Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Starlink Beta vs. Fiber

Last year we had terrible DSL from Consolidated Communications and much better, although not always consistent, service from wireless ISP GlobalNet. I signed up for fiber service from Stowe Cable for installation this year and also was accepted early as a Beta tester for Starlink. Now we have both Starlink and fiber and can compare the two. I was very happy to cancel my Consolidated service but felt bad about canceling GlobalNet, which was essential to me for many years. Most of the time, there are only two of us in the house. more

A Case for Looking Before Leaping: The IANA Stewardship Proposal

In my comments on the draft Cross-Community Working Group (CWG) on Naming Related Functions proposal for the IANA transition, I expressed my overall support, albeit somewhat reserved, for the proposal... but with the ICG's deadline of January 15 having come and gone, and the informal deadline of January 31 looming for the revised proposal from the Names community to be submitted, I'd like to shed some light on what I believe the role and reasoning for some of the mechanisms identified by the CWG, specifically the Contract Co., to be. more

Sovereign Nations on an Unseen Path at WCIT 2012 to Create a Super-Sovereign ITU

It puzzles me to watch Governments introducing or subscribing to proposals that would in effect smoothly concede part their sovereignty to the ITU -- in an area that is central -- Communications. The WCIT 2012, in the middle of its second week, would now discuss Document DT/51-E 11, which is said to be a "package" of not-yet-compromised draft proposal for revisions to the International Telecommunication Regulations, which inevitably makes ITU the control center of all communications in the known Universe. more

Mobile Broadband Boom: The Killer App for FttH

It still amazes us that respected industry commentators join liberal politicians in questioning the need for FttH in the wake of the enormous success of mobile broadband. They refer to this phenomenon as proof that people are bypassing their fixed broadband and are now using the smartphones and tablets to obtain most of their broadband access. However, after several years of mobile boom the majority of households are still using the fixed-line networks for calls... more

Are Auctions the Last Resort to Determine gTLD Winners? I Vote Open Business Plan Competitions

I have been reading through the last gTLD applicant guidebook and have wondered whether all my efforts, traveling, attending all major music conference and lobbying come with any merit. How do you define a community? What is the difference between a dotGreece, dotGay or dotMusic community? ...Whether we like it or not, the point system is what ICANN has set up to determine the winners. If you were to ask me I would create a different method of scoring. It is one of open competition. more

The Reality Virus

There's a new virus infecting the Internet that's more pernicious and more dangerous than any virus that has gone before. It's the first example ever of a hybrid Internet-human virus and probably the universal common ancestor of all hybrid Internet-human viruses to come. The condition the virus leaves behind is increasingly well recognised and goes by the understated label of "post-truth" but the virus itself is so far anonymous and so I propose we name it after the effect it has on those it has infected who, put simply, can no longer distinguish reality from fiction, hence the reality virus. more

The Machine Learning Operations Tooling Landscape Expands to 300

Happy New Year! There is no scarcity of Machine Learning Operations products being introduced to the industry. Since June of 2020, over 84 new ML toolsets incorporating but not confined to All-in-One, data-pipeline, and model training applications were born. In this list of almost 300 MLOps tools, there are 180 startups. Out of these 180 startups, more than 60 raised capital in 2020, and about two-thirds are fixated on data-pipelines and modeling-training. more

Taking a Multi-Stakeholder Look at Cyber Norms

Recently we've seen several examples of likely state sponsored security incidents of which the appropriateness was later strongly debated. Incidents such as states impacting commercial enterprises during cyber attacks; purported sabotage of critical infrastructure, and attacks on civilian activists have all, to a greater or lesser degree, led to concerns being raised by both civilian watchdog groups, academics, technologists and governments. more

No False-Starts, Do-Overs, or Mulligans for Email

Josh Baer, former VP of Datran Media and current CEO of OtherInBox has been floating an idea at the DMA's Email Experience Council and a few other places, and recently got some traction in Ken Magill's Magill Report. What Josh is proposing is to create the technical means by which a Sender can decide when email 'expires' and is automatically removed from a recipient's inbox, either by deletion, or perhaps archiving (in the case of Gmail). This would supposedly help the end-user, by removing marketing offers that are no longer available. Why this idea shouldn't happen... more

What’s With the 32-Bit Numbers That the Internet Keeps Defying?

By now you might have read the news "How 'Gangnam Style' Broke YouTube?" What happened is that a YouTube video named 'Gangnam Style' by a South Korean singer Park Jae-sang, known by his stage name PSY, has been viewed so many times that it broke YouTube's view counter. YouTube's view counter is built on a 32-bit integer, which provides a view-tracking capability of nearly 2.15 billion views. more

Tackling Cyber Security: Should We Trust the Libertarians?

One of the RSS feeds that I read is Reason magazine, which is a web site for libertarians. In general, libertarians want less government intervention both in our personal lives and in the economy. The idea behind libertarians is that today's Republicans want less government intervention in our economy but are perfectly fine to have them dictate some aspects of morality. Similarly, today's Democrats want less government intervention in our personal lives but are perfectly fine with creating government bureaucracy to deliver social services. That's an oversimplified summary, but is more or less correct. About two months ago I got an article in my RSS feed where Reason was commenting on the government's response to the cyber war threats. more

Life Outside IPv6 (Poll)

Within every organization a chosen few are tasked with introducing IPv6 into their networks, outward facing services or applications. But who are they? We know them as Network Engineers, System Administrators and Software Developers but are they one trick ponies spending all their time in layer 3? more

Why Did’t the Internet Zap Singapore’s Straits Times Newspaper?

US papers employed 56,900 full-time journalists in 1990, the year Tim Berners Lee began testing his World Wide Web software, and they employed 32,900 in 2015. The disruption of the newspaper business began 22 years ago, when Craig Newmark launched his classified ad site, Craigslist. (Note that Newmark now generously supports investigative journalism and fact-checking organizations). Newspapers have adapted to the Internet by adding digital editions, but they generate less ad revenue than print editions have lost. more

ICANN’s NomCom 2-Stage (R)evolution

ICANN's Nominating Committee (NomCom) is both a strange animal and a precious resource. Having a committee charged with first recruiting, then selecting suitable candidates to hold key positions within ICANN is something that is often little, or even mis, understood. Within the ICANN community itself. By the very nature of its recruitment role, the NomCom has to remain secretive. About who the candidates are, at any rate. But that doesn't mean the rest of the NomCom's processes must remain so. more

Why Passive DNS Matters in Cybersecurity

Imagine a scenario. Your website analysis shows that your page has stopped receiving visitors, yet there are no complaints that your domain is unreachable. Strange, isn't it? You are certainly wondering: What's going on? Where are my customers? You see, what happened is that you are facing the consequences of the lack of domain name system (DNS) security. more

Topics

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

Threat Intelligence

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days