A newly released Internet of Things ecosystem forecast from International Data Corporation (IDC) attempts to clarify the hardware, software, services, connectivity, and security that make up the evolving Internet of Things (IoT) ecosystem. The worldwide IoT market is forecast to grow from $1.3 trillion in 2013 to $3.04 trillion in 2020 with a compound annual growth rate (CAGR) of 13%. more
Elon Musk has announced plans for a space project to provide faster, cheaper Internet access around the globe. The $15 billion plan would use hundreds of satellites placed 750 miles above the Earth, far lower than existing communications satellites. Doing so would speed up the transfer of data and give better coverage to three billion people who do not have it. more
Amidst all the recent reports of data breaches, Gunter Ollmann of IBM Internet Security Systems, has reported today about one particular case which may be the largest data breach to date. Ollmann wirtes: "The media has been full of analysis concerning data breaches over the last couple of weeks, mostly related to the uptick in 2008 reports. While much of this increase can be accounted for by the wider adoption of state legislation that mandates companies to publicly disclose their data breaches, I think it is worth pointing out today's latest disclosure -- which is quite probably the largest breach ever." more
Every day, new technologies bring us closer to ubiquitous connectivity. If the capabilities of technology is advancing at a fast pace, the same is not always true of regulations; when creating or marketing a new technology, regulation is likely to act as a bottleneck. Understanding regulatory challenges is therefore the foundation that your next move rest on. Although the target may be a global or regional market, it's essential that strategies are designed both well in advance and target each jurisdiction individually. more
Over the last 20 years or so we have regularly revisited the developments in virtual reality (VR). I remember experiencing VR for the first time in the late 1980s, so this technology has been in the making for a very long time. And we are still uncertain about its growth over the next decade. There is no doubt that VR is going through a period of revival. more
The Internet Corporation for Assigned Names and Numbers (ICANN) has unveiled the first cycle of its Grant Program, earmarking up to $10 million for projects aimed at enhancing Internet resilience and global interoperability. more
The Caribbean is under virtual siege as incidents of cyber attacks and cyber crimes surge across the region. "The sophisticated use of technology by highly incentivised criminal organisations has created unprecedented opportunities for transnational crime elements that no one region, country or entity can fight on its own. More inter-regional cooperation and collaboration are needed to develop and implement smart and integrated approaches to fight new and emerging cyber threats." more
While jogging along LacLeman in Geneva I caught up with Dr. Kim Seang-Tae, the President of the National Information Society Agency of South Korea. He is also one of the Commissioners of the ITU/UNESCO Broadband Commission for Digital Development. Dr. Seang-Tae is the chief architect of the FttH miracle that is transforming South Korea. His broadband journey began in 1994, when he developed the country's first broadband plan. more
The AI Strategy course at UC Berkeley has come to an abrupt end, but formal learnings in AI will continue. I want to thank professors at UC Berkeley, Alberto Todeschini, Ph.D., and Stuart Russell, who developed a comprehensive course to implement AI in business. After three certificates, Alberto has encouraged me to pursue a master's in Artificial Intelligence. My wife and I are contemplating this next step. more
Final echoes of the US Senate committee's questions of Facebook this week will only fade in the UN Security Council where, in a few years, Member States will adopt a treaty on regulation of the Internet Economy. By opening wide the door to questions on privacy, revenue, security and purpose, Congress showed its well-placed concern and signaled that others can too. more
Doug Madory writes to report: "Saturday's earthquake in Nepal, which claimed the lives of at least 4,000 victims and injured many more, took a toll on the country's Internet connectivity, which was already one of the least developed in the region. A recent evaluation of Internet infrastructure in South Asia commissioned by the United Nations Economic and Social Commission for Asia and the Pacific (ESCAP) classified Nepal's international connectivity as 'weak' and its fixed and mobile infrastructure as 'limited'." more
I'm asked at least twenty times a year how a small ISP can compete against the big cable companies. The question comes from several sources - a newly-formed ISP that is nervous about competing against a giant company, a rural ISP that is entering a larger market to compete, or investors thinking of funding a new ISP. These folks are rightfully nervous about competing against the big cable companies. more
"Philosophy is a battle against the bewitchment of our intelligence by means of our language." (-Ludwig Wittgenstein) The words we use to describe telecoms networks often contain hidden metaphors and meanings that lead us into wrong thinking. Here are three examples... Why misleading? The word "best" implies both benevolent and optimal intentionality: the network is going to do the "right" thing for its users, and it will maximise the "rightness" in some way. more
The United States and Israel are reported to be responsible for developing the Flame virus aimed at collecting intelligence in preparation for cyber-sabotage aimed at slowing Iran's ability to develop a nuclear weapon, according to Western officials with knowledge of the effort. According the Washington Post, "[t]he massive piece of malware secretly mapped and monitored Iran's computer networks, sending back a steady stream of intelligence to prepare for a cyberwarfare campaign, according to the officials." more
In part 1, I talked about some of the risks associated with BYOD. But there are actions you can take to greatly reduce this risk. One effective method for limiting the risk of BYOD is to employ DNS-based security intelligence techniques. DNS-based security intelligence makes use of an enterprise's caching DNS server to monitor and block DNS queries to known botnet command and control (C&C) domains. more