Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

A Look at Why Businesses Buy Cloud Services?

If you are a cloud provider, whether you are pure play or an internal IT department, it is very interesting to know who is buying cloud services, and why. In a recent survey by PB7 sponsored by EuroCloud Netherlands and others, a group of Dutch companies was interviewed about their motivations and hesitations around cloud computing. The survey's results were quite a bit more interesting than the usual lot. In this article I have cherry picked a few observations from the larger survey. more

Today’s CISOs Are Contending With Oft-Changing Disclosure Standards

When it comes to breach disclosures, today's chief information security officers (CISOs) are struggling with an especially turbulent regulatory environment. Security teams are understaffed, and systems are more extensive, making them harder to monitor and defend, while threats are becoming more sophisticated, more frequent, and more varied. It's at precisely this difficult juncture that regulations and enforcement are rapidly changing, leaving CISOs feeling like they are running up the down escalator. more

Analysis of the Global Telecoms Industry In 2016

The telecoms industry represents one of the most dynamic sectors in the world. Only 25 years ago 90% of all activities took place via telephone calls over fixed telephone lines. Now, within the broader ICT industry, telecoms is underpinning all of the new developments in relation to the digital, sharing and interconnected economies. It facilitates new social and economic developments in all sectors such as e-health, e-education, e-business, smart grids, smart cities, e-government, and so on. more

Bring Your .Brand to Life

A preview of my upcoming presentation for the Digital Marketing and gTLD Strategy Congress on why your Top-Level Domain (TLD) strategy is paramount to making or breaking your .brand... Your strategy will be the most significant weapon in your Top-Level Domain arsenal to drive the launch of your .brand, and you'll only get there with preparation and engagement. For the vast majority of .brand applicants, ICANN has recently informed you that you have passed your application. You've come this far. more

Trans-Sector Thinking Spreading to the Highest Levels in Government

Australia, New Zealand and the USA have taken international leadership in relation to their approaches to the infrastructure investment their countries are committed to in relation to the multi-billion dollar investment in national broadband and smart grid infrastructure. This is based on open networks, which will allow multiple access to infrastructure that can be used for e-health, smart grids, tele-education, as well as, of course, to telecoms, Internet and entertainment services. more

Hiding in Plain Sight: Post-Breach

The majority of network breaches begin and end with the installation of malware upon a vulnerable device. For the rest, once that initial malware beachhead has been achieved, the story is only just beginning. The breach disclosures that make the news are often confusing as they're frequently compiled from third-hand reports, opinions and technical assumptions. More often than not, they include a discussion about the malware - how advanced it was, etc. - and whether any 0-day vulnerabilities were likely used by the mysterious attacker. more

Final Day to Give Input on “Future of the Internet” Survey

Today, June 26, is the final day that you can help the Internet Society with its "Future of the Internet" survey. It takes about 20-25 minutes and will help my colleagues at the Internet Society develop a number of scenarios about the possible future of the Internet. These scenarios can help all of us in talking to policy makers, leaders, media and the general user population about the choices we have before us for the future of the Internet. more

The Importance of IPRC in Asia Pacific

I believe and strongly support Internet Principle and Right Coalition (IPRC) Charter is an important edition of document supplementing the principles and rights of individual internet users in any developing and least developed country. Especially in Asia Pacific region where the need and use of such document is immense, as there is a gap in recognition and awareness of rights of internet users. more

This COVID-19 Crisis Proves the Internet Is Indeed a Caribbean Right

The coronavirus pandemic has, in the most emphatic way, shown us all just how interconnected everything and everyone is. A worldwide race is underway to minimize human interactions in order to avoid a global catastrophe. The inescapable consequence of these initiatives is an unprecedented shut down of the local, regional and global economy. The latest cost estimate to save the global economy is now at $7 trillion and climbing. more

Three Kinds of UDRP Disputes and Their Outcomes

There are three kinds of UDRP disputes, those that are out-and-out cybersquatting, those that are truly contested, and those that are flat-out overreaching by trademark owners. In the first group are the plain vanilla disputes; sometimes identical with new tlds extensions (mckinsey.careers> and <legogames.online>); sometimes typosquatting (<joneslang lassale.com> and <wiikipedia.org>); and other times registering dominant terms of trademarks plus a qualifier (<pleinphilipp-shop.com> and <legostarwars2015.com>). more

Meltdown and Spectre: Security is a Systems Property

I don't (and probably won't) have anything substantive to say about the technical details of the just-announced Meltdown and Spectre attacks. What I do want to stress is that these show, yet again, that security is a systems property: being secure requires that every component, including ones you've never heard of, be secure. These attacks depend on hardware features... and no, many computer programmers don't know what those are, either. more

Decoding the Cellular IoT Acronym Alphabet Soup

Do you know what all these acronyms and abbreviations mean related to cellular networks and the Internet of Things (IoT)? MTC, Cat-0, Cat-1, Cat-M1, LTE-M, NB-IoT, EC-GSM, LPWA, eDRX, PSM... I certainly didn't, but Tuomas Tirronen at Ericsson Research wrote a blog post titled "Cellular IoT alphabet soup" where he explained all of this for those of us who might be interested. more

Mobile Broadband in Africa and the GCC Countries

The story of the growth of pre-paid mobile voice and SMS in Africa and the countries of the Gulf Cooperation Council is well known. The challenge is to move to mobile broadband, which is seen as having potentially explosive growth. Operators will need to create new value propositions, they face significant internal challenges and risk being displaced by rivals moving faster or better able to understand and meet the needs of customers... more

Top Ten List of Needed FCC Regulatory Reforms

Honesty is the best policy. At the risk of anthromorphizing a regulatory agency, at the very least the FCC has not told the complete truth, or put itself in a position not to know the truth. The FCC has contributed to debates about what constitutes credible facts and statistics, and what this data means. For example, soon-to-be former FCC Chairman Kevin Martin asserted as the gospel truth his factual conclusion that cable television operators collectively have a 70% market share... The FCC should acknowledge that it may not know all the facts. more

New TLD Subsequent Procedures: A Proposed Model to Move Forward

Back in February 2017, I published the article "Next gTLD Round -- A Seven Year Itch" on CircleID advocating for the Board, ICANN Community, and ICANN org to reach a common understanding of what needed to be accomplished in order to identify a date to open the next application window for new gTLDs. In the past 18 months, there has been considerable movement toward the goal of opening the next application window for new gTLDs. more

Topics

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

DNS Security

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days