/ Most Viewed

ICANN CEO Urges African Telcos to Shatter Monopolies

ICANN CEO, Rod Beckstrom, urges African leaders to "shatter" telecommunications monopolies in their nations in order to help lower the price of Internet access to their citizens during his opening remarks at the start of the 37th ICANN meeting in Nairobi, Kenya. Beckstrom noted that while 15 percent of the world's population lives in Africa, Africans make up less than 7 percent of all Internet users. more

AI in Telecom

NVIDIA recently issued its third annual State of AI in Telecommunications report. The company manufactures many of the cards used in AI data centers, so the company is clearly focused on AI adoption. NVIDIA issues similar reports for other industries. The 2025 report is the result of a survey that NVIDIA administered to 450 telecom professionals across the globe. more

Beyond ‘Neutrality’: How to Reconnect Policy to Reality?

I have some bad news: the published literature on 'net neutrality' fails to grasp the stochastic nature of broadband and its implications. This means that the relationship of traffic management to QoE is universally misunderstood and/or misrepresented. As a result the whole policy process is being placed into opposition with nature! Nature isn't changing to accommodate the policy process. So the policy process has to change. more

Group Announces Certificate Authority to Encrypt the Entire Web, Lunching in 2015

EFF, Mozilla, Cisco, Akamai, Identrust, and researchers at the University of Michigan today announced a new certificate authority (CA) initiative called "Let's Encrypt". more

Virtual Assistants Market on the Rise, Poised to Rule in 2017

In Spike Jonze's 2013 film "Her", the main character Theodore Twombly (played by Joaquin Phoenix) falls in love with a Siri-like virtual assistant. It is an intelligent computer operating system, a variance of AI envisioned by the high technology developers of today. We are still far away from creating AI capable of thinking and learning for themselves, not to mention living in symbiosis with them. However, Intelligent Virtual Assistants can be perceived as a step towards the fulfillment of the idea. more

Keep Your Pants On: Governments Want Suspenders for Secure Routing

The difficulty of applying a hierarchically organized PKI to the decentralized world of Internet routing is being fully exposed in a new Internet-draft. The document represents a rational response to an RPKI that closely ties address resources to a handful of Internet governance institutions, nicely illustrates how governments and national security policy are influencing Internet security, and portends substantial costs for network operators and beyond if adopted widely more

The Internet Tribe & New gTLDs

Much has already been written about the prospects and challenges associated with the introduction of new generic Top-Level Domains (gTLDs). This post were originally written for my personal blog but a good industry friend has persuaded me to post it (and more) on CircleID. During this series I will attempt to show how the introduction of new gTLDs is ultimately a "win win win" scenario. A win for innovation, a win for commerce and most importantly a win for internet users. So where to begin? more

Registration Operations Workshop at ICANN57 Hyderabad

Following a very successful series of workshops held during IETF meetings, the next Registration Operations Workshop (ROW) is now being held during the upcoming ICANN meeting in Hyderabad, India. While the previous workshops were of advanced topics attended by industry experts, the current one will be more of a tutorial and is open to all interested parties. more

Certifying to Merit and Proper Purpose in Alleging and Defending Cybersquatting Claims

Parties to a UDRP proceeding must include a certification similar in U.S. practice to Rule 11 of the Federal Rules of Civil Procedure (and undoubtedly a feature in procedural codes in other judicial jurisdictions) "that the information contained in this [Complaint or Response] is to the best of [Complainant's or Respondent's] knowledge complete and accurate, that this [Complaint or Response] is not being presented for any improper purpose, such as to harass... more

Major New Funding Opportunities for Internet Researchers and R&E Networks

Nationally Appropriate Mitigation Action (NAMA) is a new policy program that was developed at the Bali United Nations Climate Change Conference. As opposed to the much maligned programs like CDM and other initiatives NAMA refers to a set of policies and actions that developed and developing countries undertake as part of a commitment to reduce greenhouse gas emissions. Also unlike CDM, NAMA recipients are not restricted to developing countries. more

Iran Among Countries Affected by a Cyberattack That Left U.S. Flag on Screens

A hacking incident over the weekend attacked networks in a number of countries including data centers in Iran where they left the image of a U.S. flag on screens along with a warning: "Don't mess with our elections." more

International Environmental Leaders Call for Community Protection of Dot Eco Domain

More than 50 major environmental groups have called on ICANN to protect the .ECO domain, representing a ground swell of public interest and support. Their letters are included with Big Room's community-priority .ECO application to ICANN... "This is one of the highest-level global mobilizations of the environmental community in history. Over 190 countries, more than 1,000 entities and over 10 million individual members are represented." more

Security Experts Urge Shifting from Defense to Offense in Cybersecurity

A report, released today by McAfee, Inc., titled "Security Takes the Offensive," says that traditionally, security technology companies and computer users have taken a defensive posture, putting the cyber equivalent of body armor on computers, networks and in the cloud. The report's authors say it is now time to avoid enemy strikes altogether by taking a more aggressive stance, aligning forces and involving law enforcement. more

Internet Society’s Contribution to the WSIS+10 Written Consultation

Today we at the Internet Society submitted our contribution to the United Nations General Assembly's 10-year review of the World Summit on the Information Society (WSIS+10) that will take place in New York in December. The goal of this meeting is to set the agenda for the UN - and through that the agendas of nations around the world -- with regard to the future of the "Information Society". more

United States: 276M Wireless Users, 740B Text messages Recorded for the First Half of 2009

According to CTIA's semi-annual wireless industry report, text messaging continues to be enormously popular in the United States, with more than 740 billion text messages carried on carriers' networks during the first half of 2009 - that is 4.1 billion messages per day. This number is nearly double from last year which was reported at 385 billion text messages. more