/ Most Viewed

The Upcoming 5G Confusion

Until now, the 5G industry has spread a lot of hype, but it hasn't affected customers. That's all starting to change as the cellular carriers are starting to offer 5G phones. Many customers who spend extra for 5G phones are going to quickly be frustrated and disappointed as they try to participate in the new 5G world. Consider both AT&T and T-Mobile. Both companies are introducing both a low-band and a high-band 5G phone, and customers who want 5G will have to choose... more

Trump Relaxes U.S. Regulation to Launch Cyberattacks

President Donald Trump has reversed an Obama-era policy that set limits on how the United States deploys cyberattacks. more

Networks Are Not Cars Nor Cell Phones

The network engineering world has long emphasized the longevity of the hardware we buy; I have sat through many vendor presentations where the salesman says "this feature set makes our product future proof! ... Over at the Networking Nerd, Tom has an article posted supporting this view of networking equipment, entitled Network Longevity: Think Car, not iPhone. It seems, to me, that these concepts of longevity have the entire situation precisely backward. more

Internet Politics: Developed vs Developing

It is not so convincing how the developed world looks at the rest of the hemisphere with the same attitude of equality and control. On one hand there are voices of equality where as in the other there is greed of power and control that lures them with an unending fight of power vs power in safeguarding their own survival. From the participation and development of policies to running the concept of any kind of technology platform, the sense of control and collaboration that catalyzes and leads the overall process. more

VoIP Security FUD

I'm continually amazed by the amount of FUD being spread with regard to VoIP security threats. People...the sky is not falling. VoIP isn't e-mail. It isn't implemented like e-mail, it won't be implemented like e-mail (maybe "it shouldn't be implemented like e-mail" is a more appropriate statement). Following best security practices will ensure at least a level of security equivalent to current TDM systems. Best FUD I've heard this week: VoIP is insecure because you can simply put a bridge on an ethernet line and capture a stream. Hey, has anyone ever heard of alligator clips? more

A Climate of Change for the Caribbean Internet

Spring storms with winter qualities clobbered North America this week, threatening Canada with slow-moving storms, and pounding the United States with near-record snowfall in the midwest, low temperatures in the south and tornadoes further east. You could say change was in the air. And although the unseasonable weather didn't reach as far south as Florida, the climate of change still dominated the atmosphere at the fifteenth regional meeting of the Caribbean Network Operators Group (CaribNOG). more

China Withdraws From International Undersea Cable Project Amid Rising US Strife

China has cut its involvement in the Sea-Me-We 6 project as tensions rise between the US and China over the control of the physical infrastructure that transmits the world’s online traffic, according to a report by FT on Friday. more

Taking Permission

Permission is always a hot topic in email marketing. Permission is key! the experts tell us. Get permission to send email! the ISPs tell us. Marketers have responded by setting up processes to "get" permission from recipients before adding them to mailing lists. They point to their privacy polices and signup forms and say "Look! the recipient gave us permission." In many cases, though, the permission isn't given to the sender, permission is taken from the recipient. more

Fadi’s .ORG Fracasso

The stakeholder community needs to get with the program and assert itself now – if it still can. The recent attempts by the Internet Society (ISOC) to wrap itself in the halo of Jon Postel's "original intent" for .org is specious and laughable. As I've previously published, Postel also didn't like how big the top-level domains were getting and suggested, in 1993, that top-level domains should be capped at 10,000 names and that further zone growth should happen at the second- and third-levels (similar to how the UK has .uk and then .com.uk, for example). more

Verizon and the FCC Clash Over Net Neutrality Laws

Edward Wyatt reporting in the New York Times: "In a momentous battle over whether the Web should remain free and open, members of a federal appeals court expressed doubt over a government requirement that Internet service providers treat all traffic equally. On Monday, the Federal Communications Commission and Verizon, one of the largest Internet service providers, squared off in a two-hour session of oral arguments -- three times as long as was scheduled." more

Will Microsoft Be Able to Make the Jump?

In marketing terminology this is called 'jumping the S-curve'. Microsoft, however, has left its jump rather late. One could argue that we are well and truly at the top of the S at the moment, so it will be interesting to see if Microsoft can still take the leap towards the enormous growth that is currently taking place in the group of digital media companies such as Google and Apple. more

U.S. Pharmaceutical Sector Extending an Outmoded, Dysfunctional Pricing System to Cyberspace

We recently wrote in response to how LegitScript is painting inaccuracies about the Canadian International Pharmacy Association ("CIPA"). With our members' 100% perfect safety record selling life-saving medications to millions of Americans for over 15 years, we are proud to participate in a regulated industry. We are also confident in the affordable solution we provide for consumers struggling with outrageous medication prices in the U.S. more

Dissecting the (Likely) Forthcoming Repeal of the FCC’s Privacy Rulemaking

Last week, the House and Senate both passed a joint resolution that prevent's the new privacy rules from the Federal Communications Commission (FCC) from taking effect; the rules were released by the FCC last November, and would have bound Internet Service Providers (ISPs) in the United States to a set of practices concerning the collection and sharing of data about consumers. The rules were widely heralded by consumer advocates, and several researchers in the computer science community, including myself, played a role in helping to shape aspects of the rules. more

Lufthansa to Offer High-Speed Internet Access on Board Short and Medium-Haul Flights

Lufthansa will start offering broadband on board its short and medium-haul flights beginning early summer 2016, according to an announcement made today. more

U.S. Department of Transportation Issues Federal Cybersecurity Guidance to Automotive Industry

U.S. Department of Transportation issues Federal guidance to the automotive industry for improving motor vehicle cybersecurity. The guidance covers cybersecurity best practices for all motor vehicles, individuals and organizations manufacturing and designing vehicle systems and software. more