/ Most Viewed

How the Cable Industry is Adapting to Cord Cutters

For people attending The Internet and Television Exchange (INTX), the redubbed Cable Show for 2015, enabling technologies are as important as always, but the transformation of business models in the video delivery industry has certainly cast a huge grip on an industry caught in the middle of a seismic change -- driven by ever-increasing broadband speeds, mobile access to content, and yes, disruptive Over-The-Top (OTT) offerings. more

Russian-Based Kaspersky Lab Planning on Swiss Data Center to Address Russian Exploit Concerns

Leading Moscow-based anti-virus software provider Kaspersky Lab is planning to open a data center in Switzerland to address Western government concerns that Russia exploits its anti-virus software to spy on customers, according to a report from Reuters on Wednesday. more

O3b Satellite Internet – Today and Tomorrow

I have written a lot about the potential of low-Earth orbit (LEO) satellites for Internet service, but have not said much about medium-Earth orbit (MEO) satellites - until now. O3b (other three billion) is an MEO-satellite Internet service provider. Greg Wyler founded the company, and it was subsequently acquired by SES, a major geostationary-orbit (GSO) satellite company. (Wyler moved on to found future LEO Internet service provider OneWeb). more

What’s the Impact of Cloud Computing on the Environment?

Post-Thanksgiving is a time of reflection where we are thankful for technological improvements that allow us to succeed. Every-so-often, technology comes along that not only improves our business but can also help the world. Cloud computing is such a technology. Transitioning to the cloud is a good choice for just about any business, for several reasons. Cloud applications offer scalability, performance, cost-effectiveness and easy mobile access. more

Corporate Email Phishing Scams Result in $3.1B Loss, Near 1300% Increase in 18 Months

Total number of Business Email Compromise (BEC) related crimes have reached epidemic levels, at nearly $3.1 billion in losses and involving 22,143 victims worldwide since January 2015, according to a new FBI report. more

IPv6: Whose Responsibility Is It?

This text was originally meant to be read by the Swedish authorities and municipalities, but the problem is most probably similar all over the world. Along with others, I have repeatedly written and spoken about the need for municipalities and agencies to start with the roll-out of IPv6. Most of what I have written has been focused on IT managers. It might seem natural that it is the IT manager's decision to get the IPv6-project started. But what if perhaps it isn't...? more

Do New gTLDs Disrupt .com?

This post examines whether the new gTLDs program is a disruptive innovation to the dominance of .com. I then use the idea of disruptive innovation to explain the relative adoption failure of previous generic Top-Level Domains (gTLDs), such as .biz, .info and .mobi. Harvard Professor Clayton Christensen's theory of disruption explains battles between market entrants and incumbents. Examples of markets transformed by disruptive innovations include classified ads (Craigslist), long-distance calls (Skype), record stores (iTunes), research libraries (Google), encyclopedias (Wikipedia), and taxis (Uber). more

China Favouring Digits Over Letters When It Comes to Internet Addresses

When it comes to Internet addresses in China, use of digits have been preferred over letters for various reasons including ease of memorization. Christopher Beam from New Republic explains. more

10 Main Internet Governance Developments in 2011

Here is the provisional list of the main Internet governance developments in 2011 and we need your help to compile a final list. Please let us know your views by: Making comments and adding any other development you think should be on this list. Join the webinar discussion on 20 December 2012 at 15.00 (CET). more

Top 10 Spam Stories of 2008

Well, it's a yearly tradition in the western hemisphere that at the end of the year, we compose a top 10 list of the 10 most . Since it is now 2009, I thought that I would create my own list of the top 10 spam stories of 2008. Now, not all of these will be universally applicable to everyone, they are the top 10 stories as seen by me. more

What the ITU WSIS Spam Meeting Accomplished

The first week in July I went to an acronym-heavy World Symposium on the Internet Society Thematic Meeting on spam in Geneva. A few people have reported this as a meeting by "the UN", which it wasn't. Although the International Telecommunications Union is now part of the UN, it dates back to an 1865 treaty to manage international telegraph communication... more

Domain Name Owner Gets Swift Relief Against Impostor Website

In rem actions over domain names are powerful tools. A trademark owner can undertake these actions when it identifies an infringing domain name but cannot locate the owner of that domain name. In a sense, the domain name itself is the defendant. The Anticybersquatting Consumer Protection Act (which is a part of the federal trademark statute dealing with the unauthorized registration of domain names) says that a court can enter ex parte orders requiring a domain name to be turned over when... more

ICANN Sets June Target for New gTLD Program Launch

npt its recent meeting in San Francisco, ICANN approved a new draft timeline for the launch of its new generic top-level domains (gTLDs) program that will let its Board of Directors approve the final Applicant Guidebook in June 2011, enabling companies to apply for gTLDs before the end of the year. more

ARF is Now an IETF Standard

When a user of a large mail system such as AOL, Yahoo, or Hotmail reports a message as junk or spam, one of the things the system does is to look at the source of the message and see if the source is one that has a feedback loop (FBL) agreement with the mail system. If so, it sends a copy of the message back to the source, so they can take appropriate action, for some version of appropriate. For several years, ARF, Abuse Reporting Format, has been the de-facto standard form that large mail systems use to exchange FBL reports about user mail complaints. more

Is ICANN’s .IR Response at Odds with the ACPA and ICE Domain Seizures?

An initial review of ICANN's response to litigation seeking it to turn over control of the ccTLDs of Iran, Syria and North Korea led to the conclusion that it had opened a "legal can of worms". A few more just wriggled out, and they threaten the basic assumption that underlies the U.S. statute governing cybersquatting and the practices engaged in by Federal officials seizing domain names engaged in intellectual property infringement. more