) tries for ideas that matter, and then try to connect the dots, for the semi-literate staff of a candidate who needs clue, e.g., to make effective calls to the DNC's major contributor lists for area codes 415, 408, 650 and 831. I mention Dublin because ages ago Scott Bradner's plan for Harvard, decent bandwidth everywhere and location transparency was, in just a few pages, a revolutionary policy document then, and now, and I was happy to see Scott again and let him know that two decades later I still remembered seeing policy stated with confidence and clarity. more

Comparing the Spectrum Policies of America and China

With the explosion in mobile broadband, every mobile operator is scrambling to secure the spectrum capacity needed to stay ahead in the market. There is no doubt that spectrum management is one of the most critical elements of telecommunications policy. It is seen as the pathway to 21C infrastructure... It is interesting to see how the different countries handle their spectrum management policies. more

How Big Is That Network?

It's often observed that the Internet was a direct outcome of the progressive liberalization of national telecommunications markets in the late twentieth century. This allowed the entry of a wave of Internet entrepreneurs into various national telecommunications markets that were historically dominated by incumbent telephone monopolies. The resultant transformation of telecommunications over the past two decades is as much a testament to the transformational power of open markets as it is to the prodigious ability of the Internet's technology base to service the ever increasing demands being made of it. more

INET New York - Remote Participation Details

The Internet Society (ISOC) will present an INET Regional Conference today June 14 2011 at the Sentry Center in NYC. The theme is "It's your call. What kind Of Internet do you want?". The distinguished line up of speakers will include 'Father of the Internet' Vint Cerf, World Wide Web inventor Sir Tim Berners Lee, and Assistant Secretary for Communications and Information at the U.S. Department of Commerce Lawrence Strickling. more

A Cynic’s View of 2015 Security Predictions - Part 2

Every year those in the security industry are bombarded with various cyber security predictions. There's the good, the bad and the ugly. Some predictions are fairly ground breaking, while others are just recycled from previous years -- that's allowed of course if the threats still stand. In part one of my predictions I looked at the malware threats, so let's take a look at big data and the cloud for part two. more

Restricting Anti-Virus Won’t Work

In a blog post, Stewart Baker proposed restricting access to sophisticated anti-virus software as a way to limit the development of sophisticated malware. It won't work, for many different and independent reasons. To understand why, though, it's necessary to understand how AV programs work. The most important technology used today is the "signature" - a set of patterns of bytes - of each virus. Every commercial AV program on the market operates on a subscription model... more

ICANN Proposes Exclusive TLD: .INTERNAL for Private Use

The Internet Corporation for Assigned Names and Numbers (ICANN) is considering the introduction of a new top-level domain (TLD) named .INTERNAL. Unlike traditional TLDs, .INTERNAL is designed exclusively for internal use, akin to the private IPv4 block 192.168.x.x. more

Probability of ROI and Tighter Network Security by Blocking Malicious Subdomains

Failing to block a stealthy malicious host from making connections to your network could cost your company millions of dollars, a damaged reputation, and severe losses in sensitive private data. Threat intel teams have faced on-going problems: Expensive feeds that are slow to catch new threats; Chasing false positives in alerts wastes time and money; and Vendors selling a new appliance for every ill. Would 100% of your users Spot the Bot? more

FCC Proposes Over $200 Million in Fines Against Four Largest Wireless Carriers

The U.S. Federal Communications Commission has proposed fines against the country's four largest wireless carriers for apparently selling access to their customers' location information without taking reasonable measures to protect against unauthorized access to that information. more

Desperate Attempts to Drag the USA Into the Digital Economy

In the USA an interesting initiative has been taken by a number of leaders in the telco industry who are frustrated with the inability of the country to start building the high-speed broadband infrastructure that is needed for the development of its digital economy. While the Obama Administration has the right vision to make this happen - and the American National Broadband Plan is a good example of this - the dysfunctional political state of the country makes it impossible to establish the industry transformation needed to make this happen. more