Tokyo, Japan

Internet Initiative Japan Inc. is a telecommunications company based in Tokyo, Japan. Established on December 3, 1992, it employs 1,715 people and has a capitalization of ¥14,295,000,000. They provide internet connectivity and network-related services, network systems construction, operation and maintenance, development and sales of telecommunication equipment. They are an IPv6 Tunnel Broker providing IP tunneling between the U.S. and Japan. Wikipedia.


Time filter

Source Type

M3AAWG Junta Directiva: AT&T traded on NYSE with symbol T; CenturyLink traded on NYSE with symbol CTL; Cloudmark, Inc.; Comcast traded on NASDAQ with symbol CMCSA; Facebook; Google; LinkedIn; Message Systems; Mailchimp; Microsoft Corp.; Orange traded on NYSE with symbol Euronext ORA; Return Path; SendGrid, Inc.; Charter Communications; Vade Secure; and Yahoo! Inc. M3AAWG Miembros Plenos: 1&1 Internet AG; Adobe Systems Inc.; Agora, Inc.; AOL; Campaign Monitor Pty.; Cisco Systems, Inc.; CloudFlare; Dyn; Exact Target, Inc.; IBM, iContact; Internet Initiative Japan cotizada en NASDAQ con los símbolos IIJ e IIJI; Liberty Global; Listrak; Litmus; MAPP; McAfee Inc.; Mimecast; Nominum, Inc.; Oracle Marketing Cloud; OVH; PayPal; Proofpoint; Rackspace; Spamhaus; Sprint y Symantec.


SAN FRANCISCO, CA--(Marketwired - Oct 25, 2016) - The lead architect of both a comprehensive report that demystifies online threats for the general public and an important Canadian law that has appreciably reduced spam has received the M3AAWG 2016 JD Falk Award for his contributions to a safer online world. André Leduc was recognized for spearheading the global Operation Safety-Net best practices report and for his role in developing the Canadian Anti-spam Legislation that requires marketers to obtain users' permission before sending commercial email. The award was announced Oct. 25 during the four-day M3AAWG 38th General Meeting in Paris. The Messaging, Malware and Mobile Anti-Abuse Working group presents the award annually to recognize an "unsung hero" working behind the scenes to protect the internet and end-users. "Both of these accomplishments have been widely embraced by the anti-abuse community as valuable tools in fighting spam and other cybercrime. Operation Safety-Net makes cybersecurity accessible to mainstream, non-technical users by cutting through the complicated techno-jargon about keeping our devices safe, and the anti-spam law known as CASL has dramatically reduced junk mail in Canada and beyond. Neither of these projects would have come to fruition without Andre's meticulous attention to detail, his dedicated effort that went well beyond expectations, and his persistent leadership," said Michael Adkins, M3AAWG Chairman of the Board. Leduc is the acting director of business, intelligence and analysis, and digital security policy, at the Canadian Department of Innovation, Science and Economic Development. He also served as a voluntary secretariat co-lead for the London Action Plan/Unsolicited Communications Enforcement Network and facilitated the cooperative work between M3AAWG and LAP/UCENet that resulted in the jointly published report. A video with Leduc explaining the motivation behind these two projects is available on the M3AAWG YouTube channel at www.youtube.com/maawg. Operation Safety Net for Business, Government and End-Users Operation Safety Net -- Best Practices to Address Online, Mobile, and Telephony Threats is a 76-page report written by security experts from around the world that describes current cyber issues facing business, government and end-users with the proven techniques to protect against them. Leduc spearheaded the project, which was originally requested by the Organisation for Economic Co-operation and Development, and compiled the submitted material into a coherent report. Leduc said, "Translating our technical and engineering way of talking into plain language was probably the most important part of this work. We wanted to create a report that a security officer or an engineer could give to colleagues and management to help them understand cyber attacks and why their organizations might be targeted. We also wanted to make it easy for government policy makers in both the developed and developing countries, where they may not have much technical experience, to take action." The original report was published in 2012 then updated in 2015. The latest version covers malware and botnets; phishing and social engineering; internet protocol and domain name system (DNS) exploits; and mobile, voice over IP (VOIP) and telephony threats. Originally published in English, it has been translated into French and Spanish, reaching much of the world's population. The report is available in these languages at www.m3aawg.org under Best Practices. CASL Effective Beyond Canada Leduc also was the lead architect developing the policy and legal frameworks for the Canadian Anti-spam Legislation that set a new standard for sending marketing messages when it went into effect in 2014. The law applies to commercial or promotional information sent through email, SMS, instant messaging or social media. It also covers software installations and mobile apps. CASL requires marketers to obtain a user's permission to receive a commercial message before it is sent, a process known as "opt-in" that is more effective in fighting abuse and spam. For example, under the law, users need to voluntarily sign up for a mailing list or have an existing business relationship with an organization before marketers can send them related emails. Since CASL applies to all messages sent to users in Canada, including those originating from other countries, it has encouraged the voluntary adoption of opt-in practices internationally. "The volume of spam on Canadian networks has decreased by more than a third since CASL went into effect. We have also seen a high level of compliance from senders in the countries to our south, throughout Europe, and even in Asia. Many international senders are now getting consent prior to sending commercial electronic messages to our users," Leduc said. Leduc began work on establishing the concepts and language for CASL in 2009. He has specialized in cybersecurity since 2004 when he led OECD ecommerce business working groups and then became part of an expert subgroup on high-tech crimes in 2004. He has represented Industry Canada (now Innovation Science and Economic Development Canada) at the OECD, the G7 and G8 summits, and the Wassenaar Arrangement. The M3AAWG 38th General Meeting is the organization's annual European meeting and has brought together more than 350 security experts from 30 countries. The working meeting features more than 50 sessions with network operators, social networking companies, hosting and cloud services providers, email service providers, academic researchers and public policy advisors sharing information on the latest cyber threats. The next meeting will be February 20-23, 2017 in San Francisco. About the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) The Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) is where the industry comes together to work against bots, malware, spam, viruses, denial-of-service attacks and other online exploitation. M3AAWG (www.M3AAWG.org) members represent more than one billion mailboxes from some of the largest network operators worldwide. It leverages the depth and experience of its global membership to tackle abuse on existing networks and new emerging services through technology, collaboration and public policy. It also works to educate global policy makers on the technical and operational issues related to online abuse and messaging. Headquartered in San Francisco, Calif., M3AAWG is driven by market needs and supported by major network operators and messaging providers. M3AAWG Board of Directors: AT&T traded on NYSE with symbol T; CenturyLink traded on NYSE with symbol CTL; Cloudmark, Inc.; Comcast traded on NASDAQ with symbol CMCSA; Facebook; Google; LinkedIn; Message Systems; Mailchimp; Microsoft Corp.; Orange traded on NYSE with symbol Euronext ORA; Return Path; SendGrid, Inc.; Charter Communications; Vade Secure; and Yahoo! Inc. M3AAWG Full Members: 1&1 Internet AG; Adobe Systems Inc.; Agora, Inc.; AOL; Campaign Monitor Pty.; Cisco Systems, Inc.; CloudFlare; Dyn; Exact Target, Inc.; IBM, iContact; Internet Initiative Japan traded on NASDAQ with symbols IIJ and IIJI; Liberty Global; Listrak; Litmus; MAPP; McAfee Inc.; Mimecast; Nominum, Inc.; Oracle Marketing Cloud; OVH; PayPal; Proofpoint; Rackspace; Spamhaus; Sprint; and Symantec. A complete member list is available at https://www.m3aawg.org/about/roster.


