A number of conversations have recently converged on a single problem: how to match applications to network access. Let's unpeel this issue... When I was Chief Analyst at Telco 2.0, we proposed there was a significant untapped market opportunity for network operators to bundle together access with content, applications or services. The revenue opportunity is to charge the providers of those services for delivering fit-for-purpose data at bulk wholesale prices. This is the "postage problem"... more
Modern networks can be attacked in a variety of ways, meaning that companies need different types of protection. This article explains some of the risks involved, and provides some easy ways to deal with them. more
Funny as it may seem, today there's big news in the email industry -- 2 large internet bodies, 2 projects... Projects Phoenix and Titan, by AOL and Facebook respectively. What are key things to note about each project? Let's look at each in brief detail... more
In late September Google introduced Google Instant, an auto-complete algorithm that assists users in searching with greater speed. Google's new service predicts search queries in real time, can catch a mistake if the user mistyped and guides users to previously performed searches. This new service greatly benefits top brands on the Internet and those that have purchased key words and ad words; while it might not be as beneficial for companies with low website traffic or those that are not well known. more
Fedora 19 is the community-supported Linux distribution that is often used as a testing ground for features that eventually find their way into the Red Hat Enterprise Linux commercial distribution and its widely used noncommercial twin, CentOS. Both distributions are enormously popular on servers and so it's often instructive for sysadmins to keep an eye on what's happening with Fedora. more
Garth Bruen writes: A report in LegitScript takes a look at Russian rogue Internet pharmacy hacking US government website. "As rogue Internet pharmacy networks become more sophisticated, even US government websites are at risk. Today, we're taking a look at how a rogue Internet pharmacy linked to a criminal network operating out of Russia and Eastern Europe has hacked into a US government website. The Millennium Challenge Corporation, a US foreign aid agency, utilizes a ".gov" top-level domain, which is assigned to the control of the US government. Domain names ending in .gov are typically administered by the General Services Administration." more
The Internet is evolving far beyond screens and smartphones. A proposed seven-stage framework anticipates a future shaped by autonomous agents, sensory wearables, global connectivity, and quantum networks redefining how humans interact with the digital world. more
Global internet usage through mobile devices, has almost doubled to 8.5% in January 2012 from 4.3% last year according to a new report from web analytics StatCounter. While this stat excludes tablets, firm's research arm highlights the increasing use of mobile devices to access the internet with market share doubling year on year since 2009. Nokia leads worldwide, most probably driven by its dominance in India. Apple is second globally but leads the US and UK markets. In the UK RIM is second only to Apple. more
Back in the early 1980s we witnessed the launch of the first e-payments systems by French banks in Biarritz. A similar project was launched in Japan and a year or so later Berlin also launched their pilot service. In Biarritz the whole town received smartcards and all the shops were given devices to handle e-cash. Over the next 30 years very little happened -- nowhere did banks build on this initiative to take a leadership role in e-payments. more
Ad serving platforms drive a lot of web site revenue. These software platforms grant a site manager control over local or remote ads appearing on his web site. Over the years these platforms grew in functionality and today they offer diverse functions... Performance issues on such a platform can take down the ads on dozens of different sites, causing massive loss of revenues to the site and the platform owners. more
For our final blog in this series, looking at the online risks associated with COVID-19, we focus on social media. The popularity of social media channels means that they are extremely susceptible to exploitation by cybercriminals and other infringers, particularly during the coronavirus crisis. In an earlier post in this series, we discussed the use of social media for the distribution of phishing-related content, but CSC has also noted marked activity relating to the creation of fake accounts. more
We recently wrote in response to how LegitScript is painting inaccuracies about the Canadian International Pharmacy Association ("CIPA"). With our members' 100% perfect safety record selling life-saving medications to millions of Americans for over 15 years, we are proud to participate in a regulated industry. We are also confident in the affordable solution we provide for consumers struggling with outrageous medication prices in the U.S. more
In marketing terminology this is called 'jumping the S-curve'. Microsoft, however, has left its jump rather late. One could argue that we are well and truly at the top of the S at the moment, so it will be interesting to see if Microsoft can still take the leap towards the enormous growth that is currently taking place in the group of digital media companies such as Google and Apple. more
In the past seven years, the number of people online has essentially doubled, from 1.7 billion in 2009 to about 3.4 billion today. New and innovative services have also emerged and people and companies around the world are using the Internet in ways barely imagined at the turn of the decade. Looking ahead to the next five to seven years, there are many forces at work that could have a significant impact on the Internet. more
Data breaches are the oil spills of the digital economy. Over 429 million people were affected by reported data breaches in 2015 -- and that number is certain to grow even higher in 2016. These large-scale data breaches along with uncertainties about the use of our data, cybercrime, surveillance and other online threats are eroding trust on the Internet. more