Podcasts about internet service providers isps

  • 19PODCASTS
  • 22EPISODES
  • 25mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • May 14, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about internet service providers isps

Latest podcast episodes about internet service providers isps

Wavelengths
The Future of Fiber: Strategies and Collaboration

Wavelengths

Play Episode Listen Later May 14, 2025 48:52


As next-generation broadband continues to transform digital experiences across the U.S., Internet Service Providers (ISPs) are reshaping how we think about infrastructure, speed, and scalability. The industry is no longer just about faster speeds—it's about smarter service, tailored rollouts, and future-ready networks that can meet the evolving needs of homes, businesses, and communities. In this episode of “Wavelengths,” the Amphenol Broadband Solutions podcast, host Daniel Litwin, the voice of B2B, sits down with expert guest Pragash Pillai, Chief Technology Officer at Hotwire Communications. Their in-depth conversation explores how Hotwire and similar providers approach deploying 25G and 50G Passive Optical Network (PON) trials. Key Topics from the Episode: Next-gen fiber technologies like 25G and 50G PON are proving scalable using networks already in the ground—cutting deployment costs and time. Whether it's high-traffic student housing or senior living facilities, use-case-specific broadband design ensures seamless, always-on experiences. From predictive maintenance to self-healing networks, AI-powered tools are redefining service reliability and fiber network management. Pillai brings more than two decades of telecom experience, having held leadership roles at Cablevision, Charter, and now Hotwire Communications. His focus on merging operational excellence with visionary thinking makes him a driving force behind Hotwire's innovation-led service model.

Wavelengths
The Future of Fiber: Strategies and Collaboration

Wavelengths

Play Episode Listen Later May 14, 2025 48:52


As next-generation broadband continues to transform digital experiences across the U.S., Internet Service Providers (ISPs) are reshaping how we think about infrastructure, speed, and scalability. The industry is no longer just about faster speeds—it's about smarter service, tailored rollouts, and future-ready networks that can meet the evolving needs of homes, businesses, and communities. In this episode of “Wavelengths,” the Amphenol Broadband Solutions podcast, host Daniel Litwin, the voice of B2B, sits down with expert guest Pragash Pillai, Chief Technology Officer at Hotwire Communications. Their in-depth conversation explores how Hotwire and similar providers approach deploying 25G and 50G Passive Optical Network (PON) trials. Key Topics from the Episode: Next-gen fiber technologies like 25G and 50G PON are proving scalable using networks already in the ground—cutting deployment costs and time. Whether it's high-traffic student housing or senior living facilities, use-case-specific broadband design ensures seamless, always-on experiences. From predictive maintenance to self-healing networks, AI-powered tools are redefining service reliability and fiber network management. Pillai brings more than two decades of telecom experience, having held leadership roles at Cablevision, Charter, and now Hotwire Communications. His focus on merging operational excellence with visionary thinking makes him a driving force behind Hotwire's innovation-led service model.

Storm⚡️Watch by GreyNoise Intelligence
Storm⚡️Watch - BREAKING NEWS - 10/18/23

Storm⚡️Watch by GreyNoise Intelligence

Play Episode Listen Later Oct 18, 2023 20:44


This "Breaking News" edition of the Storm Watch podcast begins with the hosts introducing themselves and their guest, Mark from Censys. The hosts discuss the recent surge in activity around a new Cisco IOS vulnerability and the subsequent system implants. Censys has published a blog post on the topic and discovered that approximately 41,983 hosts had this implant installed, an increase of about 5,000 to 6,000 from the previous day. The hosts discuss the unique nature of this implant, noting that it does not persist through reboots or maintenance. However, attackers can establish a more permanent threshold or entry point post-implant pre-reboot. The hosts also discuss the development of a scan profile for this vulnerability, which was facilitated by information provided by Talos in their blog post. Then they discuss the distribution of the affected hosts, noting that they are spread across many different autonomous system organizations. They speculate that many of the affected systems are likely small businesses or residential users who received their devices from their Internet Service Providers (ISPs). The hosts also note that many different entities are scanning for this vulnerability, some of which are unknown, indicating that many people are opportunistically jumping on this issue. The hosts conclude the podcast by discussing the severity of this vulnerability, noting that it provides top-tier, or "God mode," access to people's networks. They encourage listeners to stay informed and safe, and they express hope that they won't have to report on another breaking news issue before their next scheduled episode. Be sure to check out the GreyNoise blog for more details and updates on this active vulnerability. Episode Slides >> Join our Community Slack >> Learn more about GreyNoise >>  

Humans of Martech
83: Kate Nowrouzi: Mailgun's VP of Deliverability on email subdomain strategies and inbox placement tools

