/ Most Viewed

China’s FttX Boom

China's broadband subscriber base continues to rise. Massive FttX deployments are underway, spurred on by competition between the three full-service operators all aiming to increase 'stickiness' for subscribers. While fixed line subscribers are expected to decline into 2011, broadband subscribers are still rising, driven by cheaper rates and the higher bandwidth on offer compared to mobile Internet. more

Good Study by UCSD on Economic Realities of Spam and Profit Motives

I recently had a chance to read a report titled, "Show Me the Money: Characterizing Spam-advertised Revenue" produced as a joint effort from the University of California, San Diego (UCSD), International Computer Science Institute, and UC Berkeley by Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorson, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey M. Voelker and Stefan Savage. I also had a chance to hear Chris Kanich speak about the topic - Show Me The Money! This post contains my notes with some photos taken from that report. more

India’s Draft National E-Commerce Policy: A Bollywood Drama in Four Acts

India's recently published Draft National e-Commerce Policy, prepared by the Indian Commerce Ministry think-tank, can be read like the script of a four-act Bollywood drama... They were the dream couple: Princess India and Prince IT. She was full of cultural richness and diversity, with beauty, mystique and natural resources. She also a dark side. She harbored the world's largest number of impoverished people, with little infrastructure, and facing sparse economic prospects. more

The World of Internet Threats Is Constantly Changing

The world of Internet threats has changed continually over the years. From the time that a "worm" first showed up in the wild, or whenever someone penetrated a system without authorization for the first time, various forms of attacks and malware have presented dangers to the system and those who use it. Different vectors have received varied focus over the years... Many parts of the Internet community have been involved in addressing relevant issues and fostering efforts to combat them. more

China’s 3G License Delay is a Smoke Screen

Last week there was a flurry of stories about China's 3G plans after Jonathan Dharmapalan of Ernest & Young was quoted as saying he expected it to take 12 to 24 months from the start of China's commercial TD-SCDMA trials, i.e. from now, until 3G licenses were issued. But there was little analysis or comment on what's really happening. 3G licenses are a formality. They delay the deployment of 3GSM & CDMA 2000 which could otherwise happen rapidly -- just plug new cards into existing radios and offer established handsets (already being manufactured, in China, for the world market). more

New Record Set in Ultra Fast Data Transmission

Scientists led by a team at Karlsruhe Institute of Technology (KIT) have broken a record for data transmission, sending data at 26Tb/s on a single laser beam over 50km. To put this into context, the researchers suggest that this is the equivalent of transferring the contents of 700 DVDs per second, or the entire collection of the Library of Congress in ten seconds.
 more

Crypto War III: Assurance

For decades, academics and technologists have sparred with the government over access to crypographic technology. In the 1970s, when crypto started to become an academic discipline, the NSA was worried, fearing that they'd lose the ability to read other countries' traffic. And they acted. For example, they exerted pressure to weaken DES... The Second Crypto War, in the 1990s, is better known today, with the battles over the Clipper Chip, export rules, etc. more

Large Hadron Collider, Nessus, and the InterWebz

CERN put the Large Hadron Collider through some rigorous tests, and apparently at first some of the Siemens manufactured SCADA systems failed. While they are apparently better now, and I am happy to see how serious CERN is about security, this does beg the question... WAIT! You mean it's connected to the Internet? I suddenly don't feel so safe. more

Why It Doesn’t Matter That the Virginia Anti-Spam Law was Struck Down

If the headlines are to be believed, spam is now entirely legal in Virginia and anyone can send whatever they want without any fear of reprisal, ever. Looking beyond the headlines, it appears that the Virginia Supreme Court's ruling in AOL's case against formerly convicted spammer Jeremy Jaynes declares that the Virginia anti-spam law violates the Constitutional protection of anonymous speech, and thus is null and void. more

Red Tape Set to Snuff Out Online Identity of Wales

Wales, a small Celtic country that has proudly withstood the depredations of Anglo-Saxons, Normans, and tourists, which has given the world everything from an enduring mythology to the world's longest single-world domain name, has been informed that they will not be allowed to proceed with .CYM (short for the Welsh name for Wales, Cymru) because that three-letter code is already claimed by the Cayman Islands. more

BlackBerry Service to be Suspended in UAE from October 11

Imran Ahmed Shah writes: Telecommunication Regulatory Authority (TRA) announced on Sunday to ban Blackberry Services, this ban will take effect on October 11. This ban will affect hundreds of thousands of BlackBerry users who access Internet, e-mail and messaging services on their mobile handsets. more

Caribbean Businesses Can Make Good Use of Free DNS Security

IBM Security, Packet Clearing House (PCH) and Global Cyber Alliance (GCA) unveiled a free Domain Name System (DNS) service designed to protect all Internet users from a wide range of common cyber threats. Launched on November 16 with simultaneous press events in London, Maputo and New York, the public DNS resolver has strong privacy and security features built-in and can be enabled with a few changes to network settings, as outlined on the organisation's website. more

A Look at Why We Need Fibre-to-the-Farm

One of the discussions I am currently having with my international colleagues is about the global trend towards urbanisation and the resulting shift of political, economic and financial powers from centralised states and federal structures to mega-city or mega-urban region centres. Some of my American colleagues expressed the fear that this would further marginalise rural communication. more

Six Approaches to Creating an Enterprise Cyber Intelligence Program

As few as seven years ago, cyber-threat intelligence was the purview of a small handful of practitioners, limited mostly to only the best-resourced organizations - primarily financial institutions that faced large financial losses due to cyber crime - and defense and intelligence agencies involved in computer network operations. Fast forward to today, and just about every business, large and small, is dependent on the Internet in some way for day-to-day operations, making cyber intelligence a critical component of a successful business plan. more

U.S. Senate Committee on Commerce, Science, and Transportation Holding Full Hearing on New TLDs

On Thursday, December 8, the U.S. Senate Committee on Commerce, Science and Transportation will host a full committee hearing on "ICANN's Expansion of Top-Level Domains." According to the Committee's website, the hearing will "examine the merits and implications of this new program and ICANN's continuing efforts to address concerns raised by the Internet community." more