Featured Blogs

Latest

The Year 2038 Computer Problem – a Repeat of Y2K?

The Year 2038 Problem relates to representing time in many digital systems as the number of seconds passed since 00:00:00 UTC on 1 January 1970 and storing it as a signed 32-bit integer. Such implementations cannot encode times after 03:14:07 UTC on 19 January 2038. At that time, systems might crash and be unable to restart when the time is changed to that date. It is like the Y2K problem caused by the widespread use of two decimal digits to store the year. While that problem was overhyped... more

The UK Seeks to Enforce Tougher Standards on MSPs

The UK government is proposing new regulations to strengthen cyber resilience in the private sector. Their intention is to expand cybersecurity rules for critical infrastructure (CI) operators to include managed service providers (MSPs), more stringent breach notification requirements, and legislation to establish the UK Cyber Security Council as the standards development organization for the cybersecurity profession. This is a welcomed development, but more details about implementation and enforcement are needed. more

Observations on Resolver Behavior During DNS Outages

When an outage affects a component of the internet infrastructure, there can often be downstream ripple effects affecting other components or services, either directly or indirectly. We would like to share our observations of this impact in the case of two recent such outages, measured at various levels of the DNS hierarchy, and discuss the resultant increase in query volume due to the behavior of recursive resolvers. more

When Will We See Real 5G?

The non-stop wireless industry claims that we've moved from 4G to 5G finally slowed to the point that I stopped paying attention to it during the last year. There is an interesting article in PC Magazine that explains why 5G has dropped off the front burner. The article cites interviews with Art Pouttu of Finland's University of Oulu about the current state and the future of 5G. That university has been at the forefront of the development of 5G technology and is already looking at 6G technology. more

The US-China Technology Cold War Battle Over Optical Communication in Space

The United States and its allies are in a technology cold war with China and its allies. This is evidenced by major battles like the US ban on Huawei and China's drive for technological independence and their global infrastructure program to create a digital silk road. (The cold war began under Trump, but President Biden is continuing it). There are other, less well-known battles like the battle over optical communication in space. more

Dissecting the 2022 UK Cyber Security Strategy: The ‘Whole of Society’ Approach

The UK government launched its 2022 Cyber Security Strategy on 15 December 2021, outlining its ambitious plans to improve the resilience of UK institutions and businesses while protecting the country's interests in cyberspace. The strategy signals a more involved approach by the government, which previously relied heavily on the private sector for leadership. The government's stated commitment to a 'whole of society' approach sounds really good on paper, but what exactly does it really mean? more

Australian Farms Get Connected to the Starlink Satellites

Last year, I reported on the possibility that LEO (Low Earth Orbit) satellite-based systems might be a gamechanger for the delivery of high-speed data services, including internet access, to people in regional and remote Australia. What has become clear with the rollout of the NBN is that the quality of data connections in metropolitan cities in many cases has improved, but that the rest of Australia doesn't have a similar experience. more

2021 Domain Name Year In Review

Is it really 2022? Is it? Although many might view 2021 as another "lost" year due to the pandemic, filled with Zoom™ meetings, virtual conferences, working from home and restricted travel - there were a number of notable domain name stories which deserve to be highlighted. So, without further ado, here are the top 10 biggest domain name stories of 2021 - let's go! more

Fixed Cellular Broadband Performance

One of the first in-depth reviews I’ve found for T-Mobile’s fixed cellular broadband was published in the Verve. It’s not particularly flattering to T-Mobile, and this particular customer found the performance to be unreliable – fast sometimes and barely functioning at other times. But I’ve seen other T-Mobile customers raving about the speeds they are receiving. We obviously can’t draw any conclusions based upon a single review by one customer... more

Internet Governance Outlook 2022: A Global Digital Compact or a Bifurcated Cyberspace?

This is the 10th edition of my annual Internet Governance Outlook. The first one was published on CircleID on January 3, 2013, just a couple of weeks after ITU's World Conference on International Telecommunications (WCIT). I wrote: "Anyone who expected that with the end of the Dubai Conference, the heated debate on the future regulation of the Internet will slow down should remember the fairytale of the knight's battle with the seven-headed dragon. Hardly a head is cut off, another one is growing." more

The Future of Data Storage

One of the consequences of our increased use of broadband is a big increase in the amount the data that we store outside our homes and businesses. The numbers are becoming staggering. There are currently about 3.7 billion people using the Internet, and together we generate 2.5 quintillion bytes of online data every day. The trends are that by 2025 we'll be storing 160 zettabytes of data per year - a zettabyte is one trillion gigabytes. I store a lot more data online than I used to. I now store things in the cloud all day long. more

Web3 - What Brand Protection Pros Need to Know

Avivah Litan, the storied Gartner analyst, laid it down succinctly for insiders in her blog two and one-half years ago. She said, "Web 3.0 will transform us from Web 2.0's monetization via surveillance capitalism and advertising to monetization built directly into the protocol that is equally available to any connected user." Translated, that means we'll control our destiny by owning and managing our credentials for logging into systems, content, financial resources, and, importantly, our data. And, we are told, blockchain technology will enable all that. more

New German Legislation Provides Copyright-Related Internet Platform Obligations

Recently, there has been an interesting development in the liability of Internet intermediaries in Germany, and I will comment here in this text. The "Act on Copyright Liability Online Content Sharing Service Providers" began to apply on August 1, 2021 in the country. This act is a German attempt to deal with the controversy generated by the approval in 2019 of the new European directive on copyright, specifically with article 17. more

ICANN’s Accountability Mechanisms – in Name Only?

On December 14, 2021, Dot Hip Hop, LLC (DHH) filed an Urgent Reconsideration Request following ICANN staff inaction (for its over four-month delay) of its Assignment Request for the .hiphop Registry Agreement. Not only did the ICANN Board Accountability Mechanisms Committee (BAMC) decide against considering the Reconsideration Request on an urgent basis, but on its last day of business for 2021, ICANN Org decided to retaliate against DHH for filing the Reconsideration Request in the first place ... more

The 25/3 Mbps Broadband Connection Myth

There is no such thing as a 25/3 Mbps broadband connection, or a 100/20 Mbps broadband connection, or even a symmetrical gigabit broadband connection on fiber. For a long list of reasons, the broadband speeds that make it to customers vary widely by the day, the hour, and the minute. And yet, we've developed an entire regulatory system built around the concept that broadband connections can be neatly categorized by speed. more

Topics

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days