/ Most Viewed

If It’s Not Neutral It’s Not Internet

The success of a proposal by AT&T and Verizon to end net neutrality does not threaten the Internet. The broadband customers of AT&T and Verizon will just no longer have access to the Internet. The development appropriately creates alarm among AT&T and Verizon's customers, but the combined customer bases of these companies represent less than 2% of the billion or so users of the Internet. The fact that access to the Internet requires net neutrality does not depend on laws passed by the US Congress or enforced by the FCC. Neutrality arises as a technical and business imperative facilitating the interconnection 250,000 independent networks that choose to participate in the Internet. more

M3AAWG, London Action Plan Release Best Practices to Address Online and Mobile Threats

A cooperative international report was released last week outlining Internet and mobile best practices aimed at curtailing malware, phishing, spyware, bots and other Internet threats. It also provides extensive review of current and emerging threats. "Best Practices to Address Online and Mobile Threats" is a comprehensive assessment of Internet security as it stands today... more

ISOC Issues Statement in Response to Increasing Internet Access Restrictions by Governments

The Internet Society (ISOC) has addressed human rights issues related to Internet access stating "[t]he increasing pressure to limit access to the Internet has escalated the sense of urgency in addressing this situation." ISOC, in the announcement, reaffirmed its policy area and its work to bring attention to the impact of Internet freedom on other aspects of human rights. more

Tough Questions for ATRT

Public comments on the Proposed Recommendations published by the Accountability and Transparency Review Team ("ATRT") have now been submitted, and it is worth stepping back to evaluate ATRT's work in the context of ICANN's larger challenges. ATRT was constituted to carry out ICANN's commitments under the AoC. Yet at times ICANN acted as if ATRT were an adversary rather than a partner... more

Japanese ISP Buys Z.com Domain For Close to $7 Million

One of Japan's leading Internet services providers and domain registrar, GMO Internet, Inc., today announced the acquisition of the single-character domain name, Z.com for JPY ?800 million (close to USD $7 million). According to the company, the acquisition is part of a plan to unify its global strategy under the brand name, Z.com and building GMO's "core values and objectives into the Z.com brand" more

Evolving Network Business Models

AT&T got critics' keyboards activated by announcing plans for a Sponsored Data service, enabling websites to pay for their end-users data consumption. The service has been characterized as a type of toll-free or "1-800? style service for mobile data. Does this contravene network neutrality principles? AT&T says the traffic from the sponsoring sites will be treated the same as other traffic on the network. A US public interest group, Public Knowledge, claims this is precisely what a net neutrality violation looks like. more

Continued Move Towards Unified Communications

A couple of new notes that underscore the continued convergence of real-time communications services (e.g. voice/video/IM) into a presence-based real-time IP communications infrastructure... I haven't seen this shift just yet, but increasingly the folks responsible for managing voice and video systems are integrating their planning with the groups in charge of instant messaging and collaboration. I expect this trend to accelerate as we move forward. more

Why Do We Assume Cable Broadband is Always Good?

One of the oddest aspects of FCC monitoring of broadband is that the agency has accepted the premise that any broadband product faster than 25/3 Mbps is adequate broadband. This means that the FCC has completely accepted that broadband provided by cable companies is adequate and is something the agency doesn't have to be concerned with. The FCC makes the automatic assumption that broadband from cable companies is good broadband... more

Matching Apps to Network Access - A Postage and Packaging Problem

A number of conversations have recently converged on a single problem: how to match applications to network access. Let's unpeel this issue... When I was Chief Analyst at Telco 2.0, we proposed there was a significant untapped market opportunity for network operators to bundle together access with content, applications or services. The revenue opportunity is to charge the providers of those services for delivering fit-for-purpose data at bulk wholesale prices. This is the "postage problem"... more

Celebrating 20 Years of the World Wide Web

Computer scientists, engineers and journalists gathered today on the CERN particle physics lab in the suburbs of Geneva, Switzerland, to pay homage to the a 1989 proposal by Tim Berners-Lee that would later come to be the blueprint for the World Wide Web. In March 1989, Tim Berners-Lee submitted a proposal for an information management system to his boss, Mike Sendall. 'Vague, but exciting', were the words that Sendall wrote on the proposal, allowing Berners-Lee to continue... more

The Explosive Growth of Worldwide Broadband Usage

Sandvine gathers data from the 160 largest fixed and wireless ISPs on the planet to understand Internet usage trends. The statistics discussed below come from the Sandvine January 2022 Global Internet Phenomena Report. Sandvine identifies several current industry trends... more

The New State Department Cyberspace Bureau: from Multilateral Diplomacy to Bilateral Cyber-Bullying

These days in Washington, even the most absurd proposals become the new normal. The announcement yesterday of a new U.S. State Department Cyberspace Bureau is yet another example of setting the nation up as an isolated, belligerent actor on the world stage. In some ways, the reorganization almost seems like a companion to last week's proposal to take over the nation's 5G infrastructure. Most disturbingly, it transforms U.S. diplomacy assets from multilateral cooperation to becoming the world's bilateral cyber-bully nation. more

Innovative Solutions for Farming Emerge at the Apps for Ag Hackathon

Too often, people consider themselves passive consumers of the Internet. The apps and websites we visit are made by people with technical expertise using languages we don't understand. It's hard to know how to plug in, even if you have a great idea to contribute. One solution for this problem is the hackathon. For the uninitiated, a hackathon is a place of hyper-productivity. A group of people converge for a set period of time, generally a weekend to build solutions to specific problems. more

FTC Report on Broadband Resurrects Freedom of Service Information

The Federal Trade Commission intends to monitor the information that telecom and cable companies provide about high-speed Internet service in the service plans they offer to customers, according to a report issued last week by the agency. The FTC asserts in the report, released on June 27, that since it has jurisdiction over matters involving consumer protection, it "will continue to enforce the consumer protection laws in the area of broadband access."... The consumer protection sections of the FTC report raise this question: are broadband providers engaging in a deceptive practice when they advertise a connection speed of, for example, "up to" 768 kilobits per second (kbps) - and yet actual speeds are considerably lower? more

Domain Security: An Underused Cybersecurity Strategy and First Line of Defense in Your Zero Trust Model

Domain security is a critical component to help mitigate cyberattacks in the early stages - your first line of defense in your organization's Zero Trust model. According to the Cybersecurity and Infrastructure Security Agency (CISA), most cyberattacks - including ransomware and business email compromise (BEC) - begin with phishing. Although losses due to ransomware now exceed billions annually, most ransomware protection and response measures don't adequately address phishing risks in the early stages of an attack because they don't include domain security measures to protect against the most common phishing attacks. more