Humans of Martech

Play Episode Listen Later Aug 8, 2023 42:16


What's up everyone, today we're joined by Kate Nowrouzi, VP of Deliverability at Mailgun by Sinch.Summary: Kate brilliantly dissected the complex realm of email marketing, highlighting the critical need for strategic decision-making and a meticulous, step-by-step approach to restore domain reputation. Drawing upon her unique shift from fighting spam to aiding marketers, she illuminated the nuanced layers of email deliverability. Reinforcing the superiority of genuine engagement over manufactured interactions, Kate underlined the importance of understanding audience needs, continuously refining strategies, and valuing quality over quantity. She also acknowledged the transformative potential of new technologies like BIMI, AMP, and machine learning, suggesting a forward-thinking approach for marketers willing to navigate the growing tech-driven competition.About Kate Kate started her career in network and anti-spam engineering roles at two major ISPs; Verizon and AOL She then moved to the vendor side at Fishbowl, a Customer engagement platform for restaurant marketers where she led email deliverability operations  Kate's profound experience in email deliverability then guided her to a pivotal role as the SVP of Deliverability and Email Compliance at SparkPost, one of the industry's most popular email delivery platforms Kate's also been Co-Chair of the Complaint Feedback Loop Committee at theMessaging Anti Abuse Working Group She's an Advisor and Investor for various startups She's also an Advisory Board member of Persian Women in Tech, with a mission toclose the diversity and gender gap in STEM Today, Kate serves as the VP of Deliverability & Product Strategy at Sinch, a public Customer Communications company that acquired Mailgun 2 years ago Harnessing the Power of Insider Knowledge in Email MarketingIn a moment of reflection on her professional journey, Kate highlighted the value she gained from her tenure at AOL. She spent four vital years in the realm of anti-spam operations, an experience that she later brought to her roles at email service providers like SparkPost and Mailgun.Kate began her career in the early 2000s as an anti-spam engineer at AOL, at a time when email marketing was gaining momentum. AOL led the way by offering the first robust spam report option to their members, a trend quickly picked up by other industry titans like Microsoft and Yahoo. However, her transition from ISP to the marketing side or Email Service Providers (ESPs), required a significant shift in mindset.Working on the ISP side, Kate's primary focus had been on shielding members from malicious actors intent on infiltrating their inboxes. Yet, as she transitioned to the ESP environment, her role morphed. Now, she was aiding brands and marketers in ensuring their emails didn't raise spam red flags.This drastic change in problem sets and operational goals required some adaptation. Kate noted the initial challenges of transitioning from one end of the business to another. However, she affirmed that her experience on the ISP side provided invaluable insights that helped guide brands away from appearing spammy in their email marketing efforts.Takeaway: The shift from battling spammers to helping marketers get their emails into inboxes was a challenging, but enlightening journey for Kate. Her early career experience as an anti-spam engineer provided her with an insider's understanding of what brands should avoid to not come across as spammy, proving to be an indispensable asset in her later roles at ESPs.Shifting Perspectives From Spam Prevention to Marketing DeliveryKate recalls an intriguing philosophical debate that arose during her tenure during her transition from an anti-spam role to an ESP environment. Having battled to block spam on one side and then striving to get marketing content into inboxes on the other, she found herself in a unique conundrum.A memorable instance arose when Kate moved from AOL to Fishbowl, an email marketing platform for restaurants. One night, she was roused from sleep by an urgent issue: a major client's birthday campaign was being blocked by AOL or Yahoo. The client was Red Robin, and the blocking of their campaign was considered a serious matter. Kate, however, found this jarring. Was it worth losing sleep over a blocked birthday campaign, when her previous role had conditioned her to respond to potentially harmful breaches of privacy?But as her colleagues stressed, the situation was indeed significant. Red Robin was a top-tier client and the success of their birthday campaign mattered. This incident served as a defining moment for Kate, reinforcing the fact that she was indeed on the other side of the business now, with a new set of priorities to consider.Takeaway: Kate's anecdote about the Red Robin incident underlines the drastic shift in perspectives that can occur within the same industry. A blocked marketing campaign might not seem critical to someone from an anti-spam background, but in the world of ESPs and email marketing, it becomes a major concern. It's a poignant reminder of the nuanced complexities inherent in the world of email communication.The Battle of Formats: HTML vs Text in EmailsWhen asked about the age-old debate between HTML and text in emails, Kate laid out her perspective, which leans towards simplicity. While marketers might be attracted to the visual appeal and richness of HTML emails, Kate warns against overwhelming the end user with too much information and too many distractions. In line with studies indicating that simpler emails often perform better, she suggests focusing on the most critical points and avoiding excessive complexity.Kate also highlights the importance of adaptability based on the nature of the campaign and the audience. For instance, an interactive email might be perfect for a webinar invite, as it can eliminate unnecessary steps for the user, such as clicking on links and visiting external websites for registration. However, interactive emails might not be the best fit for all marketing campaigns.As every inbox and device displays emails differently, it's essential to keep up with technology and perform rigorous testing before launching any campaign, major or minor. With various rendering tools available, like Email on Acid, marketers can preview how an email looks across over a hundred devices. A/B testing is highly recommended to fine-tune the decision between text, HTML, or interactive formats.Takeaway: Email format is not a one-size-fits-all decision. It's about understanding your audience, the purpose of your campaign, and the compatibility with various devices. Keeping your emails simple, clear, and focused is often the best route, but never shy away from testing and refining your approach based on your specific needs and results.The Emergence of BIMI and AMP: A New Era for Email Marketing?When asked about the rise of new email technologies like BIMI (Brand Indicators for Message Identification) and AMP (Accelerated Mobile Pages), Kate expressed an optimistic outlook. These frameworks aim to improve brand visibility, confirm authenticity, and enhance interactive features in emails, all of which can potentially boost engagement and conversion rates for businesses. However, the implementation of these technologies is not without challenges.There are roadblocks, especially with BIMI, that teams and working groups are actively trying to overcome. For instance, registering a trademark logo, a requirement for BIMI, can be a significant challenge for brands. Additionally, the responsibility doesn't only rest on brands; Internet Service Providers (ISPs) also need to simplify their processes to facilitate wider adoption of these technologies.Google's role in this transition is also crucial. As Kate noted, a large portion of marketing traffic today is either Gmail or Google-hosted domains. While Google introduced both BIMI and AMP, their promotion of these technologies has been relatively quiet recently.Despite the difficulties, there's a reason for excitement. Kate firmly believes that these technologies hold immense potential to transform email marketing and hopes that in a year or two, the implementation will be far less challenging.Takeaway: New technologies like BIMI and AMP may require significant effort to implement and have limited client support, but they represent a potentially transformative shift in email marketing. With the ongoing efforts to overcome current roadblocks, it's a space worth watching for marketers looking for more effective ways to engage their audience and boost conversions.Embracing AI and Self-Optimized Email CampaignsWhen asked about the potential role of machine learning and natural language processing in email marketing, Kate strongly urged marketers to pay attention to these emerging technologies. The idea of AI taking the wheel for orchestrating the most effective message, sent at the most optimal time to the most fitting user, is not a far-fetched concept anymore.According to Kate, marketers who shy away from experimenting with these technologies may find themselves at a disadvantage. Whether it's using AI for A/B testing, choosing the best subject line for each campaign, or crafting personalized marketing content, it's essential for marketers to embrace these developments rather than reject them. After all, the impact of these technologies may vary across businesses, but the potential for improvement is vast.For instance, Kate cited the practice of tracking consumer behavior for insights to customize future marketing content. Brands like Nordstrom have been successful in precisely targeting customers with the right content at the right time, significantly boosting their customer engagement.Kate also discussed the role of AI in 'send time optimization', a practice that has been part of the industry for a few years. It involves analyzing a user's engagement behavior to determine the best time for sending emails, which has proven to significantly improve engagement rates.Takeaway: Emerging technologies like machine learning and natural language processing are reshaping the email marketing landscape. Marketers who are open to experimenting with these technologies and integrating them into their strategies can potentially enhance personalization, optimize email sending times, and ultimately drive better engagement. Ignoring this shift could risk falling behind in an industry that is becoming increasingly competitive and technology-driven.A Strategic Approach to Recovering Domain ReputationWhen asked about domain reputation recovery in email marketing, Kate emphasized the importance of not hastily setting up a new domain or switching traffic to new IPs. According to her, this sort of action is exactly what a spammer would do. Instead, the key lies in strategic traffic segmentation and taking a thoughtful approach to managing a brand's online reputation.Addressing a situation where a single domain is used for all communications, from receipts and transactional messages to marketing content, Kate pointed out the risks associated with such a practice. If the domain gets blocked due to poor marketing practices, it can impact all types of communications, including critical transactional emails.Kate recommended the segmentation of traffic on different subdomains to minimize risk. This includes sorting subscribers into categories like most engaged, less engaged, and non-engaged, and assigning them to different subdomains. While the organizational domain does carry a reputation, the reputation of the subdomain is prioritized by major Internet Service Providers (ISPs).Further, Kate stressed that it's not just the domain reputation that matters but the combination of domain and IP. Even if an organization has a strong reputation, a poorly performing subdomain can damage this reputation. Moving to new IPs requires warming them up, which is not an easy task, hence why Kate recommends against it.Takeaway: The restoration of domain reputation is not an overnight job; it's a strategic process that involves traffic segmentation, consistent engagement, and adherence to best practices. Instead of jumping to new IPs or domains, a meticulous approach to repairing reputation can yield better results and maintain the integrity of your brand's communications.Navigating Domain and Subdomain Strategies for Email DeliverabilityWhen queried about domain and subdomain strategies for maintaining email deliverability, Kate offered