/ Most Viewed

Trump to Sign Cybersecurity Executive Order on Tuesday

President Donald Trump expected to sign an executive order on cyber security on Tuesday. more

The Next International Policy Battlefield Will Be ICT Policy

I am currently in Hyderabad, attending the Internet Governance Forum, IGF. With hours before the official opening, it might be worth reflecting a bit on Internet Governance and the general discussion on the role of international policy and ICT (information and communication technologies). I have several times before said, and written, that the real difference that governments could make (assuming that Governance is in relation to Governing) in Internet policy is close to their traditional roles.  more

U.S. Justice Department Forms Group to Study National Security Threats of IoT

"The U.S. Justice Department has formed a threat analysis team to study potential national security challenges posed by self-driving cars, medical devices and other Internet-connected tools," reports Dustin Volz from Washington in Reuters" more

.IN ccTLD Poised for Significant Growth After Registry Transition to Neustar

Last week marked a significant milestone for the Neustar Registry team. After many months of preparation, we announced the successful migration of the .IN ccTLD onto Neustar's Registry platform. From now onwards, we'll be partnering with the National Exchange of India (NIXI) as the new Technical Services Provider for India's .IN domain. more

RIR Gainers and Leakers: How Policy Choices Shape the Future of the IPv4 Ecosystem

Diverging policies and fee structures among Regional Internet Registries are reshaping the global IPv4 market. RIPE has emerged as a liquidity hub, while others leak resources, risking long-term instability and financial fragility. more

Is Your Data Being Maximized?

Data generation is all the rage these days. But are you utilizing it to maximize your outcomes? You know that data is indispensable for your business to keep up and outpace the competition. And most leading corporations agree, since statistically, the speed that companies are producing and collecting data is only increasing with 40 zettabytes expected to be created by 2020. The majority of these organizations are then tossing all of this data into data lakes without any real structured methods of extracting some value from it. more

A New Busy Hour – One of the Many Consequences of the COVID-19 Pandemic

One of the many consequences of the coronavirus is that networks are going to see a shift in busy hour traffic. Busy hour traffic is just what it sounds like -- it's the time of the day when a network is busiest, and network engineers design networks to accommodate the expected peak amount of bandwidth usage. Verizon reported on March 18 that in the week since people started moving to work from home that they've seen a 20% overall increase in broadband traffic. more

Google Offers Shortcut to Open Web Technologies Within Internet Explorer

Google today announced an early-stage open source plugin called Google Chrome Frame that aims to seamlessly allow use of open web technologies and faster JavaScript engines within Microsoft's Internet Explorer browser. In a blog post today Google says: "One challenge developers face in using these new technologies is that they are not yet supported by Internet Explorer. Developers can't afford to ignore IE -- most people use some version of IE -- so they end up spending lots of time implementing work-arounds or limiting the functionality of their apps." more

Security Against Election Hacking - Part 1: Software Independence

There's been a lot of discussion of whether the November 2016 U.S. election can be hacked. Should the U.S. Government designate all the states' and counties' election computers as "critical cyber infrastructure" and prioritize the "cyberdefense" of these systems? Will it make any difference to activate those buzzwords with less than 3 months until the election? First, let me explain what can and can't be hacked. Election administrators use computers in (at least) three ways... more

Washington Post: How the U.S. Plans to Avoid a U.N. Vote on the Future of the Internet


Nancy Scola reporting in the Washington Post: "The latest battle over who should run the Internet will be waged in the South Korean port city of Busan over the next three weeks. For U.S. officials headed to the United Nation's International Telecommunication Union's Plenipotentiary Conference, the goal is simple: prevent a vote. In short, the State Department's approach is this: Convince the representatives of the other 192 member countries attending the conference that the 150-year-old U.N. technical body is the wrong forum for existential questions about how the Internet should work." more

China Developing Anti-Starlink Measures, Aims to Launch Nearly 13,000 Satellites

Researchers in China have proposed a plan to establish a large satellite network in near-Earth orbit to provide internet services to users worldwide and to stifle Elon Musk's Starlink project. The project, referred to as the GW constellation, would include 12,992 satellites owned by the newly established China Satellite Network Group Co more

Google.org Awards Grant to Internet Society to Advance Internet Exchange Points in Emerging Markets

The Internet Society today announced that it has been awarded a grant by Google.org to extend its Internet exchange point (IXP) activities in emerging markets. The grant will build on the Internet Society's previous efforts and will establish a methodology to assess IXPs, provide training for people to operate the IXPs, and build a more robust local Internet infrastructure in emerging markets. more

US Senator Al Franken Urges FCC Chairman Pai to Protect Freedom of Speech, Enforce Net Neutrality

In open letter issued today, Senator Al Franken has urged the new Federal Communications Commission (FCC) Chairman Ajit Pai to join the fight to preserve net neutrality. more

Clothing Retailer Eddie Bauer Confirms Point-Of-Sale Malware, All US, Canadian Stores Infected

In a press release yesterday evening, retailer Eddie Bauer confirmed a point-of-sale malware infection suspected by some sources as early as beginning of last month. more

5 Reasons Why You Should Adopt NFV for Your CPEs

Communication service providers around the world are about to embark on an epic journey. A journey which has the potential to be a major game changer for hardware and software vendors alike. The simple concept of decoupling software from hardware, referred to as network functions virtualization (NFV), promises to improve an operator's ability to differentiate themselves from the competition by moving network functions from dedicated appliances to generic commercial off-the-shelf (COTS) servers. more