Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Reflections on the 20th Anniversary of the Dot-Com

Twenty years ago (Monday) on June 8th, 1989, I did the public launch of ClariNet.com, my electronic newspaper business, which would be delivered using USENET protocols (there was no HTTP yet) over the internet. ClariNet was the first company created to use the internet as its platform for business, and as such this event has a claim at being the birth of the "dot-com" concept which so affected the world in the two intervening decades. There are other definitions and other contenders which I discuss... more

Do You .RUN?

I am not such a good runner but I have decided to run early in the morning. It is what I just started to do today and to be honest, I hated it. But it does not matter, I will run again tomorrow morning... So what is the market for .RUN? Do runners communicate on Internet? Do they need to communicate because they are runners? Is .RUN for runners only? more

Is Teleworking Here to Stay?

Broadband networks are stretched thin today due to the large numbers of adults and students working from home. There are many stories on the web that indicate that a lot of employees are not going to be going back to the office when the pandemic is over. Here are two stories about a trend towards more teleworking from the dozens that a Google search uncovered. more

Community Networks Could Help Strengthen the Caribbean Internet

By some estimates, only half of the world's population has internet access, leaving the other half at a sizeable competitive disadvantage. This profound connectivity gap is especially significant in the unserved and underserved areas of developing and least-developed countries. For people who live in these places, Internet connectivity is not just about the Internet. It is a lifeline that gives access to electronic commerce and telehealth services, distance learning, social and political engagement, government services... more

Reducing the Risks of BYOD with DNS-Based Security Intelligence; Part 1: Understanding the Risks

Ah, BYOD. How I love thee. BYOD, or "Bring Your Own Device", gives me choices. I can use a device at work I actually like and am most effective with. (How did I ever get by without my iPad?) But BYOD comes with challenges. Personal devices can be infected with malware. Once they're connected to an enterprise's network, they can be controlled by a bot master to hijack enterprise resources and wreak havoc as part of a botnet. more

Critical Role for R&E Networks+Commercial Clouds in US Government “Big Data” Initiative

It is great to see US and European governments undertake initiatives to promote the development of research into Big Data utilizing commercial clouds. Many cloud providers are offering free resources to support these initiatives. R&E networks will play a critical role in linking researchers to the commercial clouds and developing collaboration platforms and portals. more

The Uses and Abuses of Cryptography

Another day, another data breach, and another round of calls for companies to encrypt their databases. Cryptography is a powerful tool, but in cases like this one it's not going to help. If your OS is secure, you don't need the crypto; if it's not, the crypto won't protect your data. In a case like the Anthem breach, the really sensitive databases are always in use. more

The Early History of Usenet, Part VIII: The Great Renaming

The Great Renaming was a significant event in Usenet history since it involved issues of technology, money, and governance. From a personal perspective -- and remember that this series of blog posts is purely my recollections – it also marked the end of my "official" involvement in "running" Usenet. I put "running" in quotation marks in the previous sentence because of the difficulty of actually controlling a non-hierarchical, distributed system with no built-in, authenticated control mechanisms. more

Reaching Critical Mass for Gigabit Connections

The statistics concerning the number of gigabit fiber customers in the US is eye-opening. OpenVault tracks the percentage of customers provisioned at various broadband speeds. At the end of 2019, the company reported that 2.81% of all households in the US were subscribed to gigabit service. By the end of the first quarter of 2020, just after the onset of the pandemic, the percentage of gigabit subscriptions had climbed to 3.75% of total broadband subscribers. more

Brand Abuse and IP Infringements – Part 1: Brand Impact

In this two-part blog series, we take a closer look at brand abuse and intellectual property (IP) infringements. In this first article, we explore the components making up a company's IP and how online content can affect a brand's value, both actual and perceived... The IP held by an organization -- i.e., the portfolio of brands, trademarks, and other intangible assets that provide it with its distinctiveness, and protect it from unfair competition in the marketplace... more

Will Electronically Steered Antennas Replace Parabolic Antennas in Satellite Ground Stations?

Three recent developments make me wonder whether we are on the cusp of a shift in satellite ground station technology from parabolic to electronically steered antennas (ESAs). The U.S. Space Force operates the Satellite Control Network, with 19 parabolic antennas at seven locations around the world. more

Verisign’s Role in Securing the DNS Through Key Signing Ceremonies

Every few months, an important ceremony takes place. It's not splashed all over the news, and it's not attended by global dignitaries. It goes unnoticed by many, but its effects are felt across the globe. This ceremony helps make the internet more secure for billions of people. This unique ceremony began in 2010 when Verisign, ICANN and the U.S. Department of Commerce's National Telecommunications and Information Administration collaborated... more

What New gTLDs Mean for Developing Economy Applicants?

Everyone seems excited about new gTLDs being just around the corner. All of the overarching issues will soon be resolved: GAC and the ICANN Board will sit in a room and the wisdom of our leaders, ICANN and National, will produce the grand compromise. The starting flag will be flourished! A thousand flowers will bloom! Hooray! But it is only the developed world that can be excited about this, for it is hard to understand how the developing world could be very excited about an overpriced round of gTLD offerings that is unfairly beyond their means. more

Patient Care Suffers When Data Security is a Budgetary Concern

According to a recent Homeland Security News Wire article, nearly 8 million patient medical records were compromised over the course of the previous two years due to data security breaches. As more hospitals and patient care providers move to store patient data electronically -- primarily as a cost savings effort -- the risk and exposure of our private medical information increases while our individual control over this information diminishes. more

Gaming and Broadband Demand

Broadband usage has spiked across the US this year as students and employees suddenly found themselves working from home and needing broadband to connect to school and work servers. But there is another quickly growing demand for broadband coming from gaming. We've had online gaming of some sort over the last decade, but gaming has not been a data-intensive activity for ISPs. more

Topics

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

DNS Security

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days