SAN FRANCISCO, CA--(Marketwired - Feb 21, 2017) -  Michael "Mick" Moran, who has helped rescue thousands of child abuse material victims since he started working in the field in 1997, challenged the internet industry to do more to protect innocent children as he received the 2017 M3AAWG Mary Litynski Award today. Moran, assistant director of INTERPOL's Vulnerable Communities Unit, was honored at the 39th general meeting of the Messaging, Malware and Mobile Anti-Abuse Working Group for his personal commitment to this challenging work and for fostering international cooperation to fight online exploitation. The M3AAWG Mary Litynski Award recognizes the life-time achievements of a person whose work has significantly contributed to the safety of the online community. In his acceptance presentation and in a video for the M3AAWG YouTube channel, Moran outlined some of the changing strategies in battling child abuse materials and offered suggestions on how the industry can better safeguard its networks. Until a few years ago, dealing in child abuse materials (CAM) was basically a commercial enterprise and its photos or movies were widely circulated online. But industry efforts, such as controlling the flow of spam used to circulate links to these materials, has largely driven it off the open Web and into private emails, cloud storage and live streaming events, Moran explained. "Up to 95 percent of abuse materials today are exchanged like-for-like, without any money changing hands, with the real currency being the pain of the children. But every picture, every movie, involves a real child and we have become very victim-centric at INTERPOL. We are moving away from the whack-a-mole work of catching someone for possessing or distribution and are now thinking about what we can do as law enforcement to identify that child and thereby stop the abuse," he said. Growing out of this child-centric strategy, the International Child Sexual Exploitation database is used to identify and locate victims. INTERPOL maintains ICSE, which connects fifty countries and provides them with current information on vulnerable children. The ICSE data helps identify an average of six victims a day around the world, ranging in age from infants to pre-teens, according to Moran. Industry Needs to Step Up Addressing how the industry can better protect this vulnerable population, Moran said, "In my opinion, anyone who has a network has the responsibility to ensure that it is not being used by bad actors. I would argue that you're being negligent if you, as a system administrator, are allowing child abusers to use your system. "Why would you scan your systems for malware and not scan for child abuse materials? Why would you ensure you aren't leaving any relays open on your mail servers but not make sure those servers aren't being used to transmit or store child abuse material? While there are some large companies that are managing this issue in a mature manner, for every one that is, there are ten, fifteen or twenty that are not," he said. Moran also urged the industry to build safety into new platforms and apps from the initial design phase. "We should acknowledge that bad people will abuse new services as these go online. If some thought is given to this at the coding stage, then it is possible to actually stop the exploitation early on," he said. From Chat Rooms to the Cloud Moran started his law enforcement career and is affiliated with the Garda Síochána, the police force of Ireland. He has been seconded to INTERPOL for 10 years and is stationed in Lyon, France, where its Vulnerable Communities Unit is headquartered. Moran began working against CAM in the early IRC chat rooms then followed as abusers moved to the Web and other technologies to distribute materials. Over the years, he has provided support and expertise to private organizations in the field and other law enforcement agencies globally, forging an international community that cooperates in rescuing exploited children, and he often speaks on the subject to both professional and public audiences. In announcing the award, M3AAWG Chairman Michael Adkins said, "We're recognizing Michael's tireless efforts over the last twenty years to protect these victims while working in a very demanding field, his commitment to protecting their dignity and his drive to protect as many children as possible. But this award is also a wake-up call for the industry. We all need to follow Mick's lead and take responsibility for this social issue. We all need to do more to keep it off our systems and networks." The 2017 award was presented during the M3AAWG 39th General Meeting that opened February 20 in San Francisco. Over 500 security experts, ISPs, researchers, public policy representatives and vendors are participating in the four-day meeting that features more than 50 cybersecurity and information sharing sessions. M3AAWG holds three meetings each year, including one in Europe, to develop best practices and other work that will protect online users. The next M3AAWG meeting will be June 12-15 in Lisbon, Portugal. About the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) The Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) is where the industry comes together to work against bots, malware, spam, viruses, denial-of-service attacks and other online exploitation. M3AAWG (www.m3aawg.org) members represent more than one billion mailboxes from some of the largest network operators worldwide. It leverages the depth and experience of its global membership to tackle abuse on existing networks and new emerging services through technology, collaboration and public policy. It also works to educate global policy makers on the technical and operational issues related to online abuse and messaging. Headquartered in San Francisco, Calif., M3AAWG is driven by market needs and supported by major network operators and messaging providers. M3AAWG Board of Directors: AT&T; CenturyLink; Cloudmark, Inc.; Comcast; Endurance International Group; Facebook; Google; LinkedIn; Mailchimp; Microsoft Corp.; Orange; Return Path; SendGrid, Inc.; Charter Communications; Vade Secure; and Yahoo! Inc. M3AAWG Full Members: 1&1 Internet AG; Adobe Systems Inc.; Agora, Inc.; AOL; Campaign Monitor Pty.; Cisco Systems, Inc.; CloudFlare; Dyn; Exact Target, Inc.; IBM, iContact; Internet Initiative Japan; Liberty Global; Listrak; Litmus; MAPP Digital; Sparkpost; Mimecast; Nominum, Inc.; Oracle Marketing Cloud; OVH; PayPal; Proofpoint; Rackspace; Spamhaus; Sprint; Symantec; and USAA.


