/ Most Viewed

Could This Be the Silver Bullet for Cloud Computing

This article on cloud appeared in the Economist.com on April 12th 2001 titled "The Beast of Complexities" Stuart Feldman of IBM, mentions these examples. Quote 'Picture yourself as the product manager of a new hand-held computer whose design team has just sent him the electronic blueprint for the device. You go to your personalized web portal and order the components, book manufacturing capacity and arrange for distribution. With the click of a mouse, you create an instant supply chain that, once the job is done, will dissolve again." unquote. ...In the same article he also lamented that so far, nobody has found a silver bullet to kill the Beast of Complexity. more

Will ICANN’s gTLD Flood the Sub-Domain Registrations?

Obviously, the market will explode if there were a few hundred new gTLDs creating global excitement and building new platforms on ecommerce and cyber-branding. The media hype and breakaway stories will create a boom to the traffic; all types of new and old names will be registered under current and re-registered under new gTLDs wherever possible. more

Application Delivery Controllers as Safety Net for Ad Servers

Ad serving platforms drive a lot of web site revenue. These software platforms grant a site manager control over local or remote ads appearing on his web site. Over the years these platforms grew in functionality and today they offer diverse functions... Performance issues on such a platform can take down the ads on dozens of different sites, causing massive loss of revenues to the site and the platform owners. more

UN Internet Takeover Rumours Mask Bigger Governance Shortcomings

In recent months the Internet has been buzzing about the prospect of a United Nations "takeover" of the Internet, including responsibility for governance of the domain name system. The concern hit a fever pitch late last month when the U.S. Congress held hearings on the issue. A steady stream of technology companies and consumer groups expressed fears with potential U.N. and foreign government involvement and members of Congress pledged to take a strong stand against the takeover. more

Alliance for Safe Online Pharmacies Honors Leading Companies at ICANN

Last week the Alliance for Safe Online Pharmacies (ASOP Global; www.BuySafeRx.pharmacy) presented its inaugural Internet Pharmacy Safety E-Commerce Leadership Award to two organizations during the Generic Names Supporting Organization (GNSO) Joint Meeting of the Registries and Registrars Stakeholder Groups at ICANN58 in Copenhagen, Denmark, it was announced on Tuesday. more

China Proposes Cyberspace IDs to Simplify Online Identity Verification

The Chinese government is considering a new system allowing citizens to use cyberspace IDs instead of providing personal information to internet service providers. more

DCA Receives an Injunction It Requested in Its IRP Proceedings

DotConnectAfrica Trust (DCA) received an Injunction it requested in its IRP Proceedings in an arbitration process against ICANN ('DCA Trust vs. ICANN') governed by the International Dispute Resolution Procedures of the ICDR based in New York and the Supplementary Procedures for ICANN IRP Process. more

Carpet Bombing in Cyber Space - Say Again?

I was pointed to an article in the Armed Forces Journal where Col Charles W. Williamson III argues that the US Air Force needs to develop a BOTnet army as part of the US military capability for retaliatory strikes. The article brings up some interesting issues, the one that I believe carries the most weight is the argument that we (well, people living on the Internet) are seeing an arms race. It is true that more and more nations are looking into or developing various forms of offensive weapons systems for the use on the Internet... more

What Happened to Quantum Networks?

A few years ago, there were a lot of predictions that we'd see broadband networks converting to quantum technology because of the enhanced security. As happens with many new technologies, quantum computing is advancing at a slower pace than the wild predictions that accompanied the launch of the new technology. more

U.S. Government Trying to Persuade Allied Countries to Avoid Telecom Equipment from China’s Huawei

The U.S. government is engaged in persuading wireless and internet providers in allied countries to stop using telecommunications equipment from China's Huawei Technologies. more

A New Cellular Carrier?

One of the most interesting aspects of the proposed merger of Sprint and T-Mobile is that the agreement now includes selling some of Sprint's spectrum to Dish Networks to enable them to become a 5G cellular provider. This arrangement is part of the compromise required by the Department of Justice to preserve industry competition when the major wireless carriers shrink from four to three. more

The Power of Data in Smart City Developments

A few weeks, I attended a one-day conference at the Queensland University of Technology (QUT) at the occasion of the launch of their new $7.5 million Centre for Data Science. This laboratory is also the lead node of a new Australian Data Science Network, bringing together data science organizations from across the country. The new center aims to support data-led decisions across key areas like health, environment, business, government and society -- in short, data for the good. more

Green Revolving Funds Can Help Fund Costs of Cloud Computing and R&E Networking

There have been some interesting new developments in university Green Revolving Funds (GRF) that I believe could be a significant revenue opportunity for cloud suppliers and R&E networks. In this age of severe financial constraints and cutbacks for universities, new revenue models are needed to sustain advanced cyber-infrastructure in support of research and education. more

Q3 Saw Massive Virus Volumes While Spam Remained Steady

Spam and virus trends in Q3'10 confirm that spammers are still hard at work distributing malicious content in new and creative ways, according to the latest reports. The latest spam and virus trends report is produced by Postini, Google's email security and archiving service that, according to the company, processes more than 3 billion email messages per day and more than 50,000 businesses. more

Taking Permission

Permission is always a hot topic in email marketing. Permission is key! the experts tell us. Get permission to send email! the ISPs tell us. Marketers have responded by setting up processes to "get" permission from recipients before adding them to mailing lists. They point to their privacy polices and signup forms and say "Look! the recipient gave us permission." In many cases, though, the permission isn't given to the sender, permission is taken from the recipient. more