Over the past year, discussions around artificial intelligence (AI) have saturated media and policy environments. Perspectives on it vary widely: from boosterist narratives, which posit the limitless potential of AI-powered technologies to help overcome social inequalities and accelerate industrial development, to apocalyptic framings, which suggest that a (speculative) 'artificial general intelligence' could make humans extinct. more
The Eastern Caribbean island of Grenada has been selected as the venue for the fifth regional meeting of the Caribbean Internet Peering and Interconnection Forum, CarPIF, set for June 12 to 13. The annual international event, which draws Internet giants like Facebook and Google to the region, is focused on developing the Internet in the Caribbean by improving policy and building relationships between network operators and content providers. more
In response to Russia's horrific invasion and war against the Ukrainian nation ordered by Dictator Putin that will live in infamy, an array of nations, organizations, and companies have responded to shun and shut off Russia in every possible manner. The actions include no-fly zones, removal from ICT network services, and essentially universal declarations of condemnation. For the first time ever, all Russian proposals to the International Telecommunication Union (ITU) quadrennial standards body plenary known as the WTSA have been "bracketed"... more
Royal Pingdom has put together a list of top ten places with designated country code Top-Level Domains that are barely inhabited. The list starts off with '.hm' for Heard and McDonald Islands, an Australlian territory, with zero population. Others include '.pn' for Pitcairn Islands (Population: 50), '.tf' for French Southern and Antarctic Lands (Population: 140), '.cc' for Cocos (Keeling) Islands (Population: 596) and '.va' for the Vatican City (Population: 826). more
The information security industry, lacking social inhibitions, generally rolls its eyes at anything remotely hinting to be a "silver bullet" for security. Despite that obvious hint, marketing teams remain undeterred at labeling their companies upcoming widget as the savior to the next security threat (or the last one -- depending on what's in the news today). I've joked in the past that the very concept of a silver bullet is patently wrong... more
"I urge you: Do not give a gift to Russia and other authoritarian nations by blocking this transition," Lawrence Strickling, administrator of the U.S. Commerce Department's National Telecommunications and Information Administration, said on Wednesday at a Senate Judiciary Subcommittee Hearing Held on IANA Transition. more
The Caribbean can create a unique flavour on the Internet by using effectively managed and financially stable Country Code Top-Level Domains. Speaking after ICANN's first Caribbean edition of its Latin American and Caribbean Internet Roadshow (LAC-i Roadshow), recently held in Turks and Caicos Islands, Albert Daniels said the event yielded "very high interest" in the management and operations of the local ccTLD, .tc. Daniels is ICANN's senior manager of stakeholder engagement in the Caribbean. more
The term Email Deliverability is used to describe how well a mail flow can reach its intended recipients. This has become a cornerstone concept when discussing quality metrics in the email industry and as such, it is important to understand how to measure it. Email Deliverability is considered to be affected by a mythical metric, the reputation of the sender, which is a measure of that sender behavior over time -- and the reactions of the recipients to his messages. more
Thirty years ago, on April 30, 1993, a groundbreaking announcement was made by CERN that would irrevocably transform our world. Walter Hoogland and Helmut Weber, who held the positions of Director of Research and Director of Administration at CERN, respectively, released to the public a revolutionary tool initially proposed by Tim Berners-Lee in 1989. more
Adjit Walia, a Global Technology Strategist at Deutsche Bank, suggested in a recent paper that it's in the best interest of U.S. tech companies to tackle the digital divide. He says that those companies rely on a computer-literate public and workforce and that they ought to take a small sliver of their earnings and invest in students today before they fall on the wrong side of the digital divide. more
Large Communication Service Providers (CSPs) that provide transit to their customers need to pay special attention to those network segments to ensure that the IPs associated to them are actually being used. What happens should that customer move on or require more (or less) IP real estate? What do communication and management processes look like to ensure that all the various departments are aligned for rapid and seamless network configuration changes with no downtime? more
ICM Registry (proponents of the .xxx initiative) and Stuart Lawley, Chairman and President of the organization, have filed a 522-page brief in the ongoing Independent Review Process that began last June. "In what may prove to be the biggest sleeper Internet governance issue of the year, ICM Registry has publicly posted its filings for the Independent Review Panel that will decide whether ICANN acted improperly in rejecting its application for a .xxx domain," writes Brenden Kuerbis in a post on the IGP blog. more
At a staggering $100 billion dollar valuation and reported 900 million users, Facebook represents a massive presence in the global economy. From an Internet infrastructure perspective, Facebook also ranks amongst the largest of the "hyper giants" generating a significant share of daily global Internet traffic. This blog explore Facebook's size in terms of its Internet traffic contribution. more
The U.S. became the top attack traffic source in the second quarter of 2010, accounting for 11% of observed attack traffic in total, reports Akamai in its State of the Internet Report released today. According to the report, China and Russia held the second and third place spots, accounting for just over 20% of observed attack traffic. Attack traffic from known mobile networks has been reported to be significantly more concentrated than overall observed attack traffic, with half of the observed mobile attacks coming from just three countries: Italy (25%), Brazil (18%) and Chile (7.5%). more
Before the Holidays, Yahoo got a flurry of good press for the announcement that it would (as the LA Times puts it) "purge user data after 90 days." My eagle-eyed friend Julian Sanchez noticed that the "purge" was less complete than privacy advocates might have hoped. more