Internet traffic will quadruple in five years and the number of mobile Internet connections will exceed the world's population by 2017, according to Cisco research.
An ITU group has approved a successor to the H.264 video encoding standard, opening the door to future video transmission using only half the bandwidth that's now required.
The International Telecommunication Union (ITU), the UN body that has played a standards-setting role for global telecommunication networks over the decades, Wednesday night suffered a website attack that severely disrupted a conference to discuss its Internet influence.
The UN's telecommunications standards organization has approved a standard for deep packet inspection (DPI) that raises serious concerns about privacy, the Center for Democracy and Technology said.
The Internet as we know it might never have happened if the Comite Consultatif International Telephonique et Telegraphique (CCITT) had not turned down the offer of TCP/IP from Vint Cerf and other Internet pioneers about 35 years ago.
Going into last month the future of the Internet, to borrow a phrase from the great film noir movie "A Touch of Evil," looked like it may have been all used up. The feeling of the traditional telephone folk and controlling governments was that the Internet had done just about enough of this changing the future stuff -- thanks very much -- now it was time for a bit of control. But the World Conference on International Telecommunications (WCIT) in Dubai did not turn out quite the way that those who would control the Internet wanted. Nor, did the WCIT turn out quite the way that those of us who wanted a more hands-off future would have liked.
Sign up now »
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTSenior Python DeveloperNSW
- FTOS Web Applications DeveloperNSW
- FTTechnical Business AnalystNSW
- FTFlash / ActionScript Developer - ContractNSW
- FTLead Software EngineerSA
- FTR&D EngineerSA
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTQuality ManagerSA
This research paper presents findings on APT-related spear phishing from February to September 2012. We analysed APT-related spear-phishing emails collected throughout this period to understand and mitigate attacks. The information ...
The nature of work has changed fundamentally and forever and it continues to evolve rapidly. Geographic distance and ...
"Suggesting that people's "purpose is to get information to flow through the ..."
Why change management doesn’t work
"Darn those pesky laws that get in the way of commercial exploitation ..."
Larry Page wants to see your medical records
"Instead of partitioning the device between corporate and personal data, another approach ..."
Dual-Persona Smartphones Not a BYOD Panacea
"Well that's a nice back-handed compliment isn't it? So now, finally, my ..."
After two-year hiatus, EFF accepts bitcoin donations again
"Actually, both Mobile App developers and CIOs should be blamed for it. ..."
CIOs struggle to deliver timely mobile business apps: survey
- AusCERT 2013: Four dissenters to spur next year's security debates
- AusCERT 2013: Kill the password, says Mozilla
- AusCERT 2013: Unmanaged, unknown privileged logins opening the door for APTs: Cyber-Ark
- AusCERT 2013: Companies unaware of IPv6 security risk even if they’re not using it
- In pictures: AusCERT 2013 roundup
- Analytics and personalisation drive leading marketer behaviour: Report
- Innovation and big data take centre stage during CMO panel
- Twitter targets second screen interaction with Amplify advertising partnerships
- Facebook talks hyper-targeting, analytics and cross-platform at AANA event
- Tapping into social experience: Tourism Australia