Der M3AAWG Mary Litynski Award würdigt die Lebensleistungen von Personen, die einen erheblichen Beitrag für die Sicherheit der Online-Gemeinschaft geleistet haben. In seiner Dankesrede und in einem Video für den M3AAWG-YouTube-Kanal sprach Moran einige der sich wandelnden Strategien zur Bekämpfung von Kindesmissbrauchsmaterial an und machte Vorschläge, wie die Branche ihre Netzwerke besser schützen könnte. Moran begann seine Polizeikarriere bei Garda Síochána, der Polizeibehörde der Republik Irland, der er angeschlossen ist. Er ist seit zehn Jahren zu INTERPOL abgestellt und ist in Lyon, Frankreich, dem Sitz der Einheit für gefährdete Bevölkerungsgruppen, stationiert. Moran begann seine Arbeit in der Bekämpfung von Kindesmissbrauchsmaterial in den frühen IRC-Chaträumen und folgte dann Missbrauchstätern ins Web und zu anderen Technologien, die zur Verbreitung von Missbrauchsmaterial verwendet werden. Im Laufe der Jahre hat er Unterstützung und Beratung für Privatorganisationen in diesem Bereich und andere Polizeiorganisationen weltweit geleistet und eine internationale Gemeinschaft geschmiedet, die für die Rettung missbrauchter Kinder zusammenarbeitet, und er spricht häufig über das Thema sowohl zu professionellen Zuhörerschaften als auch zu Laien. Zur Bekanntgabe der Auszeichnung sagte der M3AAWG-Vorsitzende Michael Adkins: „Wir würdigen die unermüdlichen Anstrengungen von Michael Moran in den letzten 20 Jahren, bei seiner Arbeit in einem sehr schwierigen Feld die Opfer zu schützen, seinen Einsatz für den Schutz ihrer Würde und seinen Antrieb, so viele Kinder wie möglich zu schützen. Doch diese Auszeichnung ist auch ein Weckruf für die Branche. Wir alle müssen dem Beispiel von Michael Moran folgen und Verantwortung für dieses gesellschaftliche Problem übernehmen. Wir alle müssen mehr tun, um es von unseren Systemen und Netzwerken fernzuhalten.“ Der Preis 2017 wurde im Rahmen der 39. Generalversammlung der M3AAWG überreicht, die am 20. Februar in San Francisco eröffnet wurde. Mehr als 500 Sicherheitsexperten, ISPs, Forscher, politische Vertreter und Anbieter nehmen an dieser viertägigen Konferenz mit mehr als 50 Sitzungen zu Cybersicherheit und für den Informationsaustausch teil. Die M3AAWG veranstaltet jedes Jahr drei Konferenzen, darunter eine in Europa, um die besten Methoden und andere Ansätze zu entwickeln, die Online-Nutzer schützen. Die nächste M3AAWG-Konferenz wird vom 12. bis 15. Juni in Lissabon, Portugal, stattfinden. Die Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) ist die Schnittstelle, an der die Branche zusammenkommt, um gemeinsam gegen Bots, Malware, Spam, Viren, Denial-of-Service-Attacken und andere Online-Angriffe vorzugehen. Die Mitglieder der M3AAWG (www.m3aawg.org) repräsentieren über eine Milliarde Mailboxen einiger der größten Netzbetreiber weltweit. Dabei nutzt die Vereinigung die Fachkenntnis und Erfahrung ihrer weltweiten Mitglieder, um mithilfe von Technologie, Zusammenarbeit und Ordre public gegen den Missbrauch bereits bestehender Netzwerke und neuer Dienste vorzugehen. Sie informiert darüber hinaus Entscheidungsträger weltweit über technische und operative Probleme im Zusammenhang mit Online-Missbrauch und Messaging. Die M3AAWG hat ihren Hauptsitz in San Francisco im US-Bundesstaat Kalifornien und wird durch die Anforderungen des Marktes gelenkt und von den führenden Netzwerkbetreibern und Providern von Messaging-Diensten unterstützt. M3AAWG Board of Directors: AT&T; CenturyLink; Cloudmark, Inc.; Comcast; Endurance International Group; Facebook; Google; LinkedIn; Mailchimp; Microsoft Corp.; Orange; Return Path; SendGrid, Inc.; Charter Communications; Vade Secure; und Yahoo! Inc. M3AAWG Full Members:1&1 Internet AG; Adobe Systems Inc.; Agora, Inc.; AOL; Campaign Monitor Pty.; Cisco Systems, Inc.; CloudFlare; Dyn; Exact Target, Inc.; IBM, iContact; Internet Initiative Japan; Liberty Global; Listrak; Litmus; MAPP Digital; Sparkpost; Mimecast; Nominum, Inc.; Oracle Marketing Cloud; OVH; PayPal; Proofpoint; Rackspace; Spamhaus; Sprint; Symantec und USAA.


