Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Forward-Thinking Remedies

Just a year ago, I gave a talk at David Isenberg's 2005 Freedom to Connect conference. I said, essentially, that we should be careful in asking for regulation to protect the net, because the power to protect carries with it the power to constrain. This was a very troubling message for the audience, and the chatroom projected behind me went wild with disapproval. Since then, I've become very concerned about the concentration in broadband service provision in this country, and worried that there won't be any competition for unfettered internet access. more

Internet Continues to Grow at Astonishing Pace (Perspectives from RIPE NCC Membership Stats)

We are at the height of vacation season here in the Netherlands, and the RIPE NCC headquarters in Amsterdam are quieter than usual. The downtime has given me a chance to reflect on how the recent economic downturn has affected our membership growth. The good news is that it hasn't. more

China: We Lead 3GPP Wireless Standards

In 2018, nothing can get approved in 3GPP that China strongly opposes. In the past, 3GPP often was a battle between a few American giants and their European peers. A Qualcomm or a Nokia will still be heard, but the power has shifted. I haven't seen evidence that the Chinese influence has made for better or worse standards. There are now over a billion 4G subscribers at the big 3 Chinese telcos, by far the largest equipment buyers. Nokia, Ericsson, and the other vendors do not dare oppose their largest customers. more

Is LTE Going to Impact Free WiFi?

Developments in LTE are also going to have a significant impact on the unlicensed spectrum, which is currently used by billions of people through their WiFi modems and WiFi services in cities, cafes, airports and other venues. Known as LTE Unlicensed (LTE-U) or Licensed-Assisted Access (LAA), this technology can also ride on top of WiFi networks (without utilising the mobile service), providing high-speed broadband access to users. more

Why Do Chinese Enterprises Ignore the Internet?

Judging from the development of the Internet in the world, the popularity rate of domain names is one of the primary parameters to measure whether the Internet is well developed or not in a country. The popularity rate of domain names is 11 percent in North America and reaches as high as 12.5 percent in Europe, while in China, which has over 20 million enterprises, there are only more than 300,000 domain names under .CN and the total number of domain names is only 1.187 million, including a lot of governmental and individual websites. more

HD Voice Really is Great

Listen for half a minute to a demo of a high-bit-rate codec and you expect they will transform our industry. The difference is like a CD with great headphones versus a little transistor radio. Suddenly, you realize just how awful the sound is on your regular telephone. Who wouldn't want their call to sound dramatically better was my first reaction. When Thomson and some of the cable folks discussed plans, I was enthusiastic. Years later, nearly no one is taking advantage... more

The Evolution of 5G

Technology always evolves, and I've been reading about where scientists envision the evolution of 5G. The first generation of 5G, which will be rolled out over the next 3-5 years, is mostly aimed at increasing the throughput of cellular networks. According to Cisco, North American cellular data volumes are growing at a torrid 36% per year, and even faster than that in some urban markets where the volumes of data are doubling every two years. The main goal of the first-generation 5G is to increase network capacity to handle that growth. more

Internet Governance and the Universal Declaration of Human Rights, Part 3: Article 6-12

Internet Governance like all governance needs to be founded in guiding principles from which all policy making is derived. There are no better fundamental principles to guide our policy making than the Universal Declaration of Human Rights, (UDHR). This article is Part 3 of a series exploring the UDHR as a guide and template for the digital governance and digital citizenship. We discuss UDHR Articles 6 through 12 and address topics such as fundamental digital values, cyberlaw, policymaking and the role of tribunals in digital governance. more

Securing the Core

BGP. Border Gateway Protocol. The de-facto standard routing protocol of the Internet. The nervous system of the Internet. I don't think I can overstate the importance, the criticality of BGP to the operation of the modern Internet. BGP is the glue that holds the Internet together at its core. And like so many integral pieces of the Internet, it, too, is designed and built on the principle of trust... The folks who operate the individual networks that make up the Internet are generally interested in keeping the Internet operating, in keeping the packets flowing. And they do a great job, for the most part. more

Biggest Deal in Telecom Policy Since the AT&T Divestiture

The biggest communications policy moment since the AT&T divestiture has just happened: The $100 million-dollar-march (or more -- what Comcast spent to make sure this happened) has ponderously, self-evidently reached its conclusion with the FCC's approval of the merger between Comcast and NBCU. It wasn't the subtlest campaign; it didn't need to be; it was effective in its discipline and heavy persistence. The tweets are flying and the journalists are already weighing in. more

The Utility Formerly Known As WHOIS

Muscle memory is a funny thing. We don't even think about it really, but when we do the same thing over and over again, it just becomes second nature to us. This is how we've come to use WHOIS over the past two decades to get contact information for registered domain names. If you wanted to see who owned a domain, you'd simply do a WHOIS search. I've probably done hundreds of thousands of them during my time in the industry. Well as of this week, a major step in the retirement of WHOIS officially took place. more

Fair Notice and Applying for a New gTLD

Applying for a new generic Top-Level Domain (gTLD) will be expensive and complex. ICANN's Applicant Guidebook comprises 350 pages of dense instructions, spelling out the procedures to apply for a gTLD and to comment or object to the gTLDs applied for by others. Hidden among the forest of criteria and procedures is a problem that, unless solved, could deny good faith applicants the fair notice they deserve. more

China Sends a Wake-Up Call to All Multinationals - Are You Awake?

If you visit Marriott's China website today, you're likely to see this (see screenshot). I dumped the text within this page into Google Translate and included below is what it loosely said. So what exactly happened here? Marriott sent a survey in Mandarin to its Chinese loyalty members that referred to Tibet, Macau, and Taiwan as "countries." As readers of this site might know quite well by now, in the eyes of Chinese authorities, this is no trivial oversight. more

End-to-End Email Encryption - This Time For Sure?

Phil Zimmerman's Pretty Good Privacy (PGP) and its offspring have been encrypting and decrypting email for almost 25 years -- but require enough knowledge and determination to use them that adoption has never taken off outside the technoscenti. Now initiatives from several quarters aim to fix that -- but will it all "just work," and will end users adopt it even if it does? more

LAC, the DNS, and the Importance of Comunidad

The 1st Latin American & Caribbean DNS Forum was held on 15 November 2013, before the start of the ICANN Buenos Aires meeting. Coordinated by many of the region's leading technological development and capacity building organizations, the day long event explored the opportunities and challenges for Latin America brought on by changes in the Internet landscape, including the introduction of new gTLDs such as .LAT, .NGO and others. more

Topics

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

Threat Intelligence

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days