/ Most Viewed

How Can We Improve for ICANN 58?

Hyderabad set a new record in terms of attendance with a total of 3,141 participants registered and 1,400 attendees identified as 'locals' from the region. It was also, theoretically at least, one of the longest ICANN meetings with seven days baked into the schedule. Unfortunately, the development of the schedule itself was the source of much community criticism throughout the meeting, resulting in a chunk of time devoted to the topic during the second Public Forum. more

Enough About Apple and Encryption: Let’s Talk System Security

This week, the RightsCon Silicon Valley 2016 conference is taking place in San Francisco. Since the use of encryption in general and the Apple/FBI case in particular are likely to be debated, I want to share a perspective on system security. My phone as a system The Apple/FBI case resolves around a phone. Think of your own phone now. When I look at my own phone I have rather sensitive information on it. more

Taking Permission

Permission is always a hot topic in email marketing. Permission is key! the experts tell us. Get permission to send email! the ISPs tell us. Marketers have responded by setting up processes to "get" permission from recipients before adding them to mailing lists. They point to their privacy polices and signup forms and say "Look! the recipient gave us permission." In many cases, though, the permission isn't given to the sender, permission is taken from the recipient. more

Broadband in Emerging Markets

Today, over half the world's population now has access to a mobile phone, with 5.37 billion mobile subscriptions and over two billion internet users worldwide by the end of 2010. However, these are more than just bald statistics -- today, modern ICTs are genuinely changing people's lives for the better. more

Norwegian Cruise Line Joins the Fleet of Cruise Liners to Adopt Starlink Satellite Broadband Service

Norwegian Cruise Line (NCL) has announced the start of the trial for Starlink, a satellite broadband service, on one of its ships - the Norwegian Breakaway. NCL plans to potentially deploy the service across eight cruise ships this year. This includes the three new additions to its fleet - Vista, Norwegian Viva, and Seven Seas Grandeur. If the trials are successful, NCL will equip these vessels with Starlink terminals. more

How Can Greater Security, Safety and Trust in the Internet Be Created?

In the coming days, the Internet Governance Forum Dynamic Coalition on Internet Standards, Security and Safety will be announced on the IGF website. The following is an invitation to participate, share ideas and best practices, the willingness to take on a new approach towards mass deployment of internet standards and ICT best practices. Feel free to reach out to us and start working towards a kick-off meeting at the global, virtual Internet Governance Forum in November. more

Net Neutrality Is a Smashing Success by FCC’s Preferred Metric, Reports Free Press Researcher

"If investment is the FCC's preferred metric, then there's only one possible conclusion: Net Neutrality and Title II are smashing successes," says Free Press Research Director S. Derek Turner, author of a new report released by the consumer advocacy group. more

Diplomatic Process in Geneva Could Give UN Unprecedented Powers Over the Internet

McDowell, commissioner of the Federal Communications Commission, in an op-ed in the Wall Street Journal writes: "On Feb. 27, a diplomatic process will begin in Geneva that could result in a new treaty giving the United Nations unprecedented powers over the Internet. Dozens of countries, including Russia and China, are pushing hard to reach this goal by year's end. As Russian Prime Minister Vladimir Putin said last June, his goal and that of his allies is to establish "international control over the Internet" through the International Telecommunication Union (ITU), a treaty-based organization under U.N. auspices." more

DNS, Content Providers Including Google and Neustar Propose Extending DNS Protocol

A proposal to extend the DNS protocol has been submitted by Google and other DNS and content providers such as Neustar/UltraDNS. Wilmer van der Gaast and Carlo Contavalli on behalf of the Google Public DNS team said: "Our proposed DNS protocol extension lets recursive DNS resolvers include part of your IP address in the request sent to authoritative nameservers. Only the first three octets, or top 24 bits, are sent providing enough information to the authoritative nameserver to determine your network location, without affecting your privacy." The proposal aims to ultimately help send users to nearby servers in order to improves speed, latency, and network utilization. more

The Growing Rate of Standalone Broadband Adoption

Parks Associates recently announced its Home Services Dashboard release, a for-pay service that tracks consumer adoption of telecom services like Internet, pay-TV, and cellphones. As part of the announcement, the company released a blog that shows that at the end of the first quarter of 2021 that 41% of US homes are buying standalone broadband - meaning broadband that's not bundled with cable TV or a home telephone. more

Top 10 Most Successful Digital City Brands 2019

Dotzon presents the results of their "Digital City Brands 2019" study. In the third edition of "Digital City Brands" after 2017 and 2018, Dotzon analyzed which factors determine the successful use of Digital City Brands. The Digital City Brand is the digital dimension of the City Brand and mirrors the "Digitalness" of a city. European capitals like Berlin, Paris and London were among the first to have their own Digital City Brands. more

New Cyberthreats: Have You Been Exposed at Home?

There are new threats that you may have already been exposed to. Here are some of the new threats and advice on how to protect yourself. During this pandemic, Zoom has emerged as a very popular teleconferencing choice for companies and educational institutions, but a new weakness for Zoom was also discovered. Some online conferences and classes that had not password protected their sessions fell victim to eavesdroppers using the screen sharing feature to "Zoom Bomb" those sessions with graphic images. more

VoIP Security FUD

I'm continually amazed by the amount of FUD being spread with regard to VoIP security threats. People...the sky is not falling. VoIP isn't e-mail. It isn't implemented like e-mail, it won't be implemented like e-mail (maybe "it shouldn't be implemented like e-mail" is a more appropriate statement). Following best security practices will ensure at least a level of security equivalent to current TDM systems. Best FUD I've heard this week: VoIP is insecure because you can simply put a bridge on an ethernet line and capture a stream. Hey, has anyone ever heard of alligator clips? more

The Cuban Home-Connectivity Trial Ends This Week, Rollout to Begin Next Week

The free home-connectivity trial in Old Havana will end this week. Two thousand homes were eligible for the trial and I was told, off the record, that 700 people have signed contracts to pay for the service. I am not certain, but my guess is that those two thousand homes are served by a single central office that has been upgraded to offer Digital Subscriber Line (DSL) connectivity. more

Review Your Email Forwarding Practices

As unusual as it may be for a lawyer to speak at a IETF meeting, Ian Walden gave a lecture on Data Protection Directives and updates thereof. He said they affect some 90 jurisdictions. A difference between email addresses and cookies - the latter are the main subject of the January 2012 update of the directives - is that after more than a decade of enforcement, specific browser extensions may allow users to browse what cookies they have, while no record states whom they conferred their email addresses to. more