insights based on her extensive experience. Her comments focused on debunking misconceptions and providing nuanced recommendations for complex scenarios, such as when stakeholders push for a quick fix to domain reputation issues.Kate shared that spammers typically don't invest time in developing strategies. When they experience domain issues, they are more likely to shift to new domains altogether, often switching to a cousin domain or changing IPs. However, Kate warned against this approach for reputable marketers, especially under pressure to deliver quick results.Should a marketing or sales team be pushing for rapid improvements, Kate suggested creating a new subdomain rather than a cousin domain or entirely new domain. The key here is a slow and steady approach, rather than sending a mass email on day one, which would essentially recreate the initial problem.She emphasized the importance of the first week of activity on Google, recommending to start with a small number of emails and gradually increase. Regular monitoring and adjustments based on where emails land, in the inbox or the spam folder, are critical.Kate also mentioned that while Google may not directly respond to communication efforts, it does monitor and act on the issues raised. They care about the quality of the traffic, as over 70% of marketing traffic runs through Google. Therefore, even if marketers don't receive direct responses, it's worth maintaining communication with Google.In response to the question about the limit on subdomains under a brand, Kate clarified that there's no specific limit. She added that the reputation of a subdomain is separate from the root domain. While smaller ISPs may not separate the two as distinctly, Google sees them as separate entities, which means the reputation of one will never impact the other.Takeaway: In the complex world of email deliverability, the key lies in strategic decision-making. Rather than succumbing to pressure for immediate fixes, marketers should focus on a gradual, controlled approach. Careful segmentation, consistent monitoring, and open communication with ISPs can help improve email deliverability and domain reputation without risking long-term damage.Unpacking Inbox Placement Tools and Seed List TestingOne of the topics we covered extensively was the significance and effectiveness of email warm-up vendors and inbox placement platforms. The query focused particularly on the platforms that utilize a network of verified inboxes to simulate engagement, creating an environment that mimics genuine human interaction to improve deliverability.Kate's response to this was quite revealing. She acknowledged the existence of such tools, colloquially known as "Intelli-seeds", but warned against their use for long-term results. According to her, Google's systems are extremely adept at distinguishing between genuine and simulated interactions. Once they perceive an attempt to game the system, it could potentially tarnish your domain reputation in the long run.As for the perceived benefits of these tools, Kate offered a level-headed evaluation. She shared an experience of a short-lived improvement in engagement after the use of these platforms. However, she emphasized the importance of not relying solely on these tools and questioned their alignment with privacy laws. Google, she pointed out, is not a big fan of such practices and hasn't vouched for their efficacy.Kate touched on seed testing, acknowledging its usefulness as one of the many ways to troubleshoot email deliverability issues. However, she stressed that it's not the end-all-be-all. A good or bad result in seed testing doesn't guarantee the same outcome in real-world situations, since actual engagement is often quite different.Despite the buzz around Inbox Placement Tools, Kate's perspective remained cautious, not entirely supportive of their use. She expressed a preference for focusing on the end user's actual preferences and feedback, the real determinants of long-term email campaign success.Takeaway: In the realm of email marketing, using automated tools that simulate human engagement can bring short-term gains but may potentially harm your domain reputation in the long run. In the end, genuine user engagement remains the most reliable indicator of a successful email strategy. Real feedback over simulated responses – that's the game.Walking the Thin Line of Cold Email Outreach in MarketingWhen asked about the prevalent yet contentious practice of cold email outreach in marketing, the conversation took an interesting turn. The question highlighted the sometimes unavoidable reality of outbound emails and prospecting in many marketing and revenue operations roles. This is despite the fact that the ideal scenario for any email marketer is to send valuable content to an audience that has willingly opted in to receive such content.Kate offered a rather candid response. She recounted her experience with cold outreach, mentioning that it didn't yield as much success as they had hoped for. The inundation of emails from vendors that one typically finds in their inbox is evidence of this widely used tactic. This increased significantly during the COVID-19 pandemic, as businesses sought to maximize email use given the rise in remote work and the lucrative return on investment that emails offer.Despite using platforms that sent emails on her behalf, Kate explained how Google's sophisticated systems could detect and flag these messages as inauthentic. This could result in the emails landing in the spam folder, diluting their effectiveness. Kate emphasized the risk of overwhelming end-users with unsolicited emails, stating that marketers already struggle with engaging those who willingly shared their contact details.She expressed a clear aversion to cold outreach strategies. Internally, she's been very vocal about this stance with her marketing team. For Kate, the priority remains on providing value to an engaged audience rather than intruding on unwelcoming inboxes with cold emails or calls.Takeaway: Cold email outreach may sometimes seem like a necessary evil in marketing, but it's crucial to consider the potential pitfalls. These include not only the risk of emails being flagged as spam, but also the possibility of alienating your audience. Quality engagement with an opted-in audience takes precedence over quantity through unsolicited messages.Unraveling the True Value of Email Deliverability and EngagementWhen asked about the unconventional notion of email performance and deliverability, the conversation touched on a fascinating perspective about email marketing's impact. The question, inspired by Penny Aquele's unique idea, "Where do emails go when the lake freezes?" challenges the conventional metrics used to measure email marketing success - click-through and purchase rates.In response, Kate offered a nuanced view. She shared her own habits as an email recipient, highlighting the power of a compelling subject line. Just like a catchy billboard on a highway, a strong subject line can drive her to a vendor's website without her having to open the email. Kate emphasized the importance of considering the entire customer journey and maintaining transparency in the sender's intent. She mentioned that while a well-crafted subject line might be more important than the email content itself, a successful campaign shouldn't be solely defined by clicks and opens.Kate likened deliverability and inboxing rate in email marketing to impressions in paid social advertising. Even without a click or an open, an email landing in a recipient's inbox raises brand awareness - a facet often overlooked in email marketing.Moreover, she hinted at the potential for other forms of engagement, such as website activity, that can complement email engagement data. She mentioned a tool used by Sinch to consider the engagement factor when sending emails, stressing the importance of not hastily discarding non-click or non-open interactions.Takeaway: A broader perspective on email performance can shed light on the value of various engagement forms and deliverability. The idea that an email's worth extends beyond clicks and opens prompts marketers to consider holding incremental tests to truly grasp their emails' value. It's about the awareness an email generates, not just the direct response it triggers.Finding Balance and Happiness Amid Career and Personal ObligationsWhen asked about maintaining happiness and balance amidst a multitude of professional commitments and personal interests, Kate shared personal anecdotes that illuminated her approach.In the early stages of her career, Kate acknowledged that her work often took precedence over family time, with business trips and late work hours becoming the norm. However, as her children grew up and her career progressed, her priorities underwent a significant shift.These days, Kate prioritizes spending quality time with her family, now home from college for the summer. She's adjusted her work schedule to wrap up by late afternoon, a notable change from her past routine that stretched into the evening.Kate's approach to balance and happiness also involves a conscious effort to distance herself from situations or commitments that no longer contribute positively to her life. Reflecting on past experiences, she admits staying in an unsatisfying career for longer than necessary and encourages others not to delay leaving environments that don't contribute to their happiness.As a final note, Kate shares her new-found focus on heart-led decisions. By listening to her heart more, she has found an increased sense of happiness and satisfaction in her work and personal life.Takeaway: Balance and happiness, as seen through Kate's journey, are deeply intertwined with personal priorities, professional boundaries, and the courage to walk away from unfulfilling situations. Taking heart-led decisions and prioritizing family and personal happiness contribute significantly to finding a satisfying equilibrium in life's varied demands.Episode RecapThis episode with Kate offered a wealth of practical insights into the multi-faceted realm of email marketing. Diving into the intricacies of deliverability, domain reputation, new technologies, and more, Kate drew upon her unique experience—shifting from fighting spam to helping marketers reach inboxes—to guide listeners through the email marketing landscape.A key theme that emerged from the conversation was the importance of strategic decision-making in email deliverability. Kate emphasized that restoring domain reputation is a meticulous, not overnight, process. The solution doesn't lie in hasty measures like jumping to new IPs or domains. Instead, a careful, controlled approach—featuring traffic segmentation, consistent engagement, and best practices adherence—can prove more effective. Kate's perspective highlights the nuanced complexities and considerations that often go unnoticed outside the world of ESPs and email marketing.Kate touches on the role of inbox placement tools and their impact on deliverability. These platforms are becoming increasingly sophisticated, simulating human engagement and may offer immediate advantages, but it risks long-term harm to your domain reputation as these inbox platforms could identify and penalize such inauthentic behaviors. Genuine user engagement, therefore, is still the most dependable marker of an effective email strategy. The real game is about earning authentic feedback, not manufacturing simulated responses. An additional takeaway centered on understanding your audience and tailoring email formats accordingly. There's no one-size-fits-all approach; it's about simplicity, clarity, focus, and continuous testing and refining. Quality engagement with an opted-in audience surpasses quantity through unsolicited messages, reinforcing that real feedback trumps simulated responses for gauging a successful email strategy.Kate's insights didn't stop at current strategies. She spoke to the potential of new technologies like BIMI and AMP, machine learning, and natural language processing. Despite implementation challenges, these innovations promise transformative shifts in email marketing, enhancing personalization, optimizing email sending times, and driving better engagement. Marketers willing to embrace these technologies may gain an edge in an industry growing increasingly competitive and tech-driven.Listen below for a comprehensive, nuanced, and accessible journey through the world of email deliverability.

