One of the key issues for the Domain industry is how to accurately predict year-on-year how many customers will renew their domain names. It's fairly common that a registry in the first year has around a 60% renewal rate, and following the first year, that increases to around 80 and 85 percent on the remaining domain names. But how can we understand better why this is so, how can this be more accurately predicted, and what can be done to help maximize these opportunities? more
For nearly fifty years now, a significant portion of my professional engineering and lawyering life has been threaded through the International Telecommunication Union (ITU). It has included all of its multiple sectors, working on the inside for two Secretary-Generals and running its Relations between Members and Regulations Division, writing two books including "The ITU in a Changing World" with the late George Codding, representing the U.S. at several conferences... more
There is no single name system that is necessarily bound to the Internet. Unlike IP addresses which are in every IP packet, names are an application construct, and, in theory, applications have considerable latitude in how they handle such names. There could be many name systems that could coexist within the Internet, in theory. In practice, there is strong peer pressure to use a single name system. more
This morning in Bucharest, Doreen Bogdan-Martin was elected by the member nations of the International Telecommunication Union (ITU) as its 12th Secretary-General. Of the 164 votes cast, she received 139 -- an overwhelming majority of 85 percent. Only 15 countries voted for her opponent, Rashid Ismailov of Russia, who sought to implement a divisive techno-political agenda. more
Aalyria, a new space Internet company, just burst out of stealth mode. It is based on work done on Alphabet's "moonshot" Project Loon and Alphabet transferred almost a decade's worth of technology IP, patents, office space, and other assets to Aalyria in return for an equity stake in the company. Spacetime is Aalyria's intelligent network orchestration technology, and Tightbeam is its advanced atmospheric laser communications technology. more
Perhaps it's because the death of Queen Elizabeth has been everywhere in the news, but somebody sent me an article from the BBC from 2008 where then Prince Charles warned that the lack of rural broadband in the UK was going to eventually result in broadband deserts. The now King Charles III was quoted as saying that lack of broadband puts too much pressure on the people who live without broadband and that if a solution wasn't found... more
A report from the Center for Data Innovation warns of a new broadband gap they call the data divide, which is when some parts of society are not sharing in the big societal advantages that come from using and understanding the huge amounts of data that are being generated today. The report includes examples of the data divide that make the concept easier to understand. more
One of the discussion topics at the recent ICANN 75 meeting was an old favorite of mine, namely the topic of Internet Fragmentation. Here, I'd like to explore this topic in a little more detail and look behind the knee-jerk response of declaiming fragmentation as bad under any and all circumstances. Perhaps there are more subtleties in this topic than simple judgments of good or bad. more
The ever-entertaining Fifth Circuit has recently upheld a strange Texas law that forbids most kinds of social media moderation. (Techdirt explains many of the reasons the court is wrong, so I won't try.) This brings us to the trendy question of whether Facebook, Twitter, et al. should be treated as common carriers. You can make a good argument to separate the point-to-point data transport from the ISP and make the former common carriage. more
From time to time, a party can get out of control. Raucous celebration can become careless, even destructive. Combine a critical number of young people, a certain amount of beer and lots of music and damage often happens. Partygoers leave a mess behind them. The same thing happens to some IP addresses. Malicious actors use IP addresses properly registered to someone else. more
Let's face it. The suppression of free speech is happening all over the Internet. Examples range from fanatics shouting down "unbelievers" in chatrooms to governments silencing voices to rig elections. We are equally convinced that freedom of speech as a principle should be generally upheld in cyberspace. This principle is strong where freedom and democracy are strong. It shines bright for those in search of freedom and democracy. Well, folks, think again. A recent experience has made me think otherwise. more
As we passed five years since the Internet Assigned Numbers Authority transition took place, my co-authors and I paused to look back on this pivotal moment; to take stock of what we've learned and to re-examine some of the key events leading up to the transition and how careful planning ensured a successful transfer of IANA responsibilities from the United States Government to the Internet Corporation for Assigned Names and Numbers. more
A big piece of what the FCC does is to weigh competing claims to use spectrum. It seems like there have been non-stop industry fights over the last decade on who gets to use various bands of spectrum. One of the latest fights, which is the continuation of a battle going on since 2018, is for the use of the 12 GHz spectrum. The big wrestling match is between Starlink's desire to use the spectrum to communicate with its low-orbit satellites and cellular carriers and WISPs... more
T-Mobile and Starlink made a joint announcement recently about an arrangement where Starlink will enable voice and texting capabilities to T-Mobile cellphones by the end of 2023. This is a service that would work with existing cell phones and would supposedly kick in when a phone can't find a signal from a cell tower. Starlink said the technology would be enabled by new satellites that have significantly larger antennae than the current satellites in the constellation. more
A key requirement for a bad actor wanting to launch a brand attack is the registration of a carefully chosen domain name. The most convincing infringements frequently use a domain name that's deceptively similar to that of the official site of the target brand. This allows a variety of attacks to be executed, including phishing attacks... more
Sponsored byRadix
Sponsored byIPv4.Global
Sponsored byDNIB.com
Sponsored byCSC
Sponsored byVerisign
Sponsored byWhoisXML API
Sponsored byVerisign