/ Most Viewed

Legacy or Not to Be?

Over the years, most communication service providers will build up their information systems bit by bit. Every so often as new services are required, a new process and vendor product is installed. Several years later, there can be many legacy processes and vendor products chosen and designed by many different people. Generally, each implementation team is diligently aware of these legacy processes and vendor products. But in a lot of cases the whole enterprise architecture becomes very convoluted and complicated. more

Reprot Suggests China Hacked High-Level Officials at Federal Deposit Insurance Corporation

The former chairman, chief of staff and general counsel of the agency were all infiltrated. more

Broadband Benefitting US Households by Over $30 Billion Annually, According to Study

According to a recent study, broadband Internet access is now considered by many US households a necessity and they turn to broadband Internet during recession. The study released by Jonathan Orszag, Robert Willig, and Mark Dutz suggests that with $32 billion gains in 2008, consumers increasingly benefit from using broadband at home. "Once people get a taste of the entertainment, educational opportunities, social networking and everyday services that broadband access facilitates, they grasp the immense value it can add to their lives as a powerful tool, regardless of where they come from," said Co-Chairman of the Internet Innovation Alliance Bruce Mehlman. "Once a broadband user, always a broadband user." more

Security Lapses Lead to Squarespace Domain Hijacks

At least a dozen organizations experienced domain hijacks through the domain registrar Squarespace last week. The incidents, occurring between July 9 and July 12, primarily affected cryptocurrency businesses such as Celer Network, Compound Finance, Pendle Finance, and Unstoppable Domains. more

British Banks Not Fully Reporting Cyber Attacks, Fear Punishment, Bad Publicity

"Britain's banks are not reporting the full extent of cyber attacks to regulators for fear of punishment or bad publicity, bank executives and providers of security systems say," reports Lawrence White in Reuters today. more

How to Restore Trust Into Cyberspace? Beer Has the Answer!

Let's face it, when it comes to digital technologies, fundamental human rights are not on top of the digital agenda. They seem irrelevant and remote, even an obstacle to digital innovation and opportunities. We are quick to pay lip service to them, but we permit the profit motive and stakeholder self-interests to override human rights principles. It does not matter how right and righteous the cause might be; to be implemented, it must be profitable or carry stakeholder benefits. more

Re-Booting Internet Governance: Resurgence of Ideas and Proposals

Milton Mueller reporting at IGP: At the recently concluded Seoul Conference on Cyberspace, a memo was circulated calling for the creation of a "Commission on the Future of Internet Cooperation." The commission, the confidential memo said, would consist of "civic leaders, ministers, CEOs and technical pioneers." Its purpose will be to "provide new ideas for transnational and multistakeholder proposals for Internet governance." According to the leaked document, the group is supposed to begin work in October and conclude its work with a presentation at the World Economic Forum in January 2014. more

Is the Broadband Industry Reaching Maturity?

Craig Moffett, of MoffettNathanson, was recently quoted in FierceTelecom asking if the broadband industry is reaching maturity. Other than in rural areas, where many homes are still hungry for better broadband, the broadband penetration rate in cities is approaching 90%. It's a fair question to ask if there is room for much more growth in the industry. This is a question that has bounced around for the last five years. more

Would the “Mensch” in the Room Please Stand Up!

Wolfgang Kleinwaechter, in his Internet Governance Outlook 2024, reminded us that 2024, as the years before and future years, will be pivotal for Internet Governance processes. We eagerly await Wolfgang's missives every January, and we trust what we read because we know him, and we trust CircleID. We should be grateful and cherish this example of straightforward, digitally enabled, and trust-based human communication... more

Will Electronically Steered Antennas Replace Parabolic Antennas in Satellite Ground Stations? (ChatGPT-Assisted Version)

In a previous post, I asked whether electronically steered antennas (ESAs) would replace parabolic antennas in satellite ground stations. I read a few articles suggested by others and by Google search, used some common sense, produced a list of advantages of ESAs, and concluded that it was likely they would eventually replace parabolic antennas for many applications. more

US Senators in Letter to Yahoo Say Late Hack Disclosure “Unacceptable”

"A group of Democratic U.S. senators on Tuesday demanded Yahoo Inc (YHOO.O) to explain why hackers' theft of user information for half a billion accounts two years ago only came to light last week and lambasted its handling of the breach as "unacceptable," reports Dustin Volz from Washington in Reuters. more

Kaspersky Lab to Shut Down U.S. Operations Amid Federal Ban

Russian cybersecurity firm Kaspersky Lab has announced the closure of its U.S. division, resulting in layoffs for its U.S.-based employees. The decision follows a recent U.S. Commerce Department ban on the sale of Kaspersky software, effective from July 20, due to national security concerns. more

Senators Introduce COPIED Act to Combat AI-Driven Deepfakes

In a bipartisan effort to address the growing threat of deepfakes, U.S. Senators Marsha Blackburn (R-Tenn.), Maria Cantwell (D-Wash.), and Martin Heinrich (D-N.M.) have introduced the Content Origin Protection and Integrity from Edited and Deepfaked Media Act (COPIED Act). more

Net Neutrality: What Is Old Is New Again

On July 22, the FCC's open Internet order - which transforms Internet access service from a lightly regulated information service into a heavily regulated telecommunications service - will take effect. This article describes the policies and legal theories underlying the Order and the Order's effect on consumers of Internet services and providers of the service, including a number of entities that had previously escaped FCC regulation. more

Damaged Internet Subsea Cables Repaired in Red Sea Amid Militant Attacks on Ships

Repairs on three crucial subsea telecommunications cables in the Red Sea, damaged since February, have begun despite ongoing militant attacks. The AAE–1 cable, a significant 25,000-kilometer fiber optic link between Asia and Europe, was repaired by E-Marine. more