The History of Computing
Section 230 and the Concept of Internet Exceptionalism

The History of Computing

Play Episode Listen Later Jun 5, 2023 19:09


We covered computer and internet copyright law in a previous episode. That type of law began with interpretations that tried to take the technology out of cases so they could be interpreted as though what was being protected was a printed work, or at least it did for a time. But when it came to the internet, laws, case law, and their knock-on effects, the body of jurisprudence work began to diverge.  Safe Harbor mostly refers to the Online Copyright Infringement Liability Limitation Act, or OCILLA for short, was a law passed in the late 1980s that  shields online portals and internet service providers from copyright infringement. Copyright infringement is one form of immunity, but more was needed. Section 230 was another law that protects those same organizations from being sued for 3rd party content uploaded on their sites. That's the law Trump wanted overturned during his final year in office but given that the EU has Directive 2000/31/EC, Australia has the Defamation Act of 2005, Italy has the Electronic Commerce Directive 2000, and lots of other countries like England and Germany have had courts find similarly, it is now part of being an Internet company. Although the future of “big tech” cases (and the damage many claim is being done to democracy) may find it refined or limited. That's because the concept of Internet Exceptionalism itself is being reconsidered now that the internet is here to stay. Internet Exceptionalism is a term that notes that laws that diverge from precedents for other forms of media distribution. For example, a newspaper can be sued for liable or defamation, but a website is mostly shielded from such suits because the internet is different. Pages are available instantly, changes be made instantly, and the reach is far greater than ever before. The internet has arguably become the greatest tool to spread democracy and yet potentially one of its biggest threats. Which some might have argued about newspapers, magazines, and other forms of print media in centuries past. The very idea of Internet Exceptionalism has eclipsed the original intent. Chris Cox and Ron Widen initially intended to help fledgling Internet Service Providers (ISPs) jumpstart content on the internet. The internet had been privatized in 1995 and companies like CompuServe, AOL, and Prodigy were already under fire for the content on their closed networks. Cubby v CompuServe in 1991 had found that online providers weren't considered publishers of content and couldn't be held liable for free speech practiced on their platforms in part because they did not exercise editorial control of that content. Stratton Oakmont v Prodigy found that Prodigy did have editorial control (and in fact advertised themselves as having a better service because of it) and so could be found liable like a newspaper would. Cox and Widen were one of the few conservative and liberal pairs of lawmakers who could get along in the decisive era when Newt Gingrich came to power and tried to block everything Bill Clinton tried to do.  Yet there were aspects of the United States that were changing outside of politics. Congress spent years negotiating a telecommunications overhaul bill that came to be known as The Telecommunications Act of 1996. New technology led to new options. Some saw content they found to be indecent and so the Communications Decency Act (or Title V of the Telecommunications Act) was passed in 1996, but in Reno v ACLU found to be a violation of the first amendment, and struck down by the Supreme Court in 1997. Section 230 of that act was specifically about the preservation of free speech and so severed from the act and stood alone. It would be adjudicated time and time and eventually became an impenetrable shield that protects online providers from the need to scan every message posted to a service to see if it would get them sued. Keep in mind that society itself was changing quickly in the early 1990s. Tipper Gore wanted to slap a label on music to warn parents that it had explicit lyrics. The “Satanic Panic” as it's called by history reused tropes such as cannibalism and child murder to give the moral majority an excuse to try to restrict that which they did not understand. Conservative and progressive politics have always been a 2 steps forward and 1 step back truce. Heavy metal would seem like nothin' once parents heard the lyrics of gagster rap.  But Section 230 continued on. It stated that “No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider.” It only took 27 words to change the world. They said that the people that host the content can't be sued for the content because, as courts interpreted it, it's free speech. Think of a public forum like a hall on a college campus that might restrict one group from speaking and so suppress speech or censer a group. Now, Section 230 didn't say it wasn't allowed to screen material but instead shielded providers from being held liable for that material. The authors of the bill felt that if providers would be held liable for any editing that they wouldn't do any. Now providers could edit some without reviewing every post. And keep in mind the volume of posts in message boards and of new websites had already become too much in the late 1990s to be manually monitored. Further, as those companies became bigger business they became more attractive to law suits.  Section 230 had some specific exclusions. Any criminal law could still be applied, as could state, sex trafficking, and privacy laws. Intellectual property laws also remained untouched, thus OCILLA. To be clear, reading the law, the authors sought to promote the growth of the internet - and it worked. Yelp gets sued over revues but cases are dismissed. Twitter can get sued over a Tweet when someone doesn't like what is said, but it's the poster and not Twitter who is liable. Parody sites, whistleblower sites, watchdog sites, revue sites, blogs, and an entire industry was born, which each player of what would later be known as the Web 2.0 market could self-regulate themselves.  Those businesses grew far beyond the message boards of the 1990s. This was also a time when machine learning became more useful. A site like Facebook could show a feed of posts not in reverse chronological order, but instead by “relevance.” Google could sell ads and show them based on the relevance of a search term. Google could buy YouTube and they could have ads on videos. Case after case poked at the edges of what could be used to hold a site liable. The fact that the courts saw a post on Reddit as free speech, no matter how deplorable the comments, provided a broad immunity to liability that was, well, exceptional in a way.  Some countries could fine or imprison people if they posted something negative about the royal family or party in charge. Some of those countries saw the freedom of speech so important as a weapon that could be used against the US in a way. The US became a safe haven in a way to free speech and many parts of the internet were anonymous. In this way (as was previously done with films and other sources of entertainment and news) the US began to export the culture of free speech. But every country also takes imports. Some of those were real, true ideas homegrown or brought in from abroad. Early posters of message boards maybe thought the Armenian Genocide was a hoax - or the Holocaust. A single post could ruin a career. Craigslist allowed for sex trafficking and while they eventually removed that, sites like Backpage have received immunity. So even some of the exceptions are, um, not. Further, extremist groups use pages to spread propaganda and even recruit soldiers to spread terror.  The courts found that sites were immune to suits over fake profiles on dating sites - even if it was a famous person and the person was getting threatening calls. The courts initially found sites needed to take down content if they were informed it was libelous - but have received broad immunity even when they don't due to the sheer amount of content. Batzel v Smith saw a lawyers firm ruined over false reports she was the granddaughter of Nazi Heinrich Himmler and the beneficiary of Nazi art theft, even though she wasn't - she too lost her case. Sites provide neutral tools and so are shielded from defamation - even if they're neutralish you rarely see them held to account. In Goddard v. Google, the Google Keyword Tool recommended that advertisers include the word “free” in mobile content, which Goddard claimed led to fraudulent subscription service recruitment. This was machine learning-based recommendations. The court again found provided the Keyword Tool was neutral that advertisers could adopt or reject the recommendation.  Still, time and time again the idea of safe harbor for internet companies and whether internet exceptionalism should continue comes up. The internet gave a voice to the oppressed, but also to the oppressors. That's neutrality in a way, except that the oppressors (especially when state sponsored actors are involved) often have more resources to drown out other voices, just like in real life. Some have argued a platform like Facebook should be held accountable for their part in the Capitol riots, which is to say as a place where people practiced free speech. Others look to Backpage as facilitating the exploitation of children or as a means of oppression. Others still see terrorist networks as existing and growing because of the ability to recruit online.  The Supreme Court is set to hear docket number 21-1333 in 2022. Gonzalez v. Google was brought by Reynaldo Gonzalez, and looks at whether 230 can immunize Google even though they have made targeted recommendations - in this case when ISIS used YouTube vides to recruit new members - through the  recommendation algorithm. An algorithm that would be neutral. But does a platform as powerful have a duty to do more, especially when there's a chance that Section 230 bumps up against anti-terrorism legislation. Again and again the district courts in the United States have found section 230 provides broad immunization to online content providers. Now, the Supreme Court will weigh in. After that, billions of dollars may have to be pumped into better content filtration or they may continue to apply broad first amendment guidance.  The Supreme Court is packed with “originalists”. They still have phones, which the framers did not. The duty that common law places on those who can disseminate negligent or reckless content has lost the requirement for reasonable care due to the liability protections afforded purveyors of content by Section 230. This has given rise to hate speech and misinformation. John Perry Barlow's infamous A Declaration of the Independence of Cyberspace in protest of the CDA was supported by Section 230 of that same law. But the removal of the idea and duty of reasonable care and the exemptions have now removed any accountability from what seems like any speech. Out of the ashes of accountability the very concept of free speech and where the duty of reasonable care lies may be reborn. We now have the ability to monitor via machine learning, we've now redefined what it means to moderate, and there's now a robust competition for eyeballs on the internet. We've also seen how a lack of reasonable standards can lead to real life consequences and that an independent cyberspace can bleed through into the real world.  If the Supreme Court simply upholds findings from the past then the movement towards internet sovereignty may accelerate or may stay the same. Look to where venture capital flows for clues as to how the First Amendment will crash into the free market, and see if its salty waters leave data and content aggregators with valuations far lower than where they once were. The asset of content may some day become a liability with injuries that could provide an existential threat to the owner. The characters may walk the astral plane but eventually must return to the prime material plane along their tether to take a long rest or face dire consequences. The world simply can't continue to become more and more toxic - and yet there's a reason the First Amendment is, well, first. Check out Twenty-Six Words Created the Internet. What Will It Take to Save It?

