Comcast has reached an agreement to acquire Time Warner Cable, according to a tweet from CNBC reporter, Dave Faber. The new company, based on the $44 billion purchase, will be by far the largest cable provider in the U.S. with over 33 million subscribers, and is assumed to face tough review from the Federal Communications Commission. more
A number of people have reported on the International Telecommunications Union's (ITU) Plenipotentiary in Guadalajara. Indeed even the Secretary of the ITU Hamadoun Touré felt the need to comment, saying: "The ITU does not have the intention to take over the Internet. We are condemned to live together, so the question is whether we manage that well or not." A very firm statement - but it needs to be. Many still fear that the ITU is waiting for a moment of inattention by business and the Internet community and that it will pounce and attempt to place itself in a position of control. more
I have to wonder if this year is making the big ISPs rethink their business plans. For years, many big ISPs have foregone making long-term investments in broadband and instead chased the quick return. A good example is CenturyLink. Before the merger with Level 3, the company had started a program to replace the copper plant in urban markets with fiber aggressively. At the peak, the company built fiber to pass 700,000 homes a year. more
Calling all registrars! ICANN is set to launch the Registration Data Request Service (RDRS), and the Registrar Stakeholder Group encourages ICANN registrars to participate. For those who haven't been closely following ICANN policy, the RDRS is a step on the path of policy development working to bring our registration data processing requirements into line with data protection laws. more
Security expert Bruce Schneier in a blog post today writes: "It's about who is in charge of cyber security, and how much control the government will exert over civilian networks. And by beating the drums of war, the military is coming out on top. ... General Keith Alexander, the current commander of the U.S. Cyber Command, hypes it every chance he gets. This isn't just rhetoric of a few over-eager government officials and headline writers; the entire national debate on cyberwar is plagued with exaggerations and hyperbole." more
When ISOC, PIR and Ethos announced the sale in November they hoped for a quick transaction. PIR CEO Jon Nevett announced the same week that PIR would be going on a buying spree. This was optimistic. Six months, if at all, is now the more likely outcome. How many times in recent history have companies surprised stakeholders with their best-laid plans, only to discover we no longer live in a world where business has free reign. The glory days of the 2000s died with Lehman Brothers. more
Size and cost have always been restraining factors to the utilization of computers. The first computers occupied whole rooms. When personal computers arrived, they were still rather bulky. Today, we have slim ultrabooks and compact small form factor PCs. Computers are not only getting smaller in this age, they're also becoming cheaper. And single-board computers like the Raspberry Pi are taking cost and size down a step further. These units bring compact and affordable processing to the masses. more
New security report has revealed at least 48 companies involved in research, development, manufacturing of chemicals and advanced materials have been victims of a coordinated cyberattack traced to a source in China. The purpose of the attacks, code named Nitro, appear to be industrial espionage, collecting intellectual property for competitive advantage, according to Symantec. more
The Canadian Security Intelligence Service (CSIS) is reported to have warned companies about an increasing risk of cyber espionage and attacks on pipelines, oil storage and shipment facilities. more
WikiLeaks has accused Ecuador for cutting off Internet access of its founder, Julian Assange. The activist organization first reported the incident via Twitter last night stating that Assange's internet link has been intentionally severed by a state party. more
China aims to provide broadband access to all urban and rural areas by 2020, according to the State Council. It is the first time for the country to announce a specific timetable for the development of broadband as "a national strategy," according to the announcement. By 2015, half of the Chinese households are expected to use fixed broadband, 3G mobile coverage rate is expected to reach 32.5 percent, and fiber-to-home services will cover all urban areas. more
A study comparing best-of-breed computer security vendors suggests more than half of active malware and phishing threats on the Internet go undetected, with an average detection rate of 37% for malware and 42% for phishing. "Given the dynamic nature of today's online threats and the traditionally reactive approach taken by today's malware and phishing detection technology, conventional signature-based solutions are inherently at a disadvantage to keep up," said Panos Anastassiadis, CEO and Chairman of Cyveillance. "Because the majority of damage occurs during the first 24 hours of an attack, early detection of attacks is crucial." more
New research indicates cyberattacks increasingly plague businesses and government organizations, resulting in significant financial impact, despite widespread awareness. Conducted by the Ponemon Institute, the Second Annual Cost of Cyber Crime Study revealed that the median annualized cost of cybercrime incurred by a benchmark sample of organizations was $5.9 million per year, with a range of $1.5 million to $36.5 million each year per organization. This represents an increase of 56 percent from the median cost reported in the inaugural study published in July 2010. more
The digital realm is bursting with data. The buzz words of today are "big data," and I know you've heard them. There's a reason why. It can boost business in extraordinary ways. But how? Let's first look at what exactly big data is: enormous collections of information developed either internally from the company itself or from a vast array of new media. At times, this data is so large, it cannot be analyzed using standard means of examination. more
A total of 3.2 million debit cards across 19 banks may have been compromised as a result of a suspected malware attack. The breach, possibly largest of its kind in India, was confirmed by the National Payment Corporation of India (NPCI) in a statement today. more