Google Fiber is planning a move from the expensive and slow-moving physical pipes strategy to deployment of wireless network, according to an FCC filing. more
In the first article in this two-part series, we looked at the impact of brand abuse and infringements against intellectual property (IP) on an organization's brand value. In this second article, we delve into how action against enforceable infringements can deliver tangible return on investment (ROI) for a brand, and demonstrate the importance of a robust brand protection program. more
How much visibility do you have over service activation processes? For many service providers, the answer to that question is bleak. The sad truth is that visibility over service activation processes, including errors and misconfigurations, is lacking in many Tier 3, Tier 2, and even Tier 1 organizations. Today's operators often turn to multiple siloed systems when attempting to ensure that services are activated accurately, on time, and are working as promised. more
Georgia Tech Information Security Center (GSTISC) today held its annual Security Summit on Emerging Cyber Security Threats and released the GTISC Emerging Cyber Threats Report for 2009, outlining the top five areas of security concern and risk for consumer and enterprise Internet users for the coming year... According to the report, data will continue to be the primary motive behind future cyber crime-whether targeting traditional fixed computing or mobile applications. "It's all about the data," says security expert George Heron -- whether botnets, malware, blended threats, mobile threats or cyber warfare attacks. more
As the world races towards digital transformation, the technologies we choose will have a lasting impact on our planet. Blockchain, NFTs, and other crypto assets have garnered much attention for their ability to securely and immutably store records. However, the environmental cost of maintaining these technologies is often overlooked. The energy consumption required to sustain blockchains, particularly those using Proof of Work (PoW), is enormous... more
The unveiling of the Global Digital Compact's (GDC) zero draft on April 1, 2024, heralds a critical juncture in the quest to frame a digital future that is equitable, secure, and human-centered. Orchestrated under the leadership of UN Secretary-General António Guterres, the initiative endeavors to forge a consensus-driven framework for global digital cooperation. more
The first announcement came from OneWeb. The company successfully launched 36 new satellites with rockets supplied by NewSpace India Limited. This new rocket company was formed in 2019 and is a public-sector undertaking sponsored by the Indian Government and an arm of the India Space Research Organization. This launch is a reminder that many parts of the world are now interested in the space business. more
Comcast today announced plans to conduct production-network trials of IPv6 technology this year. The trials are aimed at helping identify and solve any areas of difficulty involved in the transition to IPv6, and to determine what approach will be the easiest and most seamless for its customers, says Jason Livingood, Comcast's Internet System Engineer. more
David McAuley from BNA recently interviewed International Telecommunication Union Secretary-General Dr. Hamadoun I. Touré, addressing accusations that the international telecom body is using the upcoming World Conference on International Telecommunications (WCIT-12) talks in Dubai as a forum to wrest key internet governance functions away from the private sector (and the U.S. government). more
According to a report from The Washington Post, the NSA has linked the North Korean government to the creation of the WannaCry ransomeware that resulted in affecting over 300,000 people in almost 150 countries last month. more
The Top-Level Domain (TLD) .versicherung (German word for INSURANCE) managed by dotversicherung-registry GmbH in Hamburg, will be holding an international auction executed by Right of the dot, LLC in Lauderdale USA in collaboration with Heritage Auctions. The auction will take place on 26th of August 2015, 10:00 am Eastern Standard Time (UTC -4:00). more
With the COVID-19 health crisis evolving so quickly, it's hard to predict the extent of the long-term impact on business and the economy. While every business sector is facing different considerations, it's safe to say all are handling challenges from supply chain interruptions, rapid shifts to remote work, and massive changes in consumer spending and communication habits. more
The remarkable take rate in Korea and China is invalidating almost all projections of 5G subscriptions. The 5G promotion has consumers wanting to buy, buy, buy. Huawei Mate 20 5G is selling for only US$30 more than the 4G model. At that price, who would want to buy a 4G phone that could be obsolete in a year or two? In the first two weeks of sale, over a million Chinese bought Huawei's 5G phone. more
As anyone who's been in the DDoS attack trenches knows, large multi-gigabit attacks have become more prevalent over the last few years. For many organizations, it's become economically unfeasible to provision enough bandwidth to combat this threat. How are attackers themselves sourcing so much bandwidth? more
After the nuclear submarine debacle with France, political ties have been restored, and both France and Australia have agreed on further cooperation in the South Pacific, where France has several overseas territories. Also, here telecoms is a key issue. Such cooperation has become more urgent with the increased political interest of China in the region. more