Access and Opportunity with Carla Harris
Bridging the Digital Divide

Access and Opportunity with Carla Harris

Play Episode Listen Later Feb 3, 2022 25:57


According to the U.S. Census, roughly one in ten homes in America lack a broadband internet connection, and the city of Brownsville, Texas tops the list of least connected cities in the country. On this episode, we'll learn from two people on the frontlines in the battle against this digital divide. We hear from Brownsville high school teacher Mayra Delgado. After seeing her students struggle with connectivity, she co-founded a group called What the Fiber to address the problem. Then, host Carla Harris sits down with one of the people that are helping to bring broadband to Brownsville, Rene Gonzalez. Rene is the co-founder and Chief Strategy Officer of Lit Communities, a company that helps cities develop their own fiber networks instead of bringing in an outside internet service provider. This not only connects their residents and businesses but allows the city to earn money by charging Internet Service Providers (ISPs) for use of the city network. https://www.morganstanley.com/what-we-do/inclusive-innovation-and-opportunity Disclaimer textThe guest speakers are neither employees nor affiliated with Morgan Stanley & Co. LLC. (“Morgan Stanley”). The views and opinions expressed herein do not necessarily reflect those of Morgan Stanley. The information and figures contained herein has been obtained from sources outside of Morgan Stanley and Morgan Stanley makes no representations or guarantees as to the accuracy or completeness of information or data from sources outside of Morgan Stanley. Morgan Stanley is not responsible for the information or data contained in this podcast. This podcast does not provide individually tailored investment advice and is not a solicitation of any offer to buy or sell any security or other financial instrument or to participate in any trading strategy. It has been prepared without regard to the individual financial circumstances and objectives of persons who receive it.© 2022 Morgan Stanley & Co. LLC, Members SIPC.

