Featured Blogs

Latest

Psst! Do You Know Anyone Developing Blockchain Applications?

The International Trademark Association's Blockchain Subcommittee is interested in meeting companies working on Blockchain applications related to intellectual property. The Blockchain Subcommittee's mission is to explore the use of blockchain technology in trademark prosecution, maintenance, protection, and practice, including the opportunities and threats to the value of trademarks, brands, and consumer trust in emerging blockchain technologies. more

A Simple Suggestion for President Biden Regarding the Cuban Internet

Last September, I asked what had happened to the proposal for a branch connecting the ARCOS undersea cable, which has a landing point in North Miami Beach, to Cojimar, Cuba. The consortium that operates the cable had applied for permission to connect Cuba in July 2018, and the FCC granted a request for streamlined processing, which should have taken less than 45 days, but nothing happened until September 2020 when the application was referred to a Justice Department committee... more

Notes from NANOG 81

As the pandemic continues, the network operator community continues to meet online. NANOG held its 81st meeting on February 8 and 9, and these are my notes from some of the presentations at that meeting... Ethernet, developed in 1973 at Xerox PARC, was a revolutionary step in network architectures in many ways. The common bus architecture imposed several constraints on the network that have echoed through the ensuing four decades in all kinds of ways. more

Facebook Stays, Everybody’s Happy, but Nothing Has Changed

After some turmoil, Facebook won the war with the Australian Government as the necessary changes were made to the legislation that avoided them needing to change their business model. Those subtleties are lost in the general press. What counts for the popular media is that they were able to spin some great stories around the fact that Australia stood up to the giants. That brought international attention, which boosted the ego of Australian Prime Minister Scott Morrison. more

Cybersecurity Tech Accord: 98% of Registrar Whois Requests Unrequited

When a brand goes so far as to ask a domain name registrar for Whois (the registration contact details) of a potentially abusive domain name, there's likely a lot at stake. Most often, the request is prompted by consumer safety concerns, such as the risk to consumers posed by a malicious site. Other times, the demand has a simple goal: to have a dialog with the registrant about the use of trademarks or other intellectual property in order to avoid extreme action. more

Let’s Bring Telecom Manufacturing Back to the US

President Biden recently signed an executive order that will require that the federal government buys more goods produced in the United States. This was done to promote American jobs and to keep profits at home. It's a great idea, but it suffers from one big flaw -- we don't manufacture a lot of things in the US anymore. Statistics are hard to pin down, but something like 40,000 US factories have shut down over the last decade. more

Macquarie Group Is Set to Shake Up the Digital Infrastructure Market

A few months ago, I reported on the broader market of which telecommunications infrastructure is a part. I mentioned data centers, cloud computing and data analytics (big data). All together, we can perhaps best call this digital infrastructure. While the importance of this merged set of infrastructures will benefit all economies and societies, I recently focused on regional developments as basically every region and every mid-size town will need to have a digital hub for local computing workloads and storage. more

Facebook Is Right to Call the Australian Government Bluff

As mentioned in previous analyses, the way that the Government has approached its battle with the digital giants has been flawed from the beginning. True, its tough stand had made Google pay media companies well above what these companies would have been able to negotiate individually with Google, but the fundamentals of why these battles are taking place are still unchanged. more

Busting Domain Name Secondary Market Myths

The Secondary Market in domain names plays a critical role in Internet commerce yet is often misunderstood. This article will attempt to clear up some of the myths that frequently arise when discussing the Secondary Market... Domain name investors are but one group participating in the thriving domain name Secondary Market, in which already registered domain names move from one owner to another. more

An Institute to Combat DNS Abuse

Over the last few years, it's become clear that abuse of the Domain Name System -- whether in the form of malware, botnets, phishing, pharming, or spam -- threatens to undermine trust in the Internet. At Public Interest Registry, we believe that every new .ORG makes the world a better place. That means anything that gets in the way of that is a threat, and that includes DNS Abuse. more

SpaceX Starlink Is Coming to Low-Income Nations

Beta testers in the US and Canada paid $500 for a terminal and are paying $99 per month for the service. The beta tests began in high-income countries, but SpaceX is beginning to roll Starlink out and will include low-income nations, for example, India. Last September, SpaceX responded to a request for consultation on a roadmap to promote broadband connectivity and enhanced broadband speed from TRAI, the Telecommunications Regulatory Authority of India. more

Emergence, Rise and Fall of Surveillance Capitalism, Part 2: Rise and Fall

One of the consequences of the Jan 6th events is a renewed attention towards Surveillance Capitalism as a key doctrine undermining democracy.2 This part 2 of the 2 part series of discusses the rise and fall of Surveillance Capitalism under the premise that the better we understand the danger at the door, the better we are able to confront it. more

Google Set to Survive in Oz, but Far Bigger Threats Are on the Way

The signs are that the Australian Government and Google are close to a compromise. The Government's main demands stay in place, but some of the details will be changed. This allows the Government to claim victory, while the damage to Google will be limited... Publishers will, in one way, or another be paid for news, either through a payment based on the value of the news and the value of the Google search facility. more

EU Rulings on Geo-Blocking in Digital Storefronts Will Increase Piracy Rates in the Developing World

For the longest time, it was an insurmountable challenge for those in the developing world to be able to afford to legally consume multimedia products. Prices originally set in Dollars, Euros or Yen often received insufficient adjustments to compensate for lower incomes, something that was compounded by local import or manufacture taxes that did little to alleviate matters. more

ECFiber: Building a Fiber-to-Premises Network in the Rural United States

Nestled in the northeastern part of the United States is the small state of Vermont, the 14th State to join the United States in 1789. Its name comes from the French, in which 'vert montagne' means 'green mountain.' and it is known as the Green Mountain state. With only about 625,000 inhabitants, it is the 45th state out of 50 in size, and 49th of 50 in number of people, even less populated than Alaska. more

Topics

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days