SAN FRANCISCO, CA--(Marketwired - Feb 23, 2017) - Michael « Mick » Moran, qui a aidé à sauver des milliers d'enfants victimes de matériel pédopornographique depuis qu'il a commencé à travailler sur le terrain en 1997, a défié l'industrie de l'Internet de faire plus pour protéger des enfants innocents, alors qu'il recevait aujourd'hui le prix M3AAWG Mary Litynski. Moran, directeur adjoint de la Division des communautés vulnérables d'INTERPOL a, lors de la 39e réunion générale du Groupe de travail portant sur la messagerie, les logiciels malveillants et la lutte contre les abus par voie mobile, été honoré pour son engagement personnel dans ce travail difficile et pour avoir encouragé la coopération internationale pour lutter contre l'exploitation en ligne. Le Prix M3AAWG Mary Litynski récompense les réalisations des personnes dont le travail a contribué de façon significative à la sécurité de la communauté en ligne. Dans sa présentation d'acceptation et dans une vidéo du M3AAWG diffusée sur YouTube, Moran a mis en relief certaines des stratégies changeantes dans la lutte contre le matériel pédopornographique et a offert des suggestions sur la façon dont l'industrie peut mieux protéger ses réseaux. Jusqu'à il y a quelques années, le traitement du matériel pédopornographique était fondamentalement une entreprise commerciale dont les photos ou films étaient largement diffusés en ligne. Mais les efforts de l'industrie, tels que le contrôle du flux de spam utilisé pour faire circuler des liens vers ces matériaux, l'ont largement éconduit du Web ouvert et vers les courriels privés, le stockage sur le nuage et les événements en direct, explique M. Moran. « Jusqu'à 95 % du matériel pédopornographique est aujourd'hui échangé à l'identique, sans qu'aucune monnaie ne change de mains, la monnaie réelle étant la douleur des enfants. Mais chaque image, chaque film, implique un véritable enfant et à INTERPOL, nous sommes devenus très centrés sur les victimes. Nous nous éloignons du travail superficiel consistant à arrêter quelqu'un pour possession ou distribution et pensons maintenant à ce que nous pouvons faire, en tant que force de l'ordre, pour identifier cet enfant et arrêter ainsi l'abus », a-t-il dit. À partir de cette stratégie centrée sur l'enfant, la base de données internationale sur l'exploitation sexuelle des enfants est utilisée pour identifier et localiser les victimes. INTERPOL maintient l'ICSE, qui relie cinquante pays et leur fournit des informations actualisées sur les enfants vulnérables. Les données de l'ICSE aident à identifier une moyenne de six victimes par jour dans le monde dont l'âge, selon M. Moran, va des nourrissons aux pré-adolescents. S'agissant de la façon dont l'industrie peut mieux protéger cette population vulnérable, M. Moran a déclaré : « À mon avis, quiconque possède un réseau porte la responsabilité de s'assurer qu'il n'est pas utilisé par de mauvais acteurs. Je dirais que vous faites preuve de négligence si, en tant qu'administrateur système, vous permettez aux agresseurs d'enfants d'utiliser votre système. « Pourquoi pouvez-vous scanner vos systèmes pour détecter les logiciels malveillants mais n'analysez-vous pas les matériaux d'abus envers les enfants? Pourquoi vous assurer que vous ne laissez pas de relais ouverts sur vos serveurs de messagerie, mais ne pas vous assurer que ces serveurs ne sont pas utilisés pour transmettre ou stocker du matériel d'abus d'enfant? Bien qu'il existe quelques grandes entreprises qui gèrent cette question d'une manière responsable, pour une entreprise qui le fait, il en existe dix, quinze ou vingt qui ne font pas », a-t-il dit. M. Moran a également exhorté l'industrie à renforcer la sécurité dans les nouvelles plates-formes et les applications depuis la phase de conception initiale. « Nous devons reconnaître que les personnes malveillantes abuseront de nouveaux services dès que ceux-ci sont en ligne. Si nous pensons à cela lors de l'étape du codage, il sera possible d'arrêter l'exploitation dès le début », a-t-il déclaré. Des salles de discussion au nuage Moran a commencé sa carrière dans l'application de la loi dans la Garda Síochána, la police d'Irlande, à laquelle il est affilié. Il est détaché auprès d'INTERPOL depuis 10 ans et est stationné à Lyon, en France, où est basée sa division des communautés vulnérables. Moran a commencé à travailler contre le matériel pédopornograpique dans les premières salles de discussion IRC, suivant les agresseurs alors qu'ils s'orientaient vers le Web et d'autres technologies pour distribuer des matériaux. Au fil des ans, il a apporté son soutien et son expertise aux organisations privées sur le terrain et à d'autres organismes d'application de la loi à l'échelle mondiale, en forgeant une communauté internationale qui coopère au sauvetage des enfants exploités, et il s'exprime souvent sur ce sujet, à la fois devant des professionnels et devant le grand public. En annonçant le prix, Michael Adkins, président du M3AAWG, a déclaré : « Nous reconnaissons les efforts inlassables de Michael au cours des vingt dernières années pour protéger ces victimes tout en travaillant dans un domaine très exigeant, son engagement à protéger leur dignité et sa volonté de protéger autant d'enfants que possible. Mais ce prix est aussi un appel au réveil pour l'industrie. Nous devons tous suivre l'exemple de Mick et assumer la responsabilité de ce problème de société. Nous avons tous besoin de faire plus pour le garder hors de nos systèmes et réseaux. » Le prix 2017 a été présenté lors de la 39ème Assemblée Générale du M3AAWG, qui s'est ouverte le 20 février à San Francisco. Plus de 500 experts en sécurité, FAI, chercheurs, représentants des politiques publiques et fournisseurs participent à la réunion de quatre jours qui regroupe plus de 50 séances sur la cybersécurité et l'échange d'informations. Le M3AAWG tient trois réunions chaque année dont une en Europe, afin développer les meilleures pratiques et autres travaux qui protégeront les utilisateurs en ligne. La prochaine réunion du M3AAWG se tiendra du 12 au 15 juin à Lisbonne, au Portugal. À propos du M3AAWG (Groupe de travail portant sur la messagerie, les logiciels malveillants et la lutte contre les abus par voie mobile) Le Groupe de travail portant sur la messagerie, les logiciels malveillants et la lutte contre les abus par voie mobile (M3AAWG) rassemble les acteurs du secteur pour lutter ensemble contre les bots, les logiciels malveillants, les spams, les virus, les attaques par déni de service et d'autres cas de cyberexploitation. Le M3AAWG (www.m3aawg.org) représente plus d'un milliard de boîtes de réception appartenant à certains des plus grands opérateurs de réseaux du monde. Le groupe s'appuie sur le sérieux et l'expérience de ses membres à travers le monde pour s'attaquer aux abus sur les réseaux existants et au sein des nouveaux services émergents en exploitant la technologie, la collaboration et les politiques publiques. Ce dernier se consacre également à la sensibilisation des décideurs mondiaux aux questions techniques et opérationnelles liées à l'abus en ligne et à la messagerie. Basé à San Francisco, en Californie, le M3AAWG est axé sur les besoins du marché et soutenu par des grands opérateurs de réseau et des fournisseurs de messagerie. Conseil d'Administration du M3AAWG : AT&T, CenturyLink, Cloudmark, Inc., Comcast, Endurance International Group, Facebook, Google, LinkedIn, Mailchimp, Microsoft Corp., Orange, Return Path, SendGrid, Inc., Charter Communications, Vade Secure et Yahoo! Inc. Membres à part entière du M3AAWG : 1&1 Internet AG, Adobe Systems Inc., Agora, Inc., AOL, Campaign Monitor Pty., Cisco Systems, Inc., CloudFlare, Dyn, Exact Target, Inc., IBM, iContact, Internet Initiative Japan, Liberty Global, Listrak, Litmus, MAPP Digital, Sparkpost, Mimecast, Nominum, Inc., Oracle Marketing Cloud, OVH, PayPal, Proofpoint, Rackspace, Spamhaus, Sprint, Symantec et USAA. Une liste complète des membres est disponible à l'adresse https://www.m3aawg.org/about/roster.


