Featured Blogs

Latest

Internet Society Seeks Nominations for 2021 Board of Trustees

re you passionate about preserving the global, open Internet? Do you have experience in Internet standards, development or public policy? If so, please consider applying for a seat on the Internet Society Board of Trustees. The Internet Society supports and promotes the development of the Internet as a global technical infrastructure, a resource to enrich people's lives, and a force for good in society. more

Brand Abuse and IP Infringements – Part 1: Brand Impact

In this two-part blog series, we take a closer look at brand abuse and intellectual property (IP) infringements. In this first article, we explore the components making up a company's IP and how online content can affect a brand's value, both actual and perceived... The IP held by an organization -- i.e., the portfolio of brands, trademarks, and other intangible assets that provide it with its distinctiveness, and protect it from unfair competition in the marketplace... more

ICANN Doubles Down on Technical Internet Governance Label: What Are the Implications?

Back in September of 2020, ICANN CEO Göran Marby wrote a blog post discussing the implementation of "a common strategy for Internet governance (IG) and technical Internet governance (TIG)", raising the question of whether the ICANN org. intended to pursue this distinction moving forward, as debated in a previous article. This was proven to be the case during the 2020 IGF's Open Forum #44: "ICANN Open Forum - Technical Internet Governance", organized by ICANN itself... more

Goodbye Marilyn Cade

Marilyn Cade was an exceptionally hardworking, always gracious leader in ICANN and IGF. She was a strong supporter of U.S. interests at ITU and a member of the U.S. delegation at the WCIT. Dozens have spoken of her at a memorial site, including Vint Cerf: "Marilyn was an elemental force in the ICANN, IGF and policy worlds. She was an advocate who could be counted upon to speak passionately for the causes to which she was dedicated..." more

Satellite and Space Debris Tracking as a Service

On February 2, 1989, the Soviet Union launched its Cosmos 2004 satellite and the Chinese launched a rocket on December 15, 2009. Cosmos 2004 is now defunct, as is the third stage of that Chinese rocket, but both remain in orbit. They were long forgotten until recently when LeoLabs, a satellite tracking service, predicted that they had a good chance of colliding at 971 km over the sea near Antarctica. more

Another ICANN Meeting Concluded With No Action on DNS Abuse or Privacy/Proxy Policy

The ICANN 69 meeting has come to a close, with no progress on DNS abuse or implementation of the Privacy/Proxy Services Accreditation policy (PPSAI). While ICANN is uniquely positioned to do so, it refuses to do anything proactive about DNS abuse, with its executives overtly attempting to limit its role to data collection. Moreover, its refusal to implement community-driven initiatives such as the PPSAI points to a growing trend where ICANN is backing away from its public interest responsibilities, to the detriment of the Internet and its users. more

The Upload Speed Lie

In the 2020 Broadband Deployment Report, the FCC made the following claim. "The vast majority of Americans -- surpassing 85% -- now have access to fixed terrestrial broadband service at 250/25 Mbps". The FCC makes this claim based upon the data provided to it by the country's ISPs on Form 477. We know the data reported by the ISPs is badly flawed in the over-reporting of download speeds. Still, we've paid little attention to the second number. more

Criss-Crossing AI With the Future of Work

Every few years; some self-proclaimed academic imparts an article on the future of work, with conflicting information from various experts leaving many uncertain about its impact on jobs, skills, and wages. In less than a year, these same scholars will be writing about the "future of labor," and given the speed of innovation, by the time these articles are published, they will be made obsolete. more

The JavaScript Ecosystem

JavaScript started out as a simple extension for the browser but has become so much more. In part, this is true in building on rich concepts going back to Lisp. Along the way, it has challenged the givens of programming and given us a high-performance flexible language along with rich libraries and rich tools. We're just beginning to discover the possibilities. more

Is 5G a Race We Want to Win?

There is an interesting article recently published in the English version of a South Korean newspaper, the ChosunILBO, that talks about 5G in China. According to the article, the Chinese 5G rollout is an expensive bust. There are a number of interesting facts disclosed about the Chinese 5G rollout. First, it's clear that the rollout is using millimeter wave spectrum. more

A Brief Look at the Domain Attack Surface of Streaming Media Companies

The term "attack surface" is often heard in cybersecurity conversations. It refers to the sum of all possible attack vectors or the vulnerabilities that threat actors can exploit to penetrate a target network or damage an organization somehow. An unused and forgotten subdomain, for instance, can become an attack vector when taken over. Certain categories of companies have very large attack surfaces. Such is the case of streaming media businesses like Netflix and HBO Max. more

SpaceX Starlink Beta, Phase Two

According to an email, Starlink has moved into the second phase of its beta program, nicknamed the "better than nothing beta," which feels a bit like monopoly hubris to me. It may be better than nothing, but it is not as good as the initial beta, which was free. Participants will pay $99 per month for the service and pay $499 for a terminal, including a tripod and WiFi router. I wonder what the difference is between these "beta testers" and "customers." more

A Look at DNS Trends and What the Future May Hold

We used to think of computer networks as being constructed using two fundamental common infrastructure components: names and addresses. Every connected device had a stable protocol address to allow all other devices to initiate a communication transaction with this device by addressing a data packet to this protocol address. And every device was also associated with a name, allowing human users and human use applications to use a more convenient alias for these protocol addresses. more

ICT in Agriculture: A Travel to Australia’s Outback Queensland

In October 2020, I went on a two-week tour into Queensland's Outback, traveling through various landscapes from pastoral and agricultural lands to savanna and the desert. Leaving Brisbane, past Toowoomba, you enter the Darling Downs. This is one of the richest agricultural areas in Australia. British Botanist Alan Cunningham first explored it in 1827. However, only after the penal colony of Moreton Bay (now Brisbane) was closed, free settlers were allowed in the area. more

IoT From a Network Perspective: Learning to Navigate the New Realms

Let's play the analogy game. The Internet of Things (IoT) is probably going end up being like... a box of chocolates, because you never do know what you are going to get? a big bowl of spaghetti with a serious lack of meatballs? Whatever it is, the IoT should have network folks worried about security. Of course, there is the problem of IoT devices being attached to random places on the network, exfiltrating personal data back to a cloud server you don't know anything about. more

Topics

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Threat Intelligence

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days