/ Most Viewed

Cyber Security Forecast for 2009: Data and Mobility Key Part of Emerging Threats

Georgia Tech Information Security Center (GSTISC) today held its annual Security Summit on Emerging Cyber Security Threats and released the GTISC Emerging Cyber Threats Report for 2009, outlining the top five areas of security concern and risk for consumer and enterprise Internet users for the coming year... According to the report, data will continue to be the primary motive behind future cyber crime-whether targeting traditional fixed computing or mobile applications. "It's all about the data," says security expert George Heron -- whether botnets, malware, blended threats, mobile threats or cyber warfare attacks. more

Brussels Mandate: Community-Developed Tmch Gains Ascendancy

ICANN has tentatively agreed to proceed with the community-developed Trademark Clearinghouse (TMCH) model following two days of discussions at a specially organised informal meeting in Brussels last week. I believe this is an important breakthrough for the intellectual property, registry and registrar communities as it provides the best harmony between technical implementation and best practice trademark protection policy. more

Vehicle Manufacturers Tell Govt to Stay Off Regulating “Internet of Cars”

Major car manufacturers in U.S. are asking Congress to stay away from any type of increased regulation unless "absolutely necessary" as the industry evolves to take advantage of the "Internet of cars." more

ISPs, COVID-19 and the Coming Year of Confusion

I've had a number of people ask me about how I think COVID-19 will impact the ISP industry over the next six months. It's an interesting question to consider because there are both positive and negative trends that ISPs need to be concerned about. The chances are that these various trends will affect markets and ISPs differently - making it that much harder for an individual ISP to understand what they are going to see over the next six months. more

The Perpetual Peril of Open Platforms

Over at Techdirt, Mike Masnick did a great post a few weeks back on a theme I've written about before: peoples' tendency to underestimate the robustness of open platforms. "Once people have a taste for what that openness allows, stuffing it back into a box is very difficult. Yes, it's important to remain vigilant, and yes, people will always attempt to shut off that openness, citing all sorts of "dangers" and "bad things" that the openness allows..." more

Why Mid-Sized Businesses That Embrace the Cloud See Improved Revenues

According to a recent study from IBM, mid-sized businesses that embrace cloud technology see nearly double the revenue and increased profit growth compared to their more hesitant peers. The study, which included 800 leading global IT professionals, found that the 20% of organizations that had committed more resources to the cloud were reaping significant cost-cutting advantages and improved levels of efficiency. more

Professional Services Are a Safe Bet to Address Staff Shortages

Many organizations today are tightening their belts. They have smaller budgets and fewer resources even though they face an ever-growing list of projects, tasks and corporate IT initiatives to complete. IT departments are hard pressed to streamline operations but don't necessarily have the manpower -- be it resources or specific skillsets -- to add capabilities that will achieve such efficiency. There are only a few possible solutions organizations can consider to address this common problem... more

Busy Skies: Weighing the Downside of Launching Huge Numbers of Satellites for Broadband

I was looking over the stated goals of the broadband satellite companies and was struck by the sheer numbers of satellites that are being planned. The table further down in the blog shows plans for nearly 15,000 new satellites. To put this into perspective, consider the number of satellites ever shot into space. The United Nations Office for Outer Space Affairs (NOOSA) has been tracking space launches for decades. more

State Department Should Return to Its Knitting

Having researched and written about the 100 year history of U.S. State Department's institutional machinations in the telecom/cyber sector, taught law school graduate courses, and worked with its bureaus and staff over the past 45 years, the latest twists and turns seem to repeat past mistakes. The fundamental problem is that the U.S. is the only country whose Foreign Ministry is given a significant role and engaged in telecom and cyber matters in global venues. more

Satellite Spectrum Showdown: Musk’s Starlink vs. Ambani’s Reliance Jio in the Race for India’s Broadband Future

Elon Musk's quest to expand his Starlink satellite broadband service into India faces significant pushback from Mukesh Ambani, Asia's wealthiest individual and head of Indian telecom giant Reliance Jio. more

IPv4 and Education: The Basics

An IP address is a unique identifier for a device on a network, including the internet. IP stands for Internet Protocol (IP) which is a set of rules (a protocol) for addressing and routing data so it can travel through networks and arrive at its intended destination. Hence, "address." Internet-connected devices such as computers and smartphones each have a unique IP address. more

Open Data Leads to Competition

In a previous post, I spoke of Amazon's use of customer and market data in restraint of trade, but they are not alone. For example, leaked internal documents show that plans to sell access to user data were discussed for years and received support from Facebook's most senior executives. Facebook gave Amazon extended access to user data because Amazon was spending money on advertising and partnered with them on the launch of the Fire smartphone. more

Carrier Hotels: The Unsung Critical Part of Broadband Connectivity

Today's blog talks about a critical part of the broadband network that most people don't know about -- carrier hotels. These are locations that have been created for the specific purpose of allowing carriers to connect to each other. The need for carrier hotels became apparent in the year after the passage of the Telecommunications Act of 1996. That new law allowed local competition for telephone service. more

ICANN Reopens TLD Application System

After nearly six weeks of shutting down its TLD Application System (TAS) due to software issues, ICANN announced today the reopening of TAS. From the announcement: "The system will remain open until 23:59 GMT/UTC on 30 May 2012. Consistent with our previous practice and to allow the application window to open as soon as possible, two-hour maintenance windows have been scheduled as follows: 22 May at 16:30 GMT/UTC, 25 May at 23:00 UTC, and 29 May at 22:00 UTC. ... During the last few weeks, we have fixed the technical glitch that caused us to take the system offline." more

New EU Satellites to Protect Government Communications, Provide Connectivity and Surveillance

A new network of European telecommunication satellites will be active from 2024, following the green light by European Parliament. The Infrastructure for Resilience, Interconnectivity and Security by Satellite project is aimed at providing a secure communications infrastructure for EU government bodies and agencies, emergency services and European delegations around the world. more