The History of Computing
Email: From Time Sharing To Mail Servers To The Cloud

The History of Computing

Play Episode Listen Later Jan 15, 2022 16:25


With over 2.6 billion active users ad 4.6billion active accounts email has become a significant means of communication in the business, professional, academic, and personal worlds. Before email we had protocols that enabled us to send messages within small splinters of networks. Time Sharing systems like PLATO at the University of Champaign-Urbana, DTSS at Dartmouth College, BerkNet at the University of California Berkeley, and CTTS at MIT pioneered electronic communication. Private corporations like IBM launched VNET We could create files or send messages that were immediately transferred to other people. The universities that were experimenting with these messaging systems even used some of the words we use today. MIT's CTSS used the MAIL program to send messages. Glenda Schroeder from there documented that messages would be placed into a MAIL BOX in 1965. She had already been instrumental in implementing the MULTICS shell that would later evolve into the Unix shell. Users dialed into the IBM 7094 mainframe and communicated within that walled garden with other users of the system. That was made possible after Tom Van Vleck and Noel Morris picked up her documentation and turned it into reality, writing the program in MAD or the Michigan Algorithm Decoder. But each system was different and mail didn't flow between them. One issue was headers. These are the parts of a message that show what time the message was sent, who sent the message, a subject line, etc. Every team had different formats and requirements. The first attempt to formalize headers was made in RFC 561 by Abhay Bhutan and Ken Pogran from MIT, Jim White at Stanford, and Ray Tomlinson. Tomlinson was a programmer at Bolt Beranek and Newman. He defined the basic structure we use for email while working on a government-funded project at ARPANET (Advanced Research Projects Agency Network) in 1971. While there, he wrote a tool called CYPNET to send various objects over a network, then ported that into the SNDMSG program used to send messages between users of their TENEX system so people could send messages to other computers. The structure he chose was Username@Computername because it just made sense to send a message to a user on the computer that user was at. We still use that structure today, although the hostname transitioned to a fully qualified domain name a bit later. Given that he wanted to route messages between multiple computers, he had a keen interest in making sure other computers could interpret messages once received. The concept of instantaneous communication between computer scientists led to huge productivity gains and new, innovative ideas. People could reach out to others they had never met and get quick responses. No more walking to the other side of a college campus. Some even communicated primarily through the computers, taking terminals with them when they went on the road. Email was really the first killer app on the networks that would some day become the Internet. People quickly embraced this new technology. By 1975 almost 75% of the ARPANET traffic was electronic mails, which provided the idea to send these electronic mails to users on other computers and networks. Most universities that were getting mail only had one or two computers connected to ARPANET. Terminals were spread around campuses and even smaller microcomputers in places. This was before the DNS (Domain Name Service), so the name of the computer was still just a hostname from the hosts file and users needed to know which computer and what the correct username was to send mail to one another. Elizabeth “Jake” Feinler had been maintaining a hosts file to keep track of computers on the growing network when her employer Stanford was just starting the NIC, or Network Information Center. Once the Internet was formed that NIC would be the foundation or the InterNIC who managed the buying and selling of domain names once Paul Mockapetris formalized DNS in 1983. At this point, the number of computers was increasing and not all accepted mail on behalf of an organization. The Internet Service Providers (ISPs) began to connect people across the world to the Internet during the 1980s and for many people, electronic mail was the first practical application they used on the internet. This was made easier by the fact that the research community had already struggled with email standards and in 1981 had defined how servers sent mail to one another using the Simple Mail Transfer Protocol, or SMTP, in RFC 788, updated in 1982 with 821 and 822. Still, the computers at networks like CSNET received email and users dialed into those computers to read the email they stored. Remembering the name of the computer to send mail to was still difficult. By 1986 we also got the concept routing mail in RFC 974 from Craig Partridge. Here we got the first MX record. Those are DNS records that define the computer that received mail for a given domain name. So stanford.edu had a single computer that accepted mail for the university. These became known as mail servers. As the use of mail grew and reliance on mail increased, some had multiple mail servers for fault tolerance, for different departments, or to split the load between servers. We also saw some split various messaging roles up. A mail transfer agent, or MTA, sent mail between different servers. The received field in the header is stamped with the time the server acting as the MTA got an email. MTAs mostly used port 25 to transfer mail until SSL was introduced when port 587 started to be used for encrypted connections. Bandwidth and time on these computers was expensive. There was a cost to make a phone call to dial into a mail provider and providers often charged by the minute. So people also wanted to store their mail offline and then dial in to send messages and receive messages. Close enough to instant communication. So software was created to manage email storage, which we call a mail client or more formally a Mail User Agent, or MUA. This would be programs like Microsoft Outlook and Apple Mail today or even a web mail client as with Gmail. POP, or Post Office Protocol was written to facilitate that transaction in 1984. Receive mail over POP and send over SMTP. POP evolved over the years with POPv3 coming along in 1993. At this point we just needed a username and the domain name to send someone a message. But the number of messages was exploding. As were the needs. Let's say a user needed to get their email on two different computers. POP mail needed to know to leave a copy of messages on servers. But then those messages all showed up as new on the next computer. So Mark Crispin developed IMAP, or Internet Message Access Protocol, in 1986, which left messages on the server and by IMAPv4 in the 1990s, was updated to the IMAPv4 we use today. Now mail clients had a few different options to use when accessing mail. Those previous RFCs focused on mail itself and the community could use tools like FTP to get files. But over time we also wanted to add attachments to emails so MIME, or Multipurpose Internet Mail Extensions became a standard with RFC 1341 in 1993. Those mail and RFC standards would evolve over the years to add better support for encapsulations and internationalization. With the more widespread use of electronic mail, the words were shortened and to email and became common in everyday conversations. With the necessary standards, the next few years saw a number of private vendors jump on the internet bandwagon and invest in providing mail to customers America Online added email in 1993, Echomail came along in 1994, Hotmail added advertisements to messages, launching in 1996, and Yahoo added mail in 1997. All of the portals added mail within a few years. The age of email kicked into high gear in the late 1990s, reaching 55 million users in 1997 and 400 million by 1999. During this time having an email address went from a luxury or curiosity to a societal and business expectation, like having a phone might be today. We also started to rely on digital contacts and calendars, and companies like HP released Personal Information Managers, or PIMs. Some companies wanted to sync those the same way they did email, so Microsoft Exchange was launched in 1996. That original concept went all the way back to PLATO in the 1960s with Dave Wooley's PLATO NOTES and was Ray Ozzie's inspiration when he wrote the commercial product that became Lotus Notes in 1989. Microsoft inspired Google who in turn inspired Microsoft to take Exchange to the cloud with Outlook.com. It hadn't taken long after the concept of sending mail between computers was possible that we got spam. Then spam blockers and other technology to allow us to stay productive despite the thousands of messages from vendors desperately trying to sell us their goods through drip campaigns. We've even had legislation to limit the amount of spam, given that at one point over 9 out of 10 emails was spam. Diligent efforts have driven that number down to just shy of a third at this point. Email is now well over 40 years old and pretty much ubiquitous around the world. We've had other tools for instant messaging, messaging within every popular app, and group messaging products like bulletin boards online and now group instant messaging products like Slack and Microsoft Teams. We even have various forms of communication options integrated with one another. Like the ability to initiate a video call within Slack or Teams. Or the ability to toggle the Teams option when we send an invitation for a meeting in Outlook. Every few years there's a new communication medium that some think will replace email. And yet email is as critical to our workflows today as it ever was.

Business Drive
Nigerian Communications Commission Raises Alarm Over Cyberspying On Telcos

Business Drive

Play Episode Listen Later Nov 16, 2021 1:05


The Nigerian Communications Commission has raised an alarm over the existence of another hacking group orchestrating cyberespionage in the African telecoms space. Dr Ikechukwu Adinde says the agency explained that the notification became necessary to keep stakeholders in the country's telecoms sector informed, educated, and protected. He says an Iranian hacking group known as Lyceum (also known as Hexane, Siamesekitten, or Spirlin) has been reported to be targeting telecoms, Internet Service Providers (ISPs), and Ministries of Foreign Affairs (MFA) in Africa with upgraded malware in a recent politically motivated attacks oriented in cyberespionage. He added that the hacking group is known to be focused on infiltrating the networks of telecoms companies and ISPs.

