Featured Blogs

Latest

Shame on the Regulators

It's clear that even before the turn of this century that the big telcos largely walked away from maintaining and improving residential service. The evidence for this is the huge numbers of neighborhoods that are stuck with older copper technologies that haven't been upgraded. The telcos made huge profits over the decades in these neighborhoods and ideally should not have been allowed to walk away from their customers. more

Let’s Have an Honest Conversation About Huawei

On May 29, I attended an AEI event on "International economics and securing next-generation 5G wireless networks," with Ambassador Robert Strayer, who heads the U.S. State Department's CIP team. But the focus of the talk was not really on 5G security, international trade or 5G development. In fact, there was no constructive agenda at all. The talk was an extended attack on China and the Chinese-based telecommunications vendor Huawei – another episode in an ongoing U.S. government campaign to shut Huawei and other Chinese firms out of the U.S. market, and to convince every other country in the world to do the same. more

Domain Enforcement in a Post-GDPR World

The implementation of the General Data Protection Regulation (GDPR), and ICANN's conservative temporary policy, which favors privacy and limits registrar liability, has made domain enforcement against cybersquatters, cyber criminals and infringement more difficult, expensive and slow. With heightened concerns over privacy following high-profile breaches of consumer data and its subsequent illicit use and distribution, there is no question that consumer data protection practices would come under scrutiny. more

The Myth of 5G and Driverless Cars

A colleague sent me an article that had been published earlier this year in MachineDesign magazine that predicts that driverless cars can't be realized until we have a ubiquitous 5G network. When looking for the original article on the web I noticed numerous similar articles like this one in Forbes that have the same opinion. These articles and other similar articles predict that high-bandwidth, low-latency 5G networks are only a few years away. more

Interstate at Rush Hour ...in the Rain ...on a Friday – AKA, Your Enterprise Traffic on the Net

Congestion. Traffic. Two words that draw a visceral response, whether you are commuting to work or managing a network. Managing data traffic used to be easy. Everything was housed in centralized data centers, and all traffic was routed through big, dedicated, effective but expensive "pipes" -- Multiprotocol Label Switching (MPLS) links. When all the applications are at the data center, it makes sense to build private access for all traffic. more

Celebrating Twenty Years of the UDRP

The Uniform Domain Name Dispute Resolution Policy, commonly known as the UDRP, was first introduced on October 24, 1999, by the Internet Corporation for Assigned Names and Numbers (ICANN). The UDRP is incorporated by reference into Registration Agreements for all generic top-level domain names (gTLDs) and some country-code top-level domain names (ccTLDs). more

The Loss of a Friend

Dear colleagues and friends, it is very, very difficult to write these words. The loss of a young person is always a tragedy. The untimely loss of a friend is even worse and is always a very difficult time. The loss of a fellow Internet pioneer is like losing a brother. Tarek Kamel was a great friend of the Internet Society–Bulgaria. I remember him giving an interview for the Bulgarian public television in Yokohama during the INET 2000 meeting... more

Gartner Says SDN Has Left the Building – Say Hello to Network Automation

In their annual hype cycle on on network technologies, Gartner lists the emerging technologies and an estimate of the timeframe in which they will reach the plateau of productivity. The latest hype cycle on enterprise networking labels Software-Defined Networks (SDN) as an obsolete technology. So on the surface, it would appear that SDN is now semi-officially dead. While most natural scientists accept the Darwinian theories, the technology industry has traditionally been trying to defy evolution. more

The “Kiwi” Way of Interneting

By now, we are all exposed to the narrative of how the Internet is no longer a safe place. It is full of bots, misinformation, abuse and violence; it is a space that has been overtaken by terrorists and extremists. The Internet is weaponized to influence elections, undermine democracies, and instill fear in its users. That's the story we are told. No one can deny the swift change that is taking place in global politics. The "brave new world" that has emerged is, currently, based on isolation and fear. more

Encryption and Child Sexual Abuse Prevention

Just over one week ago, the New York Times published a major investigation into the intractable problem of illegal sexual images of minors being exchanged online. Despite flaws in the story and its companion pieces, the main take-away that Internet companies have failed to adequately address the problem has resonated widely. Prostasia Foundation too has been critical of some of the Internet platforms called out in the article. But at the same time, we need to be realistic about how much responsibility we can (or should) place on tech firms to solve this problem. more

The Crypto Wars Resume

For decades, the US government has fought against widespread, strong encryption. For about as long, privacy advocates and technologists have fought for widespread, strong encryption, to protect not just privacy but also as a tool to secure our computers and our data. The government has proposed a variety of access mechanisms and mandates to permit them to decrypt (lawfully) obtained content; technologists have asserted that "back doors" are inherently insecure. more

US Court Upholds Repeal of Net Neutrality

The DC Circuit Court of Appeals ruled on the last day of September that the FCC had the authority to kill Title II regulation and to repeal net neutrality. However, the ruling wasn't entirely in the FCC's favor. The agency was ordered to look again at how the repeal of Title II regulation affects public safety. In a more important ruling, the courts said that the FCC didn't have the authority to stop states and municipalities from establishing their own rules for net neutrality. more

Kenya’s .KE Domain Registrations Nearing 100,000 Mark, but It Can Do Better – Here’s Why

Over the years, the Kenyan Network Information Center (KeNIC) has struggled to reach the 100,000 mark in .ke Kenya country code domain registrations. Many reasons have been given for this shortfall, among them pricing, competition from generic Top-Level Domains (gTLDs) like .com and .org, and also competition from Geographic domains like the new .africa. Also, not opening up the second level for registration has been cited as one of the reasons for the low number. more

Unpublished Autobiographical Essay of Steve Lukasik on His Accomplishments at ARPA

Around 2014, as Stephen (Steve) J. Lukasik proceeded well into his 80s, he began to consider ways to capture the enormous sweep of activities and history in which he was a key figure. Indeed, that sweep was so broad and often compartmentalized, and his output so prolific, that even his closest associates only knew of slices of his accomplishments. So he began sorting through his career and produced this autobiographical essay on his accomplishments at ARPA that is being made posthumously available now. more

The Director

On Thursday, Stephen J. Lukasik passed away peacefully at the age of 88. He was the legend in a field with no peer. For nearly half a century, he shaped the development of national security and network technology developments at a level and extent that is unlikely ever to be matched. For a great many of us in that arena from the 1960s past the Millennium, he was the demanding visionary leader who set the policies and directions, framed the challenges, approved and funded the projects, and questioned the results. more

Topics

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Threat Intelligence

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days