Die Auszeichnung wurde am 25. Oktober im Rahmen der viertägigen 38. Hauptversammlung der M3AAWG in Paris bekanntgegeben. Die „Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG)” (Arbeitsgruppe zur Missbrauchsbekämpfung bei Mitteilungen, Schadware und Mobilfunk) verleiht die Auszeichnung jährlich, um einen „unbesungenen Helden” auszuzeichnen, der hinter den Kulissen arbeitet, um das Internet und die Endnutzer zu schützen. „Beide Leistungen wurden von der Gemeinschaft zur Missbrauchsbekämpfung als wertvolle Instrumente im Kampf gegen Spams und andere Formen der Cyber-Kriminalität weithin anerkannt. Das Operation Safety-Net (Betriebssicherheit im Netz) verschafft den allgemeinen und nicht technisch orientierten Nutzern Zugang zu Cyber-Sicherheit, indem der komplizierte Fachjargon hinsichtlich der Sicherheit unserer Geräte verständlich gemacht wird, und das Anti-Spam-Gesetz, das unter der Bezeichnung CASL bekannt ist, hat die Anzahl der Spam-E-Mails in Kanada und weit darüber hinaus drastisch reduziert. Keines dieser Projekte wäre ohne Andre Leducs Liebe zum Detail, ohne seinen engagierten Einsatz, der die Erwartungen weit übertraf, und ohne seine beharrliche Führung erfolgreich gewesen”, sagte Michael Adkins, Chairman of the Board von M3AAWG. Operation Safety Net (Operation Sicheres Netz) für Unternehmen, Behörden und Endnutzer Operation Safety Net -- Best Practices to Address Online, Mobile, and Telephony Threats ist ein 76 Seiten umfassender Bericht, der von Sicherheitsexperten auf der ganzen Welt geschrieben wurde und aktuelle Probleme der Cyber-Sicherheit beschreibt, denen Unternehmen, Behörden und Endnutzer ausgesetzt sind und in dem bewährte Methoden zum Schutz gegen diese Bedrohungen beschrieben werden. Leduc war bei diesem Projekt, das ursprünglich von der Organisation für wirtschaftliche Zusammenarbeit und Entwicklung angefordert wurde, federführend und stellte das eingereichte Material zu einem zusammenhängenden Bericht zusammen. Leduc sagte, „Die Übersetzung unser Fach- und Ingenieursprache in eine allgemein verständliche Sprache war vermutlich der wichtigste Teil der Arbeit. Wir wollten einen Bericht erstellen, den ein Sicherheitsbeauftragter oder ein Ingenieur Kollegen oder dem Management geben kann, damit sie besser verstehen, was Cyber-Kriminalität ist und warum ihr Unternehmen betroffen sein könnte. Wir wollten es auch Entscheidern in der Politik – sowohl in Industrie- als auch in Entwicklungsländern – erleichtern, die über nicht so viel fachliche Erfahrung verfügen, um handeln zu können.” Der Bericht wurde ursprünglich 2012 erstellt, dann 2015 aktualisiert. Die neueste Ausgabe behandelt Malware und Botnets, Phishing und Social Engeneering, Missbrauch des Internetprotokolls und des Domain Name System (DNS sowie Bedrohungen bei Mobilfunk, Voice over IP (VOIP) und Telefonie.. Der Bericht wurde ursprünglich auf Englisch veröffentlicht, wurde mittlerweile ins Französische und Spanischeübersetzt und erreicht einen Großteil der Weltbevölkerung. Der Bericht steht in diesen Sprachen unter www.m3aawg.org unter „Best Practices“ zur Verfügung. CASL verlangt, dass Marketing-Treibende, bevor sie kommerzielle Mitteilungen verschicken, die Erlaubnis der Nutzer einholen – ein Verfahren, das als „Opt-in” bezeichnet wird und im Kampf gegen Missbrauch und Spams effektiver ist. Nach dem Gesetz ist es beispielsweise erforderlich, dass Nutzer sich freiwillig bei einer Mailing-Liste registrieren lassen oder dass eine Geschäftsbeziehung zu einem Unternehmen besteht, bevor Marketing-Treibende entsprechendes Material per E-Mail schicken dürfen. Da das CASL für alle Mitteilungen gilt, die an Nutzer in Kanada geschickt werden, einschließlich solcher, die von anderen Ländern aus verschickt werden, hat es international zur freiwilligen Übernahme des Opt-in-Verfahrens beigetragen. Das Volumen an Spam in kanadischen Netzwerken ist seit Inkrafttreten des CASL-Gesetzes um mehr als ein Drittel zurückgegangen. Wir haben auch festgestellt, dass sich Absender in Ländern in unserem Süden, in ganz Europa und selbst in Asien an unser Gesetz halten. Viele internationale Versender erhalten nun Einverständniserklärungen vor dem elektronischen Versand kommerzieller Mitteilungen an unsere Nutzer”, sagte Leduc. Über die Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) Die Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) ist die Schnittstelle, an der die Branche zusammenkommt, um gemeinsam gegen Bots, Malware, Spam, Viren, Denial-of-Service-Attacken und andere Online-Angriffe vorzugehen. Die Mitglieder der M3AAWG (www.M3AAWG.org) repräsentieren über eine Milliarde Mailboxen einiger der größten Netzbetreiber weltweit. Dabei nutzt die Vereinigung die Fachkenntnis und Erfahrung ihrer weltweiten Mitglieder, um mithilfe von Technologie, Zusammenarbeit und Ordre public gegen den Missbrauch bereits bestehender Netzwerke und neuer Dienste vorzugehen. Sie informiert darüber hinaus Entscheidungsträger weltweit über technische und operative Probleme im Zusammenhang mit Online-Missbrauch und Messaging. Die M3AAWG hat ihren Hauptsitz in San Francisco im US-Bundesstaat Kalifornien und wird durch die Anforderungen des Marktes gelenkt und von den führenden Netzwerkbetreibern und Providern von Messaging-Diensten unterstützt. M3AAWG Board of Directors: AT&T gehandelt bei NYSE unter dem SymbolT; CenturyLink gehandelt bei NYSE unter dem Symbol CTL; Cloudmark, Inc.; Comcast gehandelt bei NASDAQ unter dem Symbol CMCSA; Facebook; Google; LinkedIn; Message Systems; Mailchimp; Microsoft Corp.; Orange gehandelt bei NYSE unter dem Symbol Euronext ORA; Return Path; SendGrid, Inc.; Charter Communications; Vade Secure; und Yahoo! Inc. M3AAWG Full Members:1&1 Internet AG; Adobe Systems Inc.; Agora, Inc.; AOL; Campaign Monitor Pty.; Cisco Systems, Inc.; CloudFlare; Dyn; Exact Target, Inc.; IBM, iContact; Internet Initiative Japan traded on NASDAQ with symbols IIJ and IIJI; Liberty Global; Listrak; Litmus; MAPP; McAfee Inc.; Mimecast; Nominum, Inc.; Oracle Marketing Cloud; OVH; PayPal; Proofpoint; Rackspace; Spamhaus; Sprint; und Symantec.


"¿Por qué escanea sus sistemas para encontrar malware y no escanea para encontrar materiales de abuso infantil? ¿Por qué se asegura de que no está dejando ninguna transmisión de información abierta en su servidor de correo electrónico, pero no se asegura de que esos servidores no estén siendo utilizados para transmitir o almacenar material de abuso infantil? Aunque hay algunas empresas grandes que manejan este asunto de una manera madura, por cada una que lo hace, hay diez, quince o veinte que no lo hacen", dijo. M3AAWG, Junta Directiva: AT&T; CenturyLink; Cloudmark, Inc.; Comcast; Endurance International Group; Facebook; Google; LinkedIn; Mailchimp; Microsoft Corp.; Orange; Return Path; SendGrid, Inc.; Charter Communications; Vade Secure; y Yahoo! Inc. M3AAWG, miembros plenos: 1&1 Internet AG; Adobe Systems Inc.; Agora, Inc.; AOL; Campaign Monitor Pty.; Cisco Systems, Inc.; CloudFlare; Dyn; Exact Target, Inc.; IBM, iContact; Internet Initiative Japan; Liberty Global; Listrak; Litmus; MAPP Digital; Sparkpost; Mimecast; Nominum, Inc.; Oracle Marketing Cloud; OVH; PayPal; Proofpoint; Rackspace; Spamhaus; Sprint; Symantec; y USAA.


