Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

The Incredible Leakyness of Commercial Mailers (Cont’d)

Last week I blogged about the way that lots of otherwise legitimate companies leak e-mail addresses to spammers. Here's a few more thoughts. One person asked how I knew that these were leaks, and not dictionary attacks, since the addresses I use are fairly obvious, the name of an often well known company @ my domain. It's a reasonable question, but the answer is simple... more

Trump’s Strange WRC-19 Letter

The 2019 World Radiocommunication Conference (WRC-19) is underway. It is the latest in a continuum of treaty-making gatherings that began in 1903 and is devoted to the now 116-year-old art of globally carving up the radio spectrum among designated uses that is instantiated in the Radio Regulations treaty agreement. Not unexpectedly, the event includes designation of 5G spectrum that flows from the requirements long set in 3GPP and GSMA. more

The International Space Station’s Canadian Music Video Collaboration - and Google+ Hangout

As much as we talk here about the inner workings of the Internet's infrastructure, there are times when you have to just sit back and look at how incredibly cool some of the things are that are enabled by the Internet. For example, last week I was delighted to stumble across this excellent music video collaboration between the International Space Station's Canadian commander Chris Hadfield, the Canadian band Barenaked Ladies along with a Canadian student choir. more

Do-It-Yourself Rural Fiber

I doubt that any elementary school in the US has fiber to the premises, but, in 2013, an elementary school in rural Bhutan was connected to the Internet using optical fiber in the "last mile." They were able to connect the school because the cabling they used, metal-packed armored cable (M-PAC), which is modeled on undersea cables, does not have to be in a protective duct. It is 4mm in diameter, light and flexible, so it can be installed by supervised volunteers or unskilled workers.
 more

Going Postal

When a service is constructed using diverse components, then the way in which service revenues are distributed to the various suppliers of the components of the service can follow a number of quite distinct models. There are various forms of revenue redistribution models where the revenue per transaction is distributed to the various suppliers according to their inputs to support each transaction. more

Will Starlink Harm the Ozone Layer?

There was a paper published in June in the peer-reviewed Geophysical Research Letters titled Potential Ozone Depletion from Satellite Demise During Atmospheric Reentry in the Era of Mega-Constellations. As can be deduced by the lengthy title, scientists have uncovered a new risk coming from the reentry of low-orbit satellites through the atmosphere. more

Cybersecurity Standards Practices as Cyber Threats

One of the most embarrassing and pernicious realities in the world of cybersecurity is the stark reality that some industry cybersecurity standards practices are themselves cyber threats. How so? Most industry and intergovernmental standards bodies serve as means for assembling the constantly evolving collective knowledge of participant experts and package the resulting specifications and best practices as freely available online documents to a vast, diverse universe of users. more

The Technical Problems of the UN’s Internet Governance Forum Will Not Simply Solve Themselves

The Internet Governance Forum (IGF) has, for several years, experienced technical problems that have nothing to do with the local staff or host countries of the event. In fact, the volunteers who were part of the local staff of its 17th edition, held in the Ethiopian capital of Addis Ababa, were constantly overcompensating for issues with a great deal of goodwill.  more

Registry Data Quality Assessment

Accurate registration data is essential for the global registry system. To ensure that the RIPE Registry's data is correct, up-to-date and accurate, the RIPE NCC regularly checks the Registry data to fix inconsistencies and outdated information. We recently evaluated and analysed all IP address ranges registered in the RIPE Database and were pleased to find that 96.09% of those records are considered accurate. more

The TikTok Ban in Context

Donald Trump recently issued an executive order banning TikTok on the grounds that it was necessary to deal with the national emergency he had declared in an earlier executive order. He says he is concerned that TikTok might turn user's "information such as location data and browsing and search histories" over to the Chinese government. Trump does not site evidence of TikTok having shared data with China and TikTok says they have never shared user data with the Chinese government... more

Registered Your DMCA Contact Address Yet?

It is not much of an exaggeration to say that the Digital Millenium Copyright Act of 1998 makes the Internet as we know it possible. The DMCA created a safe harbor that protects online service providers from copyright suits so long as they follow the DMCA rules. One of the rules is that the provider has to register with the Copyright Office to designate an agent to whom copyright complaints can be sent. The original process was rather klunky; send in a paper form that they scan into their database, along with a check. more

Supporting SpaceX Starlink in Remote Communities

Five companies are developing low-Earth orbit (LEO) broadband satellite constellations, but, as of now, only SpaceX is planning to market directly to consumers. What sorts of support will they require? A pilot study of Starlink connectivity in remote Chilean communities may provide some answers to that question. The Chilean regulator, SUBTEL, has authorized a year-long pilot study of Starlink connectivity in remote, rural communities and is committed to supporting them during the year. more

Advantages of gTLD Portfolio Ownership

The essay outlines the advantages to owners of managing a portfolio of gTLDs. The advantages can lead to concentrations of ownership in a few hands, which is unavoidable but not necessarily harmful to consumers. Moreover, some of the advantages can lead to profitable complementary business models. Beyond the obvious advantage of economies of scale that lead to reductions in operating costs, there are a number of other sources of advantage. more

Behind the Curtain: Making IPv6 Work

Wouldn't it be nice if turning on IPv6 really was 'press one button and the rest is magic' easy? For some things, it is. If you're talking about client-side, enabling an IPv4-only home service on DSL or fibre really can be this simple, because all the heavy lifting is being done inside your ISP: you're not enabling IPv6 in the network, you're turning on the last mile. It was knocking at your door and you just had to let it in. more

Developed Economies Not Ready for an ICT-Driven Recovery

Some interesting but disturbing messages are emanating from Europe and America. With countries slowly coming out of the economic crisis and employment picking up again, it has become clear that the new jobs becoming available are driven by companies operating in the digital economy; very few of the 'old jobs' will become available. Many people in western countries are unprepared for this change and many new skills that are required are simply not available in sufficient numbers to counter the downfall in employment that has occurred over the last five years. more

Topics

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

DNS Security

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days