/ Most Viewed

From Crisis to Resilience - the Path to Sustainable Communications Infrastructure in the Caribbean

The Caribbean suffered six major storms in 2017, including the record-breaking Category 5 hurricanes Irma and Maria. In the unprecedented destruction, the islands of Dominica and Barbuda lost all communication and telecommunications service, and eight other Caribbean countries were severely disrupted. Each hurricane season wreaks greater devastation than the last, yet decreased telecommunications competition, inadequate regulation, and high national debt burdens in the region yield ever-diminishing infrastructural investment. more

Essential Cyber Security Steps for Your Business

Layered security is a concept that's important for anyone who wants to create a strong, successful defense strategy to understand. This is a strategy that relies on the use of multiple lines of defense in an attempt to repel any potential attacks. For this reason, it's based on the principle that says "no single form of protection is enough to stop a determined cybercriminal. more

If Thou Be’st as Poor for a Subject as He’s for a King…

Way back in 1995, Wired reporter Simson Garfinkel gave Jeff Slaton the name "Spam King." Less than a year later, Sanford Wallace earned the title -- and soon had to share it (and his upstream provider) with Walt Rines. Others have come and gone; Sanford and Walt reappear every few years, together or separately, only to be sued away again... it seems as if any spammer noticed by law enforcement is immediately crowned "the Spam King," even when there are multiple such crownings happening at the same time. more

FCC Gives Google, Sony and Others Full Authorization for Commercial Deployment of 3.5 GHz Spectrum

The U.S. Federal Communications Commission (FCC) on Monday announced it is allowing full commercial use of 3.5 GHz band for broadband connectivity and 5G. more

The Uses and Abuses of Cryptography

Another day, another data breach, and another round of calls for companies to encrypt their databases. Cryptography is a powerful tool, but in cases like this one it's not going to help. If your OS is secure, you don't need the crypto; if it's not, the crypto won't protect your data. In a case like the Anthem breach, the really sensitive databases are always in use. more

EFF Releases New Tool for Internet Users to Test ISP Interference

In light of today's FCC ruling against Comcast, Electronic Frontier Foundation (EFF) has released a software tool dubbed, "Switzerland," for internet users to check ISP interference of their connections. Fred von Lohmann, EFF Senior Intellectual Property Attorney says: "The sad truth is that the FCC is ill-equipped to detect ISPs interfering with your Internet connection. It's up to concerned Internet users to investigate possible network neutrality violations, and EFF's Switzerland software is designed to help with that effort. Comcast isn't the first, and certainly won't be the last, ISP to meddle surreptitiously with its subscribers' Internet communications for its own benefit." more

Shadow Regulations and You: One More Way the Internet’s Integrity Can Be Won

Even those who care about net neutrality might not have heard of the aptly-called Shadow Regulations. These back-room agreements among companies regulate Internet content for a number of legitimate issues, including curbing hate speech, terrorism, and protecting intellectual property and the safety of children. While in name they may be noble, in actuality there are very serious concerns that Shadow Regulations are implemented without the transparency, accountability, and inclusion of stakeholders necessary to protect free speech on the Internet. more

The ICANN Board by the ICANN Board

A self-appraisal of the ICANN Board has just been posted on the organization's website. In it, Board members rate 89 different measures of their own performance according to a seven-measure rating from "strongly agree" to "strongly disagree". Unfortunately, despite plenty of figures in the documents, there is zero analysis of what this all means, so I have gone through them and prepared one. more

Reflections on the 20th Anniversary of the Dot-Com

Twenty years ago (Monday) on June 8th, 1989, I did the public launch of ClariNet.com, my electronic newspaper business, which would be delivered using USENET protocols (there was no HTTP yet) over the internet. ClariNet was the first company created to use the internet as its platform for business, and as such this event has a claim at being the birth of the "dot-com" concept which so affected the world in the two intervening decades. There are other definitions and other contenders which I discuss... more

Is Teleworking Here to Stay?

Broadband networks are stretched thin today due to the large numbers of adults and students working from home. There are many stories on the web that indicate that a lot of employees are not going to be going back to the office when the pandemic is over. Here are two stories about a trend towards more teleworking from the dozens that a Google search uncovered. more

Video Interviews of IANA Stewardship Transition Coordination Group (ICG) Members

Want to know more about what is going on with the IANA Stewardship Transition Coordination Group (ICG)? ICANN recently published a set of video interviews with members of the ICG. Here, for instance is the interview with Alissa Cooper who represents the IETF on the ICG... While this is certainly not the complete list of ICG members, it is a good sampling of the variety of people involved with the ICG and does provide a range of different viewpoints into what is going on within the ICG process. more

Clouds for Education

Bill St Arnoud blogs that he is a big advocate of using commercial cloud services rather than rolling out a do-it-yourself cloud for a number of reasons... The cloud market is intensively competitive and innovative, where scale can make a huge difference in terms of reliability and accessibility. It is much easier to develop a set of common contractual service and interface requirements with commercial suppliers in regards to privacy, reliability etc. more

Google Cracks Down on Illegal Online Pharmacies

Announced on the Google Blog last week, the search engine giant has filed a federal lawsuit against a group of rogue pharmacies in an effort to stop them from advertising on its search engine and websites. Michael Zwibelman, the company's litigation counsel, notes that the advertisers have deliberately "violated policies and circumvented technological measures" by using Adwords to promote pharmacy and prescription-drug operations without verification from the National Association of Boards of Pharmacy. more

Continued Controversy Over Google Ads on Typosquatted Domains

Regular readers of this site would be familiar with the ongoing legal battles involving the practice of typosquatting; the registration of misspelled domain names of well know brands with the intention of making a profit. Taking advantage of the fact that millions of online users mistype addresses of websites they intend to visit, typosquatters register common misspelled versions of popular sites and make money by displaying ads. Google's AdSense for Domains (AFD) program, often used for displaying such ads, has been particularly targeted by trademark owners which according to McAfee's SiteAdvisor, serves ads on more than 80% of typosquatting sites recently uncovered. more

Reviling Universal Service Subsidies and Then Showcasing the Results

Today, the Supreme Court will consider a challenge to the universal service subsidy program established soon after the introduction of telephone service by the AT&T Bell System and later officially adopted by the FCC as mandated by a 1996 law.1, 2 Universal service funding supports access to telephone and broadband service by subscribers in rural locales that commercial ventures will not serve absent a subsidy. more