Featured Blogs

Latest

Businesses Are Ready for the Metaverse

The latest technology on the horizon is the metaverse, which, stated simply, is the creation of online environments. While the primary focus of the metaverse is to create alternate realities, an application with a possible immediate big uptake is vertical presence for business meetings. Ciena, a manufacturer of fiber optic transmission equipment, recently did a survey worldwide of 15,000 business people to understand the interests and expectations of the metaverse. more

How to Avoid Insider Threats Such as the Latest New York Post Hacking

New York Post has been "hacked" by an employee. To protect themselves from insider threats, companies can deploy zero trust and restrict access. On October 27, the New York Post published a string of racist and sexist articles on its website. Fabricated news about politicians, such as pieces concerning racist comments of a New York City mayor, has been headlining the publication. more

AI Already Succeeding in Most Creative Tasks and Getting Better by the Day

It is redundant to point out how much progress AI applications made during the past few years. What is escaping the attention of many people, however, is that in most creative areas, there are already fully working consumer-grade tools based on generative AI that can produce output similar to that of a human with above-average capabilities, and there are many more on the way. These tools also happen to be rather affordable, making them accessible to a large amount of people. more

Looking at Centrality in the DNS

The Internet's Domain Name System undertakes a vitally important role in today's Internet. Originally conceived as a human-friendly way of specifying the location of the other end of an Internet transaction, it became the name of a service point during the transition to a client/server architecture. A domain name was still associated with an IP address, but that 1:1 association was weakened when we started adjusting to IPv4 address exhaustion. more

In Memoriam: Frederick P. Brooks, Jr. – a Personal Recollection

Brooks is famous for many things. Many people know him best as the author of The Mythical Man-Month, his musings on software engineering and why it's so very hard. Some of his prescriptions seem quaint today -- no one these days would print out documentation on microfiche every night to distribute to developers -- but his observations about the problems of development remain spot-on. But he did so much more. more

Three Reasons Why CISOs Need to Understand Domain Security

Domain name abuse is one of the most dangerous and under-regulated issues in digital business security today. An attack on a web domain can lead to the redirection of a company's website, domain spoofing, phishing attacks, network breaches, and business email compromise (BEC). Domains used as a company's online world are part of an organization's external attack surface and need to be continuously monitored for cybercrime attacks and fraud. more

The Price for Faster Upload Speeds

I've always been impressed by the marketing folks at the big cable companies. They are masters of extracting money from customers willing to pay for better broadband. The latest example comes from Comcast. The company is introducing a new product in the Northeast that offers faster upload speeds -- for a price. Comcast knows that its biggest weakness is upload speeds. more

Achieving Multi-Stakeholder Progress on DNS Abuse

DNS Abuse and how to address it has been the topic of intense, often conflictual, and rarely conclusive discussions for many years, starting with the very definition of the term and the degree of responsibility bestowed upon DNS operators. In 2018, after several months of intersessional work, the Internet & Jurisdiction Global Conference brought together in Ottawa more than 200 key stakeholders to define a roadmap to address certain jurisdictional challenges on the Internet, including DNS abuse. more

The Fibre Optic Path

In August 1858, Queen Victoria sent the first transatlantic telegram to U.S. President James Buchanan. The cable system had taken a total of four years to build and used seven copper wires, wrapped in a sheath of gutta-percha, then covered with a tarred hemp wrap and then sheathed in an 18-strand wrap, each strand made of 7 iron wires. It weighed 550kg per km, with a total weight of over 1.3Mkg. more

ICANN Policymaking Should Be Even More Transparent

Transparency and accountability are embedded in ICANN's core values. Indeed, ICANN's Bylaws mandate that "ICANN and its constituent bodies shall operate to the maximum extent feasible in an open and transparent manner ...". Public Interest Registry believes that a dedication to transparency is fundamental to the strength and continued effectiveness of ICANN's multistakeholder model. more

Update on Satellite Broadband

The first announcement came from OneWeb. The company successfully launched 36 new satellites with rockets supplied by NewSpace India Limited. This new rocket company was formed in 2019 and is a public-sector undertaking sponsored by the Indian Government and an arm of the India Space Research Organization. This launch is a reminder that many parts of the world are now interested in the space business. more

The Continuing WHOIS Disappearing Act

WHOIS is about to become even harder to find. ICANN has recently concluded long-delayed contract negotiations with industry meant to accommodate the technical migration from the WHOIS protocol to the Registration Data Access Protocol (RDAP). Instead of limiting the changes to what's necessary to implement the new technical protocol, the proposals effectively gut WHOIS, making it virtually impossible to find by eliminating web-based WHOIS access... more

Cloud Gaming

Gaming is a huge business. In 2021, gaming generated $214 billion in revenues worldwide. That represents over 6% of all spending on entertainment. Gaming market experts are predicting that this will grow to over 10% during this decade. The pandemic triggered a growth spurt in gaming, with revenues almost tripling since 2019. During that time, there was also a big change in the dynamics of the industry, where many games are offered for free. more

Going Dark: How the Increasingly Dark Network Is Creating Some Pretty Ugly Choices for Site Security Administrators

I'd like to reflect on a presentation by Dr. Paul Vixie at the October 2022 meeting of the North American Network Operators Group (NANOG) on the topic of the shift to pervasive encryption of application transactions on the Internet today. There is a view out there that any useful public communications medium needs to safeguard the privacy and integrity of the communications that it carries.  more

How Are You Solving the Digital Divide

One of the most common questions I'm being asked these days is from local politicians and economic development folks who want examples of other communities that are tackling and solving the digital divide. I'm able to trot out the big-picture stories because they come to my attention in reading about the industry. As an example, just before I wrote this blog, I read an article that says that the State of Maryland will be providing 150,000 laptops to homes... more

Topics

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Threat Intelligence

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days