Africa Podcast Network
Nigerian Communications Commission Raises Alarm Over Cyberspying On Telcos

Africa Podcast Network

Play Episode Listen Later Nov 16, 2021 1:05


The Nigerian Communications Commission has raised an alarm over the existence of another hacking group orchestrating cyberespionage in the African telecoms space. Dr Ikechukwu Adinde says the agency explained that the notification became necessary to keep stakeholders in the country's telecoms sector informed, educated, and protected. He says an Iranian hacking group known as Lyceum (also known as Hexane, Siamesekitten, or Spirlin) has been reported to be targeting telecoms, Internet Service Providers (ISPs), and Ministries of Foreign Affairs (MFA) in Africa with upgraded malware in a recent politically motivated attacks oriented in cyberespionage. He added that the hacking group is known to be focused on infiltrating the networks of telecoms companies and ISPs.

Africa Business News
Nigerian Communications Commission Raises Alarm Over Cyberspying On Telcos

Africa Business News

Play Episode Listen Later Nov 16, 2021 1:05


The Nigerian Communications Commission has raised an alarm over the existence of another hacking group orchestrating cyberespionage in the African telecoms space. Dr Ikechukwu Adinde says the agency explained that the notification became necessary to keep stakeholders in the country's telecoms sector informed, educated, and protected. He says an Iranian hacking group known as Lyceum (also known as Hexane, Siamesekitten, or Spirlin) has been reported to be targeting telecoms, Internet Service Providers (ISPs), and Ministries of Foreign Affairs (MFA) in Africa with upgraded malware in a recent politically motivated attacks oriented in cyberespionage. He added that the hacking group is known to be focused on infiltrating the networks of telecoms companies and ISPs.

We fight for that
The Internet Affordability Revolution will not be Subsidized with Shelley Robinson

We fight for that

Play Episode Listen Later Jun 24, 2021 48:58


The CRTC's recent reversal of its wholesale internet rates decision will impede small non-profit Internet Service Providers (ISPs) such as Ottawa's community-centred National Capital Freenet (NCF).Shelley Robinson, NCF's Executive Director, joins PIAC's ED John Lawford to break down the CRTC's increase in rates and how it will impede NCF's desires to offer its "Community Access Fund" and low-cost connectivity at basic service speeds (50 Mbps download / 10 Mbps upload) to its qualifying customers. Shelley also details the pressures the higher rates will place on all non-profit and community-based ISPs  and the CRTC's overconfidence in thinking that its coming "disaggregated" model will rescue small ISPs and better serve customers. Instead, this approach and the higher rates will actually leave a large number of Canadians without internet or relying upon corporate handouts, even if they are solicited by the government (Connecting Families program). This must change to a sustainable model to ensure affordable internet access - based on a model like the U.S. Lifeline program.

PC Networking
What is the Difference Between LAN, WAN, and MAN Networks?

PC Networking

Play Episode Listen Later Oct 16, 2020 2:17


What is the Difference Between LAN, WAN, and MAN Networks? Network systems is a computer technology that enables computers in a local or a wide area to communicate with each other. This technology is divided into some definitions according to the area it covers and the type of physical connection. These are LAN (Local Area Network), MAN (Metropolitan Area Network), and WAN (Wide Area Network). Local Area Network (LAN) It is a type of private network consisting of a group of computers and network devices within a small geographic area. Often an office is used to describe a network of computers located several buildings away from each other. The criterion here is that the computers are close to each other in general, rather than how many computers the network consists of. Home, office, school, hospital networks can be examples of local area networks. Twisted (ethernet) or coaxial cables are generally used in local area networks. Since the distance is short, the speed is high and the noise ratio is lower. Metropolitan Area Network (MAN) MAN is a type of network that covers more areas than LANs and less than WANs. It is a type of network that connects networks that are usually hosted in the same cities but in different geographic regions. Networks covered by Internet Service Providers (ISPs) in a city can be an example of a MAN. Due to their location in different geographical areas, their speed will be lower than LAN. Wide Area Network (WAN) It defines a network created by connecting many LANs to each other via the Internet over a wide geography. Internet service providers perform the task of connecting multiple Local Area Networks. The local area networks mentioned here can be in many different parts of the world. Optical cables or satellites can be used for transmission. To compare, WAN covers a much larger area than LAN and MAN. It is more difficult to design and maintain than LAN. Since it can send information to much more distant geographic locations, its speed is slower than LAN and MAN and its error probability is higher. LAN has exclusive use. It is faster than others and less likely to fail. It is easier to install, maintain, and manage. MAN sits in the middle of the LAN and the WAN in terms of coverage and speed. More Podcasts The LAN Network in Google Podcast The WAN Network in Google Podcast The Internet in Google Podcast The WAN in iHeart Podcast

Community Broadband Bits
Is Open Access the Future? – Community Broadband Bits Podcast Episode 424

Community Broadband Bits

Play Episode Listen Later Aug 25, 2020 40:33


For communities looking to improve Internet access for their citizens but that might be wary of becoming full-fledged Internet Service Providers (ISPs) themselves, open access networks offer a practical model for the future. Like roads, open access networks serve as publicly owned byways that telecommunications providers can then lease bandwidth on and offer a wide array of … Continue reading "Is Open Access the Future? – Community Broadband Bits Podcast Episode 424"

The Broadband Bunch
Broadband Analytics: How Geospatial Intelligence Improves Infrastructure

The Broadband Bunch

Play Episode Listen Later May 26, 2020 40:26


In today's episode, we speak with Will Mitchell, the CEO and co-founder of VETRO FiberMap. Will explains geospatial or map-based analytics, he helps us understand why the telecommunication is now moving towards map-based information. He explains how network operators can benefit from intelligent broadband and fiber maps. We talk about post-COVID and how a better understanding of our infrastructure can accelerate the systems that we need during this time. And we discuss what map-based insight may look like in the future. More about Vetro Fibermap: https://www.vetrofibermap.com/ VETRO FiberMap was launched in 2016 by two founders, Will Mitchell and Sean Myers, who recognized that traditional mapping tools could not meet the needs of a rising tide of small and mid-size Internet Service Providers (ISPs). These ISPs needed an intuitive and accessible tool that would allow them to plan, design, build, sell, and manage their broadband networks using a single, cost-effective solution. VETRO FiberMap, designed and developed with input from many ISPs, now delivers this unique solution to competitive fiber broadband providers in more than a dozen countries.

TakingCTRL in Ed Tech
Episode 9: Internet Service Providers (ISPs), Digital Inequity, and

TakingCTRL in Ed Tech

Play Episode Listen Later Mar 16, 2020 53:50


In this episode I look at the recent reporting on Internet Service Providers (ISPs) and the "free" services being offered to low-income residents. I examine the FCC Chairman Ajit Pai's request for companies to sign the "Keep America Connected" pledge, and what this should mean for K-12 school Technology Supervisors and Coordinators moving forward once the coronavirus has passed. I discuss the necessary urgency for school districts in NJ and across the nation to willingly address the inequities that face our ethnic, racial, and underrserved students and work to solve them for good in NJ and the nation as a whole. https://www.nydailynews.com/coronavirus/ny-coronavirus-internet-providers-free-wifi-20200315-6k7pzukriffdfcic5odfizmnri-story.html https://www.multichannel.com/news/pai-broadband-companies-take-covid-19-connectivity-pledge https://internetessentials.com/

Business Drive
The Nigerian Communications Commission (NCC) licensed a total number of 20 new Internet Service Providers (ISPs).

