Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Broken Policies

As an email policy wonk, I think a lot about how specific policy implementations can go wrong. Sure, every policy can go wrong, or not fit a common case. A lot of people only write polices that address common cases and don't worry about the rarer cases. The problem is there are some rare cases that may cause significant harm and those cases should be addressed. Consumerist has a case up about email policy gone wrong with a clear path to harm but no policy for handling the issue. There are a couple places I see where this policy hole can be fixed. more

What Would You Like to Ask at the ICANN Public Fora in Mexico City?

ICANN has its 34th international public meeting in Mexico City on 1-6 March i.e. in just over a fortnight. One of the consistent concerns I hear in my role as general manager of public participation for the organization is that there is not a way for people to ask questions to the staff and the Board. I don't think that's really true but I do accept that the formats used are not liked by a large number of people... more

Article 28 of the NIS2 Directive and the DNS Industry

At a workshop on the implications of Article 28 for the DNS industry organized by eco -- Association of the Internet Industry in October 2023, stakeholders from the DNS industry, the European Commission, national governments, and the ICANN community convened to discuss the challenges facing the DNS industry and to work together on avoiding fragmentation as much as possible. more

Domain Abuse: Are We Speaking the Same Language?

For those of us in the domain name industry, it's clear that security threats and the way we track, report, and mitigate them has been a topic of increased discussion and focus in recent months. As we prepare to come together as a community again at the next ICANN public meeting in Marrakech, many of us will look to continue these conversations, as there is no doubt it is a topic of importance, relevance and urgency for our community at this time. more

Could Cybersecurity Become a New Driver for Business Transformation?

My involvement in the ICT industry over the last 40 years has always been to look at the strategic advantages that new technologies have to offer. I entered the industry through a proto-internet development called videotext. I looked at this technology, at what organisations could do with it, and assisted, for example, in the 1980s when the Commonwealth Bank introduced the world's first national online banking service called Telebank. more

Data Based Decision Making

A new report was released by the National Telecommunications and Information Administration, part of the US Department of Commerce... It is a 68 page report with a wealth of data to help understand the factors that differentiate levels of adoption and to try to understand the reasons for non-adoption of residential broadband. In the US, people who don't use the internet represent two thirds of non-users of broadband... more

No Broadband - Lower Real Estate Sales

A survey conducted by US company Comcast Business Class found 90% of building owners and property managers felt that broadband is the most important selling point in the commercial real estate market behind price, parking and location. more

Curious Statement About 2012 gTLD Round Name Collision Fears at IGF

During his presentation at IGF on 7 December in Guadalajara, Akram Atallah, President of ICANN's Global Domain Division, said the following: So when you look at that, you'll see that we are left with only 20 to go. There are a few that need to be withdrawn that haven't withdrawn... This surprised me, but since the meeting was about possible new application procedures and not the handling of the last round's persistent problems, I decided not to ask at that point. more

Behind the Curtain: Making IPv6 Work

Wouldn't it be nice if turning on IPv6 really was 'press one button and the rest is magic' easy? For some things, it is. If you're talking about client-side, enabling an IPv4-only home service on DSL or fibre really can be this simple, because all the heavy lifting is being done inside your ISP: you're not enabling IPv6 in the network, you're turning on the last mile. It was knocking at your door and you just had to let it in. more

Electricity Utilities and IoT

More and more connected devices will require more and better electricity solutions. In many developing economies more people have ready access to a smartphone and the internet than they have access to electricity. For that reason we have seen mobile telecoms operators starting to include power solutions (mainly through distributed energy systems, using solar panels) in order to sell more phones and telecom services. This shows how important access to electricity is. more

How AI Affects ComSec and Accessibility

Data transmission is one area where security should be among the biggest concerns. Overseeing data integrity is the realm of communications security (ComSec) teams, and they're getting a lot of assistance these days from artificial intelligence (AI) via machine learning and other AI components that also prove helpful in improving accessibility. Under the umbrella of AI, advances like assistive technologies promote accessibility while preserving data integrity and the flow of communications. more

Microsoft is Abandoning SHA-1 Hashes for Updates - But Why?

Microsoft is shipping a patch to eliminate SHA-1 hashes from its update process. There's nothing wrong with eliminating SHA-1 - but their reasoning may be very interesting. SHA-1 is a "cryptographic hash function". That is, it takes an input file of any size and outputs 20 bytes. An essential property of cryptographic hash functions is that in practice (though obviously not in theory), no two files should have the same hash value unless the files are identical. more

Are There Countries Whose Situations Worsened with the Arrival of the Internet?

Are there countries whose situations worsened with the arrival of the internet? I've been arguing that there are lots of examples of countries where technology diffusion has helped democratic institutions deepen. And there are several examples of countries where technology diffusion has been part of the story of rapid democratic transition. But there are no good examples of countries where technology diffusion has been high, and the dictators got nastier as a result. more

The URS Also Applies to These Top-Level Domains

The Uniform Rapid Suspension System (URS) is often described as a domain name dispute policy that applies to the new gTLDs. While that's true, the URS is actually broader than that. The URS (a quick and inexpensive policy that allows a trademark owner to obtain the temporary suspension of a domain name) applies to more than just the new gTLDs, that is, those top-level domains that are a part of ICANN's 2012 domain name expansion. more

Mobile Broadband Penetration in Asia

The advent of mobile broadband triggered a huge change in broadband access across Asia. Following more than a decade of strong growth in almost all mobile markets in the region, an amazing transition to new generation mobile networks and services took place. By end 2014 there were a total of 1.2 billion mobile subscribers and with annual growth running at over 40% coming into 2015 the numbers were expected to hit 1.7 billion by end-2015. more

Topics

Cybersecurity

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days