"China Sets New Tone in Drafting Cybersecurity Rules," By Eva Dou in Beijing and Rachael King in San Francisco reporting in the Wall Street Journal. more
As the first Chief Economist of the Internet Society, Michael Kende has joined the organization to provide strategic insights into the economic dynamics of Internet issues, as well as current and emerging trends impacting the Internet. Based in Geneva, Switzerland, he will be responsible for leading economic research and analyses as well as key Internet development, policy, market, and technology issues. more
I have to wonder if this year is making the big ISPs rethink their business plans. For years, many big ISPs have foregone making long-term investments in broadband and instead chased the quick return. A good example is CenturyLink. Before the merger with Level 3, the company had started a program to replace the copper plant in urban markets with fiber aggressively. At the peak, the company built fiber to pass 700,000 homes a year. more
Comcast has sketched out plans for a gigantic database called "TV Warehouse," able to store a full year of statistics gathered from digital set-tops in more than 16 million households nationwide, according to an industry executive familiar with the project. TV Warehouse, envisioned as having a massive 500 Terabytes of storage, would then feed up to a database even broader in scope operated by Canoe Ventures, the advanced-advertising venture formed by Comcast and five other large MSOs. more
Pioneering cryptographer Whitfield 'Whit' Diffie has joined the Internet Corporation for Assigned Names and Numbers (ICANN) as Vice President for Information Security and Cryptography. Diffie will provide advice on general security matters related to ICANN's mandate, and to ICANN in the design, development and implementation of security methods for ICANN-managed networks. He will oversee the continuous improvement and 'best practices' process for information security and cryptography. more
Security expert Bruce Schneier in a blog post today writes: "It's about who is in charge of cyber security, and how much control the government will exert over civilian networks. And by beating the drums of war, the military is coming out on top. ... General Keith Alexander, the current commander of the U.S. Cyber Command, hypes it every chance he gets. This isn't just rhetoric of a few over-eager government officials and headline writers; the entire national debate on cyberwar is plagued with exaggerations and hyperbole." more
Google has announced that it is working to bring high-speed internet to Cuba, one of the world's least-connected countries. In a blog post published Monday, the company said it is bringing Chromebooks, Cardboard virtual reality kits, and other Google products to the Museo Orgánico Romerillo in Havana, where they will be connected to an internet network operated by the government-owned carrier ETECSA. more
When ISOC, PIR and Ethos announced the sale in November they hoped for a quick transaction. PIR CEO Jon Nevett announced the same week that PIR would be going on a buying spree. This was optimistic. Six months, if at all, is now the more likely outcome. How many times in recent history have companies surprised stakeholders with their best-laid plans, only to discover we no longer live in a world where business has free reign. The glory days of the 2000s died with Lehman Brothers. more
China aims to provide broadband access to all urban and rural areas by 2020, according to the State Council. It is the first time for the country to announce a specific timetable for the development of broadband as "a national strategy," according to the announcement. By 2015, half of the Chinese households are expected to use fixed broadband, 3G mobile coverage rate is expected to reach 32.5 percent, and fiber-to-home services will cover all urban areas. more
The FCC is considering whether it can preempt state-level AI regulations using telecommunications law. Legal precedent and jurisdictional ambiguity, however, make such a maneuver uncertain and likely to face significant industry and judicial resistance. more
Comcast has reached an agreement to acquire Time Warner Cable, according to a tweet from CNBC reporter, Dave Faber. The new company, based on the $44 billion purchase, will be by far the largest cable provider in the U.S. with over 33 million subscribers, and is assumed to face tough review from the Federal Communications Commission. more
The digital realm is bursting with data. The buzz words of today are "big data," and I know you've heard them. There's a reason why. It can boost business in extraordinary ways. But how? Let's first look at what exactly big data is: enormous collections of information developed either internally from the company itself or from a vast array of new media. At times, this data is so large, it cannot be analyzed using standard means of examination. more
The internet started to take on momentum in the 1990s. At that time many analysts, myself included, marveled at the opportunity of creating a platform that would boost grassroot democracy. There was no need for a middleman and there were few barriers to ordinary people becoming involved. This included organizing groups, discussions and events, sharing knowledge, insights and information, publishing opinions -- just some of the potential attached to the internet. more
Size and cost have always been restraining factors to the utilization of computers. The first computers occupied whole rooms. When personal computers arrived, they were still rather bulky. Today, we have slim ultrabooks and compact small form factor PCs. Computers are not only getting smaller in this age, they're also becoming cheaper. And single-board computers like the Raspberry Pi are taking cost and size down a step further. These units bring compact and affordable processing to the masses. more
New security report has revealed at least 48 companies involved in research, development, manufacturing of chemicals and advanced materials have been victims of a coordinated cyberattack traced to a source in China. The purpose of the attacks, code named Nitro, appear to be industrial espionage, collecting intellectual property for competitive advantage, according to Symantec. more