Business Drive

Play Episode Listen Later Oct 31, 2019 4:18


The Nigerian Communications Commission (NCC) licensed a total number of 20 new Internet Service Providers (ISPs) between January and October this year. This makes the operators licensed by the NCC 120 in number. The number of licensed operators was at one time over 170 but because of the challenges surrounding the business, many operators quit. The exit of some of the old ISPs was due to a number of challenges faced in the sector, and this has, in turn, had an effect on the active service providers. One of the challenges is the serious pressure the ISPs have come under from mobile network operators (MNOs) over the years. The intense competition and other operational challenges such as increasing capital and operational expenditure have been cited as the bane of ISPs in the country. Addressing the issue, the NCC’s Director of Licensing and Authorisation, Funlola Akiode, urged the operators to renew their licenses and fulfil their licensing obligations.--- Support this podcast: https://anchor.fm/newscast-africa/support --- Support this podcast: https://anchor.fm/newscast-africa/support Learn more about your ad choices. Visit megaphone.fm/adchoices

Intel Chip Chat: Network Insights
vRouter Solutions for ISPs – Intel Chip Chat Network Insights – Episode 211

Intel Chip Chat: Network Insights

Play Episode Listen Later Jul 2, 2019


Intel Chip Chat – Network Insights audio podcast with Allyson Klein: Kelly LeBlanc, VP Marketing at 6WIND, joins Intel® Chip Chat Network Insights to discuss 6WIND vRouters use cases which now service up to 10 million users on Intel servers. Internet Service Providers (ISPs) are replacing hardware routers with virtual routers (vRouters) on Intel servers […]

marketing data transformation open network networking software architecture infrastructure intel defined functions isps telco virtualization sdi sdn nfv network insights internet service providers isps intel chip chat intel chip chat network insights 6wind
Field Notes in Philanthropy
Field Notes in Philanthropy: Why Net Neutrality Matters for Nonprofits

Field Notes in Philanthropy

Play Episode Listen Later Aug 14, 2018 44:44


Episode 7: Why Net Neutrality Matters for Nonprofits Despite substantial public opposition, Obama-era regulations securing Net Neutrality – a principle that essentially bars Internet Service Providers (ISPs) from playing favorites with different websites – were rolled back by the FCC on June 11, 2018. These changes could pave the way for a new, highly manipulated user experience: movements, media reports, resources, and more that ISPs – or their investors – don’t like, or that don’t make them any money, could end up on the other side of a slow connection. What could this mean for nonprofits – and for the communities they serve? Katharine Trendacosta, Policy Analyst at the Electronic Frontier Foundation, and Larra Clark, Deputy Director for both the Public Library Association (PLA) and the American Library Association’s (ALA) Office of Information Technology Policy, join the hosts.

Crypto Token Talk
Episode 106: Connecting the World through Blockchain and Mesh Networks with Melissa Quinn of RightMesh

Crypto Token Talk

Play Episode Listen Later Feb 16, 2018 26:09


Melissa Quinn, RightMesh Corporate Development Manager and Director of the Blockchain Users Group in Canada, joins us for a discussion on blockchain, mesh networks, and expanding opportunities for connectivity for people around the globe.   To kick-off our conversation, Melissa gave a brief overview of the technology RightMesh is harnessing to achieve their mission of expanding global connectivity. She explains that mesh networks allow devices, like smartphones and IoT devices, to connect directly peer-to-peer rather than relying on traditional Internet Service Providers (ISPs). Mesh networks allow devices to communicate with one another without being directly connected to the internet or cell service. This type of peer-to-peer connectivity allows users to interact in challenging circumstances, like when internet and cell service are disrupted due to natural disasters (like the recent hurricane in Puerto Rico), or in dense metropolitan areas in emerging markets where connectivity is unaffordable for the majority of the population. It can also benefit developed regions struggling with network congestion, which can happen at large conferences and sporting events.   For RightMesh, blockchain technology comes into play for several reasons. First, traditional means of online identification (like an IP address) don’t work on a mesh network because a mesh may not always be connected to the internet.  Integrating the protocol and platform with the Ethereum blockchain, provided a way to assign a unique identifier, or a MeshID, to each device in the network.  Secondly, RightMesh uses blockchain to incentivize network participation to build density. With their ERC20 token, RMESH, users are able to buy and sell data to connect meshes located in different cities (i.e. New York and Beijing) and reward nodes routing data in between.   Beyond RightMesh’s mission to connect the world through mesh networks, Melissa also hopes to foster continued participation in the blockchain community, especially by people who are new to the technology. When asked about how to encourage more women to get involved in the crypto space, Melissa reminds us that because the blockchain industry is still a nascent industry, no one should be too intimidated to jump in and learn.   Links for resources mentioned in the podcast: https://twitter.com/melissa_aquinn https://twitter.com/Right_Mesh https://www.rightmesh.io/ https://www.youtube.com/user/aantonop http://unchainedpodcast.co/  

The CyberGuide
Protecting Yourself From Your Internet Service Provider

The CyberGuide

Play Episode Listen Later Apr 25, 2017 8:34


President Trump recently signed legislation that blocked the implementation of the Federal Communications Commission's Online Privacy Rule that was to take effect at the end of this year. This rule was intended to prevent Internet Service Providers (ISPs) from capturing and selling user data. Learn best practice tips to secure your sensitive information from ISPs on this episode of The CyberGuide.

The Geek Down
Congress Kills Internet Privacy (2017) discussion

The Geek Down

Play Episode Listen Later Apr 13, 2017 13:29


Under Donald Trump, the Senate and House voted to dismantle an Obama-era rule preventing Internet Service Providers (ISPs) from selling personal information and internet histories These protections -- which had not yet gone into effect -- were approved by the Federal Communications Commission in the final days of the Obama administration. The providers have data on your web browsing history, app usage and geo-location. Providers would also have been required to notify customers about the types of information collected and shared. We discuss in detail what that means for internet users

Notes From The Electronic Cottage | WERU 89.9 FM Blue Hill, Maine Local News and Public Affairs Archives

Producer/Host: Jim Campbell Recently, we’ve seen headlines like “US Congress Votes to Let Broadband ISPs Sell Your Browser Histories.” Could this be true? Yup, it sure is so it becomes more important than ever for anyone who cares about personal privacy to take steps to preserve their privacy online themselves. In theory, most Internet Service Providers (ISPs) have agreed to abide by a set of ISP Privacy Principles. A copy of those principles is available here: prodnet.www.neca.org/publicationsdocs/wwpdf/12717ctia.pdf. And most ISPs are supposed to provide a way for customers to choose not to have their personal information sold to others. Each ISP is supposed to have a way to opt out of tracking of their Internet activity. The link for Time Warner Cable, now Spectrum, is here: pc2.mypreferences.com/charter/privacy. The post Notes from the Electronic Cottage 3/30/17 first appeared on WERU 89.9 FM Blue Hill, Maine Local News and Public Affairs Archives.

internet electronic spectrum cottages isps time warner cable weru internet service providers isps public affairs archives fm blue hill maine local news