BARCELONA, SPAIN--(Marketwired - March 01, 2017) - MOBILE WORLD CONGRESS -- This week at Mobile World Congress 2017, VMware Inc. ( : VMW) is demonstrating the company's leadership driving the digital transformation of telecom, cable and mobile operators into agile service providers. Through VMware's unified software-defined architecture spanning Network Functions Virtualization (NFV), Mobility and the Internet of Things (IoT), global communications service providers (CSPs) can benefit from potential new revenue streams with sustainable cost reductions, increased flexibility and security and a modernized network that is 5G and Internet of Things (IoT) ready. VMware's complete portfolio of solutions for CSPs is on display this week in Hall 3 Stand 3K10. Today, CSPs must balance high customer expectations with business challenges such as increased competition and cost, lack of service differentiation, and new business models. They must simultaneously look internally at how they build their networks for both today and tomorrow, while looking externally for new service opportunities. Over-the-Top (OTT) providers have the benefit of speed and agility to deliver new high margin services without having the constraints of network build-out costs, eroding revenue and creating customer churn. On the horizon, 5G networks represent the next major wave of mobile infrastructure upgrades. Accelerating capacity demands from high-bandwidth services such as video and virtual reality, coupled with the distributed nature of infrastructure components in IoT, could significantly impact the reliability, performance and quality of experience delivered to subscribers if networks are not architected correctly. For CSPs' business customers, mobile computing presents new management and security challenges, creating an opportunity for new managed services offerings. VMware is a proven, strategic software innovator that is helping CSPs successfully deliver new services faster and improve overall customer satisfaction, while driving down costs. With VMware Cross-Cloud Architecture™ combined with virtual network functions (VNFs) and applications from a rich ecosystem of partners, global CSPs are delivering services such as VoLTE, IMS, enterprise SD-WAN, mobility and workspace management, as well as IoT services for connected cars, smart stadiums and cities. VMware's ETSI-compliant NFV platform enables network modernization so CSPs can deliver differentiated services today, with 5G readiness for the future. CSPs partner with VMware to deliver Enterprise Mobility Management and Digital Workspace services to customers across multiple mobile and desktop platforms. On the IoT front, VMware helps CSPs maximize the opportunity by streamlining how they deploy, manage, monitor, and secure IoT infrastructure. "In the fast-evolving technology landscape, continued success and growth for Telcos and CSPs depends on transforming from connectivity providers to innovators in delivering rich services, content and personalized experiences," said Shekar Ayyar, executive vice president and General Manager, Telco Group at VMware. "Software-defined, virtualized architectures are the catalysts helping service providers modernize their networks, making them 5G ready, and opening their businesses to new possibilities. With VMware's software-defined architecture for NFV, Mobility, and IoT, CSPs can accelerate service innovation, improve operations and management, and deliver a range of scalable and secure mobile applications and services." Foundation for Network Transformation and Modernization -- VMware vCloud NFV With more than 80 NFV deployments by more than 45 CSPs serving more than 300 million subscribers worldwide, VMware vCloud® NFV™ accelerates service innovation and delivery, reduces costs, and simplifies network operations. The vCloud NFV platform enables organizations to deploy a multi-vendor and multi-function NFV platform today that delivers service automation, secure multi-tenancy, operations management and carrier grade reliability with 5G readiness. To date,34 VNFs have been certified as VMware Ready for NFV, with many being deployed in production customer environments today. By deploying vCloud NFV platform, CSPs can build, provision and sell new services in days instead of months, positively influence customer quality of experience, and significantly improve OPEX and CAPEX. Open standards and open source will play a major role in defining the future architectures upon which CSPs deliver services. With VMware Integrated OpenStack, the vCloud NFV platform supports an open architecture for integration and interoperability. Additionally, VMware is a leader of many leading open source initiatives. VMware recently joined AT&T, China Mobile and the world's leading operators as a founding member of the Open Network Automation Platform (ONAP) Project. ONAP comes from the merger of open source ECOMP and Open Orchestrator Project (OPEN-O), two of the largest open source networking initiatives, to create a harmonized and comprehensive framework for real-time, policy-driven software automation of virtual network functions that will enable software, network, IT and cloud providers and developers to rapidly create new services. VMware is also a major participant in OpenStack, Open vSwitch and Open Source MANO (OSM). Read the press release about the launch of VMware vCloud NFV 2.0 Driving Revenue through Enterprise Mobility Management and Digital Workspace Services VMware enables CSPs to offer a range of enterprise mobility services for customers at all stages of the mobility lifecycle. Carriers resell VMware AirWatch®, the leader in Enterprise Mobility Management, and offer AirWatch as a managed services solution through the VMware vCloud Air™ Network Program. AirWatch enables management and security of a broad array of customer devices, including BYO devices and those sold by the CSP, and enables enterprise collaboration services such as email and file sharing that drive data plan usage. CSPs are increasingly adding Digital Workspace services through VMware Workspace™ ONE™, which optimizes mobile user productivity and convenience by enabling an "any app, any device" experience. By offering all applications -- mobile, web, Windows (including Windows 10), virtual, or cloud -- through a single app portal with identity integration for single sign-on, carriers can further maximize revenue from enterprise data usage, software resale and services opportunities. VMware helps CSPs develop a portfolio of professional services that include consultative/strategic, deployment, support, and managed services offerings. Read this news about the launch of new AirWatch Managed Services Cost-Effective, Scalable IoT from the Edge to the Cloud VMware helps CSPs maximize the opportunity for IoT internally, and with customers, by streamlining how they deploy, manage, monitor, and secure IoT infrastructure. VMware supports customers across the entire IoT value chain -- things, edge, data, network, applications, and users -- with secure, enterprise-grade, end-to-end operations management and infrastructure solutions for IoT. With VMware, customers can manage across millions of things easily, operate smarter with an accurate health of all things and innovate faster by speeding up delivery of IoT use cases. Read this news about VMware and HARMAN's partnership in IoT Analyst, Partner and Customer Commentary "VMWare is addressing the need of CSPs to serve more use cases for more customer types, all while integrating and unifying the underlying network and datacenter infrastructure. At the very least, this transformed infrastructure has to accommodate cloudification and simplified management. Due to the increasing demand for customized, targeted services, CSPs need to be able to bring those services to market quickly, manage them more efficiently, and provide them across a growing number of devices and networks." - Andy Hicks, Research Director, IDC EMEA Telecommunications Group "IIJ has deployed VMware virtualized infrastructure and management in production across our network services, cloud service and IT environments. Collaborating with VMware, we delivered the IIJ Omnibus Service to transform the economics our CPE-based services. VMware Cross-Cloud Architecture enables us to implement a unified, multi-service platform that simplifies ongoing operations management and delivers the agility to adapt quickly to new service opportunities." - Shinri Kimura, General Manager, Service Infrastructure Division, Internet Initiative Japan Inc. "The corporate market is a growth segment for M1, and we have continually enhanced our offerings to better serve these customers through our connectivity solutions and cloud-based data center. Our next-generation platform powered by VMware NSX®, enables us to create a complete network and security virtualization platform, with advanced security capabilities that enable enterprises seeking scalability and better performance." - Mr. Willis Sim, Chief Corporate Sales and Solutions Officer, M1 Limited "As Singapore's first fully integrated info-communications company, StarHub is focused on empowering its customers with world-class information, communication and entertainment services. Virtualizing our critical applications with VMware has enabled StarHub to deliver a more agile and flexible infrastructure that responds faster to dynamic business demands. Hardware resources are better optimized, achieving significant savings without compromising application performance. Applications can be easily moved across servers, providing higher availability and scalability resulting in a seamless and better customer experience." - John Tan, Chief Information Officer, StarHub "As communications service providers undertake massive digital transformation initiatives, they are increasingly investing in modern network architectures, applications and connectivity. We see this as a huge opportunity to offer CSPs a unique combination of scalable solutions to meet their needs. As the de facto industry standard in virtualization, VMware will continue to be strategic in helping to grow our partners' capabilities and portfolio of offerings." - Jay Snyder, Senior Vice President, Global Alliances, Service Providers and Industries, Dell EMC. "Atos and VMware are collaborating to drive network modernization through NFV adoption, which will result in reduced costs and improved agility for CSPs. Together with other industry leaders, we are building a global multi-vendor NFV Laboratory in Grenoble, France focused on testing, validating and demonstrating mission critical NFV services and simulate real-world NFV scenarios. The NFV Laboratory will work with multiple VNF providers to understand and optimize network and business performance based on known and measured performance." - Paul Davey, CTO, Atos About VMware VMware, a global leader in cloud infrastructure and business mobility, helps customers accelerate their digital transformation. VMware enables enterprises to master a software-defined approach to business and IT with VMware Cross-Cloud Architecture™ and solutions for the data center, mobility, and security. With 2016 revenue of $7.09 billion, VMware is headquartered in Palo Alto, CA and has over 500,000 customers and 75,000 partners worldwide. VMware, Cross-Cloud Architecture, vCloud, vCloud NFV, VMware Ready, AirWatch, vCloud Air, vCloud Air Network, VMware Workspace, and Workspace ONE are registered trademarks or trademarks of VMware, Inc. or its subsidiaries in the United States and other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.


