Featured Blogs

Latest

Building a More Secure Routing System: Verisign’s Path to RPKI

At Verisign, we believe that continuous improvements to the safety and security of the global routing system are critical for the reliability of the internet. As such, we've recently embarked on a path to implement Resource Public Key Infrastructure (RPKI) within our technology ecosystem as a step toward building a more secure routing system. In this blog, we share our ongoing journey toward RPKI adoption and the lessons we've learned as an operator of critical internet infrastructure. more

Exploring Common Ground: Human Rights at ICANN

Our relationship to human rights is ambivalent. We take them for granted, we don't want to be without them, but on the other hand, we see them as somewhat abstract and aspirational, a lofty ideal easily forgotten and set aside in our daily struggles. When it comes to the digital domain, human rights are seen by many as an unwanted source of regulations in an industry that demands "unregulated innovation." more

RIPE 86 Bites: Encryption and Active Network Management

Change is hard, and the larger the system, the slower the pace of change. There are just so many systems that need to change their behaviors, and the motivations of users, vendors, service providers, content generators and many others all vary. Getting all of us to change some aspect of our technology, platform or application set is hard, if not impossible, to orchestrate such that it happens at the same time. more

12th Registration Operations Workshop: Join Us Online on June 20th, 2023

The Registration Operations Workshop (ROW) was conceived as an informal industry conference that would provide a forum for discussion of the technical aspects of registration operations in the domain name system and IP addressing. The ROW series is being co-sponsored by Verisign and ICANN and organized by Cofomo, and we are looking forward to an engaging set of talks, panel discussions, and conversations with individuals involved with the operation of domain name registrations systems. more

RIPE 86 Bites: What’s the Time?

A little appreciated aspect of our digital infrastructure is just how dependent we are on access to time. Disrupting the time base can not only lead to disruption in communications but can result in various forms of compromise of the integrity of communications. Accurate time was all but unobtainable for centuries, and then, as we spent significant sums devising even more accurate timekeeping instruments, accurate time became a specialized service. more

AI, Human Rights and the Rise of the Global South

As the current global geopolitical space becomes less friendly to Human Rights1, are there potential offsetting trends supporting them? Yes, but... it will require initiatives from the Global South for AI data-driven policies supportive of the UN's Sustainable Development Goals (SDGs), demonstrating the value of SDGs and Human Rights combined. more

RIPE 86 Bites: Gigabits for EU

Rudolph van der Berg presented on the latest updates from the ongoing tensions in the Internet industry between carriage infrastructure providers and content providers, with a European perspective. The carriage providers in the EU region are asserting that they're making major capital investments in augmenting the access network infrastructure to carry gigabit traffic volumes, which is largely streaming content, while at the same time the content providers were getting a free ride, or so goes the argument. more

FCC Touts 6G

The U.S. Federal Communications Commission (FCC) has seemingly joined forces with the marketing arm of the cellular industry in declaring that the spectrum between 7-16 GHz is now considered to be 6G. Chairman Jessica Rosenworcel recently announced that the agency would soon begin looking at the uses for this spectrum for mobile broadband.  more

NIST as a Cyber Threat Actor

On 24 May, NIST published recommendations that are a key component of the U.S. cybersecurity ecosystem -- known as vulnerability disclosure guidelines. NIST (National Institute of Standards and Technology) is an agency of the Department of Commerce whose mission includes "developing cybersecurity standards, guidelines, best practices, and other resources to meet the needs of U.S. industry, federal agencies and the broader public." more

The ‘Millennium Problems’ in Brand Protection

As the brand protection industry approaches a quarter of a century in age, following the founding of pioneers Envisional and MarkMonitor in 1999, I present an overview of some of the main outstanding issues which are frequently unaddressed or are generally only partially solved by brand protection service providers. I term these the 'Millennium Problems' in reference to the set of unsolved mathematical problems published in 2000 by the Clay Mathematics Institute, and for which significant prizes were offered for solutions. more

Starlink’s New Business Broadband

Starlink has quietly updated its business broadband offerings. The original plan for businesses was $500 per month with a two-terabyte data cap. If a customer exceeded the data cap, the speed reduced to 1 Mbps for the remainder of the month unless a customer bought additional broadband at $1 per gigabyte. Starlink business comes with a premium antenna from HP at a one-time cost of $2,500. more

RDRS: Calling All Registrars!

Calling all registrars! ICANN is set to launch the Registration Data Request Service (RDRS), and the Registrar Stakeholder Group encourages ICANN registrars to participate. For those who haven't been closely following ICANN policy, the RDRS is a step on the path of policy development working to bring our registration data processing requirements into line with data protection laws. more

Failed Expectations: A Deep Dive Into the Internet’s 40 Years of Evolution

In a recent workshop, I attended, reflecting on the evolution of the Internet over the past 40 years, one of the takeaways for me is how we've managed to surprise ourselves in both the unanticipated successes we've encountered and in the instances of failure when technology has stubbornly resisted to be deployed despite our confident expectations to the contrary! What have we learned from these lessons about our inability to predict technology outcomes? more

Human Rights and the Digital Domain Primer - Part 1

The digital domain encompasses the different spaces and spheres we use to relate and interact with the people and things that surround us using digital technologies. The digital domain is not limited to the technologies itself, but it has an important ethical dimension that encompasses the values, principles and instruments that inform and govern it. Created by humans for humans, our beliefs, cultural backgrounds, and biases are reflected in the codes we write and the algorithms we create. more

Can Digital Human Rights Be Sustained in an Evolving UN?

Are Human Rights, both traditional and digital, at risk of becoming an empty promise? (a) The political environment for Human Rights has notably deteriorated since the United Nation's (UN) Universal Declaration of Human Rights (UDHR) in 1948. How have things changed? more

Topics

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Threat Intelligence

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days