Featured Blogs

Latest

Domain Abuse: Are We Speaking the Same Language?

For those of us in the domain name industry, it's clear that security threats and the way we track, report, and mitigate them has been a topic of increased discussion and focus in recent months. As we prepare to come together as a community again at the next ICANN public meeting in Marrakech, many of us will look to continue these conversations, as there is no doubt it is a topic of importance, relevance and urgency for our community at this time. more

Thoughts on Libra

Facebook has announced its Libra cryptocurrency. This is good news for cryptocurrencies and market-incentivized networks. I worry that Libra's financial inclusion might come with an attendent loss of privacy or autonomy. After months of speculation, Facebook on Tuesday announced Libra, a cryptocurrency with the mission of enabling a simple global currency and financial infrastructure that empowers billions of people. more

Havana Can Have 5G Before Miami

Compared to Miami, Havana is an Internet desert, but Havana may have 5G wireless connectivity before Miami. 5G architecture, US politics and policy, and the 5G timetable favor Havana. Let's start with 5G architecture. 5G will require many "small cells" because it uses high-frequency radio signals that don't travel as far as 4G signals and are more easily blocked by obstructions like trees and buildings. more

The Start of Something Big: ICANN Announces Planning for Round Two of New gTLDs

ICANN has published a short paper in advance of its 65th meeting in Marrakech which starts on 23 June 2019. Entitled, "ICANN Org's Readiness to Support Future Rounds of New gTLDs," it describes ICANN's working assumptions for "policy implementation and operational readiness for a subsequent round of new gTLDs". The document is necessary for ICANN to move forward with essential preparations for the next round. more

WHOIS Database Download: Proactive Defense Against the Rising Tide of BEC Fraud

How many times have you heard that humans are the weakest link in cybersecurity? The headlines have proven that over and over again. In particular, business email compromise or BEC (also known as email account compromise or EAC) scams, which typically target an employee with access to the financial resources of his company -- this could be a C-level executive or any high-ranking officer -- for fraud are still on a constant uphill trend. more

Trademark Owners Beware – There’s a New Brand Identifier to Worry About

You might not understand how crypto-currencies or blockchain wallets work, but Facebook's announcement this week is a clear signal that these new technologies will soon become ubiquitous. Facebook's introduction of its own crypto-currency to its 2 billion users means mass adoption of crypto-currencies and digital wallets are on the horizon. This has implications that trademark owners need to be aware of. more

5G and the Health Scare

Having been involved in the telecommunications industry for a long time, I followed many of the discussions involving health concerns when the 3G and 4G mobile technologies were introduced. This time, with 5G, the situation is no different. Again, there are many communities worried about the potential negative health effects of the radiation that emanates from mobile communications. more

Is UN SG Guterres Driving the Bus That Macron Threw UN IGF & Multistakeholderism Under at IGF Paris?

A fresh & transparent, community-led, bottom-up, public debate has now become unavoidable and undeferrable. "....we need limited and smart regulation" were the clear and unambiguous words of UN Secretary-General Antonio Guterres at the launch of the final report of his UN Panel on Digital Cooperation last week in New York. Last November, I wrote about President Macron throwing down the gauntlet at UN IGF Paris challenging IGF and Multistakeholderism to become more relevant.  more

The UN Panel on Digital Cooperation: An Agenda for the 2020s

The UN Panel on Digital Cooperation presented last week in New York its final report, and an old question is back on the international agenda: Could the global Internet be ordered by a reasonable arrangement among stakeholders which would maximize the digital opportunities and minimize the cyber risks by keeping the network free, open and safe? more

Cuba’s New WiFi Regulations – Good, Bad or Meh?

Soon after ETECSA began rolling out WiFi hotspots for Internet access, people began linking to them from homes and community street nets. These connections and importing the WiFi equipment they used were illegal, but generally tolerated as long as they remained apolitical and avoided pornography. Regulations passed last month legalized some of this activity in a bid to boost connectivity by allowing Internet access from homes and small private businesses like restaurants and vacation rentals that are located close enough to a hotspot to establish a WiFi connection. more

Have We Reached ‘Peak Telecom’ and What Does This Mean for 5G

"Peak telecom" is described as the maximum point of expansion reached by the traditional telecommunications industry before the internet commoditized the industry to a utility pipe. I had to think of this when I read the recent outcomes of the famous Ericsson Consumer Lab survey. The company used the result of the survey to counteract market criticism regarding the viability of the telco business models in the deployment of 5G. more

Network Protocols and Their Use

In June, I participated in a workshop, organized by the Internet Architecture Board, on the topic of protocol design and effect, looking at the differences between initial design expectations and deployment realities. These are my impressions of the discussions that took place at this workshop. ... In this first part of my report, I'll report on the case studies of two protocol efforts and their expectations and deployment experience. more

As a Service?

I'm happy to have the option of buying services. It's easier to eat at a restaurant than to do my own cooking, and I'm happy to pay for a ride rather than fighting traffic on my own. However, I'm not happy if I don't have the option of cooking for myself or of taking a stroll. I used to be willing to pay for all of my phone calls but today I know that, thanks to VoIP, there is no need to. But the phone companies are attempting to wrest back control with their wider 5G agenda. more

All Domain Name Professionals – Now Is the Time for a Portfolio Review

As we move further into the summer months and the demands made upon domain professionals typically ease, now is the ideal time to review domain name portfolios. And technology solutions can greatly automate this process. Ensuring that portfolios are pared, appropriate levels of security are implemented, and domains point to relevant content are all key areas upon which to focus. more

State Department Should Return to Its Knitting

Having researched and written about the 100 year history of U.S. State Department's institutional machinations in the telecom/cyber sector, taught law school graduate courses, and worked with its bureaus and staff over the past 45 years, the latest twists and turns seem to repeat past mistakes. The fundamental problem is that the U.S. is the only country whose Foreign Ministry is given a significant role and engaged in telecom and cyber matters in global venues. more

Topics

DNS

Sponsored byDNIB.com

Threat Intelligence

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days