News Article | November 4, 2016
Site: globenewswire.com

TOKYO, Nov. 04, 2016 (GLOBE NEWSWIRE) -- Internet Initiative Japan Inc. ("IIJ") (NASDAQ:IIJI) (TSE1:3774) has revised its first half (“1H16”, from April 1, 2016 to September 30, 2016) and full-year (“FY2016”, from April 1, 2016 to March 31, 2017) financial targets for the fiscal year ending March 31, 2017 from the targets announced on May 13, 2016 based on the recent financial performance. The dividend targets remain unchanged from what we announced on May 13, 2016: annual cash dividend JPY27.00 per ordinary share. The distribution of the interim dividend was resolved today by the IIJ’s Board of Directors as JPY13.50 per ordinary share.1 1. Revision for the Consolidated Financial Targets for 1H16 (From April 1, 2016 to September 30, 2016) 2. Revision for the Consolidated Financial Targets for FY2016 (From April 1, 2016 to March 31, 2017) With regards to the overall 1H16 business situation, while strong revenue growth is achieved as initially expected (13.5% increase from 1H15), 1H16 operating income is expected to be weaker than initially expected. It is because the issues written below took place when the overall cost such as personnel-related costs including outsourcing personnel as well as depreciation related to the commencement of new services are increasing with aggressive business investment. 1H16 total revenues are expected to slightly exceed our initial expectation. 1H16 network services revenue is expected to exceed our initial expectation as mobile-related services continued to grow. 1H16 systems integration revenue is expected to be slightly weaker than initially expected mainly because of the cancellation for certain relatively large systems operation and maintenance projects in 1Q16. ATM operation business revenue is growing as initially expected. 1H16 operating income is expected to be approximately JPY0.9 billion weaker than initially expected. This is mainly due to the deterioration of systems integration gross margin, resulting mainly from the followings: 1H16 systems integration gross margin is expected to decrease year over year as shown in the below summary chart. On the other hand, network services gross margin is expected to increase year over year. 1H16 income before tax income tax expense as well as 1H16 net income attributable to IIJ are expected to be weaker than initially expected as 1H16 operating income is expected to be weak as mentioned above. 1H16 income tax before income tax expense is expected to be larger than 1H16 operating income as there would be net gain on sales of other investments, distribution from fund investment and dividend income. With regards to the overall business situation for FY2016, the low productivity of systems engineers is expected to improve in 2H16 based on the current SI projects situation. However, based on the current order accumulation situation, we would miss the revenue targets of new services, launched later last year, such as “IIJ GIO Infrastructure P2” and “IIJ Omnibus” which should increase but not as strongly as our initial expectation. Since the depreciation for these new services have already begun from the latter half of last fiscal year, the revenue gap will directly impact our operating income against our initial expectation. Because Japanese companies are conservative with their systems, especially with large, complex and mission-critical ones, the lead time, including their internal discussion and preparation, takes longer than expected. Also, some new services and functions were not launched as scheduled. Another issue that would impact our operating income against our initial expectation is the cost related to mobile services. We increased leasing MVNO bandwidth largely during 2Q16 along with increasing traffic trend in order to strengthen our competitive advantage; therefore, this recurring type cost for MVNO infrastructure would exceed our initial expectation in 2H16. Although the excessive cost is not expected to become larger in 2H16 and the gross margin amount of mobile services is expected to increase year over year, it would continue to impact our network services’ profitability against initial expectation. FY2016 total revenues are expected to be JPY158.0 billion (12.3% increase from FY2015 total revenue). FY2016 network services revenue is expected to be in line with our initial expectation: mobile-related services exceeding our initial expectation, weaker than initially expected revenue growth of “IIJ GIO Hosting Package Service” from 1H16 because of game customers’ decrease in revenue and/or cancellation, and weaker than initially expected revenue growth in “IIJ Omnibus Services”. FY2016 systems integration revenue is expected to be approximately JPY1.0 billion short of our initial expectation because of the weaker than expected revenue growth of systems operation and maintenance from 1H16 and the weaker than expected revenue growth of “IIJ GIO Infrastructure P2”. FY2016 operating income is expected to be JPY5.0 billion (18.6% decrease from FY2015 operating income), JPY2.3 billion weaker than our initial expectation, is mainly due to the followings: We believe our targeted markets should continuously expand with Japanese enterprises’ IT systems becoming more advanced by adopting cloud services, usage of ICT becoming more prevalent with BigData and IoT, greater demands for security-related services and solutions to combat information leakage and many other security incidents, explosion of network traffic along with distribution of high-definition contents such as 4K over Internet, and expansion of MVNO market especially for consumers and so on. In order to capture these market opportunities and achieve sustainable growth, we have been engaging in service and business developments as well as R&D activities as we firmly believe these are indispensable for us to maintain our competitive advantage of renowned expertise about Internet-related technology. We launched “IIJ Omnibus Service” and “IIJ GIO Infrastructure P2” in the latter half of last fiscal year. We have also started to further focus on implementing full-MVNO, developing new services and/or functions in the field of IoT, security and contents distribution. As we strengthen our competitive advantage by developing all these necessary components, we acquired local government large-scale multiple-year project with its monthly recurring revenue expected to become over JPY100 million in which cloud, security, system and network are mostly outsourced. We anticipate the same type of transactions to increase It is obvious that cloud, IoT and mobile markets are to expand in the middle-to-long term. Although our FY2016 income level is to be weak temporarily, we shall execute our business expansion strategy accordingly with our middle term plan2. We expect income to improve from FY2017 with improved productivity of systems engineers from 2H16, revenue accumulation by new services, and improved network utilization with mobile service subscription accumulation. Although operating income level is expected to be 1 or 1.5 years delayed from what we initially expected at the beginning of this fiscal year, we believe strong revenue would generate continuous operating margin improvement. Therefore, dividend targets remain unchanged from what we announced in May 2016 and we also decided and announced that we will execute repurchase of our own shares3. Regarding FY2016 revised operating income target compared with FY2015 operating income result and FY2016 initial operating income target, please visit IIJ's following IR website. Page 6 of the document shows the comparison. http://www.iij.ad.jp/en/ir/news/2016/pdf/FY16revision_E.pdf. < Note 1 > The above 1H16 and FY2016 consolidated financial targets as well as the business outlook are based on information available as well as reasonable assumption at the time of this announcement. The actual results may differ from the targets and the business outlook due to various factors. 1H16 financial consolidated financial results will be announced on November 8, 2016. < Note 2 > Regarding the basic net income attributable to IIJ per share for the fiscal year ending March 31, 2017 disclosed in this document, it is calculated based on the assumption that 950,000 shares of IIJ’s own shares to be repurchased by us during the period disclosed in our disclosure titled “Notice Regarding Repurchase of Own Shares of Internet Initiative Japan Inc.” which was announced today, November 4, 2016. < About Internet Initiative Japan Inc. > Founded in 1992, IIJ is one of Japan's leading Internet-access and comprehensive network solutions providers. IIJ and its group companies provide total network solutions that mainly cater to high-end corporate customers. IIJ's services include high-quality Internet connectivity services, systems integration, cloud computing services, security services and mobile services. Moreover, IIJ has built one of the largest Internet backbone networks in Japan that is connected to the United States, the United Kingdom and Asia. IIJ listed on the U.S. NASDAQ Stock Market in 1999 and on the First Section of the Tokyo Stock Exchange in 2006. Statements made in this press release regarding IIJ’s or management’s intentions, beliefs, expectations, or predictions for the future are forward-looking statements that are based on IIJ’s and managements’ current expectations, assumptions, estimates and projections about its business and the industry. These forward-looking statements, such as statements regarding FY2016 revenues and operating and net profitability, are subject to various risks, uncertainties and other factors that could cause IIJ’s actual results to differ materially from those contained in any forward-looking statement. These risks, uncertainties and other factors include: IIJ’s ability to maintain and increase revenues from higher-margin services such as systems integration and outsourcing services; the possibility that revenues from connectivity services may decline substantially as a result of competition and other factors; the ability to compete in a rapidly evolving and competitive marketplace; the impact on IIJ's profits of fluctuations in costs such as backbone costs and subcontractor costs; the impact on IIJ's profits of fluctuations in the price of available-for-sale securities; the impact of technological changes in its industry; IIJ’s ability to raise additional capital to cover its indebtedness; the possibility that NTT, IIJ’s largest shareholder, may decide to exercise substantial influence over IIJ; and other risks referred to from time to time in IIJ’s filings on Form 20-F of its annual report and other filings with the United States Securities and Exchange Commission. 1 For detail, please refer to our press release titled “IIJ Announces the Distribution of Retained Earnings (Interim Dividend)” which was announced today. 2 We disclosed in our earnings release for the fiscal year ended March 31, 2016 which was announced on May 13, 2016 and filed with 6-K. For detail, please find the release here http://www.iij.ad.jp/en/ir/library/financial/pdf/IIJI4Q15E.pdf 3 Please refer to our press release “Notice Regarding Repurchase of Own Shares of Internet Initiative Japan Inc.” issued today for detail.


News Article | November 4, 2016
Site: globenewswire.com

TOKYO, Nov. 04, 2016 (GLOBE NEWSWIRE) -- Internet Initiative Japan Inc. ("IIJ") (NASDAQ:IIJI) (TSE1:3774) announced that IIJ’s Board of Directors today resolved upon the interim dividend to be paid from retained earnings to shareholders on the record date of September 30, 2016, as indicated below. IIJ’s basic policy for the return to shareholders is to maintain stable and continuous dividends to shareholders while giving full consideration to securing its funds to strengthen its financial position and to prepare for its operation and business development. Considering this basic policy, IIJ decided to pay JPY13.50 per common share as interim dividend as disclosed before. Founded in 1992, IIJ is one of Japan's leading Internet-access and comprehensive network solutions providers. IIJ and its group companies provide total network solutions that mainly cater to high-end corporate customers. IIJ's services include high-quality Internet connectivity services, systems integration, cloud computing services, security services and mobile services. Moreover, IIJ has built one of the largest Internet backbone networks in Japan that is connected to the United States, the United Kingdom and Asia. IIJ listed on the U.S. NASDAQ Stock Market in 1999 and on the First Section of the Tokyo Stock Exchange in 2006. The statements within this release contain forward-looking statements about our future plans that involve risk and uncertainty. These statements may differ materially from actual future events or results. Readers are referred to the documents furnished by Internet Initiative Japan Inc. with the SEC, specifically the most recent reports on Forms 20-F and 6-K, which identify important risk factors that could cause actual results to differ from those contained in the forward-looking statements.

Loading Internet Initiative Japan collaborators
Loading Internet Initiative Japan collaborators