Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Update on Assigning 32-bit ASNs

As mentioned in Assigning 32-bit ASNs published one year ago, 16-bit Autonomous System Numbers (ASNs) are becoming a scarce resource just like 32-bit IP addresses. In 2007, the Internet Engineering Task Force (IETF) addressed this scarcity by developing a new format: 32-bit AS Numbers (RFC 4893), which increased the supply of ASNs to four billion. more

1st Sealed Bid gTLD Contention Auction Completed for the String .One

The first sealed bid auction for a new gTLD contention set was completed last week for the string .One. To our knowledge this is 1st auction to be conducted by a third party other than Applicant Auction to settle a contention set and marks the first time a new gTLD contention set was settled through a "Single Sealed Bid Second Price" auction... The winning bidder for the new TLD extension was One.com of Dubai, AE, which will act as the worldwide registry for .One domains. more

The Importance of Contributing to the ITU CWG-Internet Open Consultation by 1 August 2013

The Council Working Group on international Internet-related public policy issues (CWG-Internet) was established as a result of resolutions at the 2010 ITU Plenipotentiary to discuss a wide range of Internet issues that had public policy implications... These are all issues that concern all stakeholder groups in the Internet ecosystem. And, indeed, these are all issues being discussed in varying levels of detail by all stakeholder groups. The difference with the CWG-Internet, however, is that both its documents and meetings are closed to all non-Member State representatives. more

Cyber Scorecarding Services

Ample evidence exists to underline that shortcomings in a third-parties cybersecurity posture can have an extremely negative effect on the security integrity of the businesses they connect or partner with. Consequently, there's been a continuous and frustrated desire for a couple of decades for some kind of independent verification or scorecard mechanism that can help primary organizations validate and quantify the overall security posture of the businesses they must electronically engage with. more

Can Satellite Broadband Be Affordable?

When we first heard of the possibility of broadband from low-orbit satellites, there was a lot of speculation that the technology could bring affordable broadband to the masses around the globe. The latest announcement from Starlink shows that affordable broadband is probably not coming in the immediate future. Starlink announced a premium tier of service with a $500 monthly fee for 150-500 Mbps. more

Application Delivery Controller: So Long, Crystal Ball

Do you know how big your web site will be in a year? You probably can guess, or even estimate how much traffic will hit your site in a year. You can also use millennia proven methods such as Crystal Balls, Animal Entrails or even Coffee Stains. But seriously, it is no easy task evaluating site growth in this volatile, ever changing economy. A key element in the scaling of any web site is the Application Delivery Controller (ADC). more

Does the US Get the Bold Broadband Vision Congress Has Asked For?

The US Congress asked the FCC for a bold plan to achieve the bold vision expressed by the Congress... We discussed this issue in our Big Think group and here are some comments. more

Searching for Truth in DKIM: Part 5 of 5

Throughout this series of articles we've been talking about DKIM, and what a valid DKIM signature actually means. .. What this means for senders (of any type) is that with DKIM, you’re protected. On the internet, your domain name is a statement of your brand identity – so by signing messages with DKIM, you can finally, irrevocably tie those messages to your brand. more

Protection Is Only One Side of the Security Coin

"Security is all about protecting the user." That's the comment that came up the other week in the twittersphere that kicked off a not-unexpected trail of pro and con tweets. Being limited to 140 characters makes it rather difficult to have a deep and meaningful discussion on the topic and the micro-blogging apparatus isn't particularly conducive to the communicating the nuances of a more detailed thought. So I thought I'd address the topic here in blog format instead. more

Is There a Role for ICANN in Satellite Internet Governance?

A recent invitation to participate in a webinar to discuss ICANN's Role in Satellite Internet Governance as an enabler of UN Sustainable Development Goal (SDG) 9 prompted me to consider this issue. As a legal scholar with expertise in telecommunications infrastructure, I had much to say and discuss about the new mega-constellation phenomenon and its potential role in achieving SDG9, which, for me, is a multifaceted and fascinating subject. more

All About the Copyright Office’s New DMCA System

Website publishers that want to protect themselves against claims of copyright infringement must participate in a new online registration system created by the U.S. Copyright Office for the Digital Millennium Copyright Act ("DMCA") -- even if they have participated previously. The new program, launched on December 1, 2016, offers a mandatory online registration system for the DMCA that replaces the original (and clunky) "interim" designation system, which was created in 1998. more

Better Than Best Efforts Routing of Mission Critical Traffic and the FCC

It appears that the FCC will permit exceptions to the standard, plain vanilla best efforts routing standard for Internet traffic, such as the paid peering arrangement recently negotiated between Comcast and Netflix. In both academic and applied papers I have supported this option, with several major conditions... With no opposition that I have seen, companies like Akamai offer better than best efforts routing of "mission critical" traffic from content source to last mile, "retail" Internet Service Providers. more

FISMA Standards Could Have a Major Impact on the Private Sector

The public is taking an increasing interest in ensuring that IT assets of federal agencies are protected from cybersecurity attacks. FISMA is addressing this concern, in part, by initiating a standard setting process for continuous monitoring. The actions taken by NIST for the federal sector could have a very significant impact on the private sector because pending legislation would provide the federal government with the authority to mandate cybesecurity measures on the private sector. more

Quantifying the Benefits of Fiber

Dr. Bento J. Lobo, an economist at the University of Tennessee at Chattanooga undertook a study to quantify the benefits of the municipally-owned fiber network in Chattanooga. Any citywide fiber network brings economic development to a community, but a municipally-owned system brings additional benefits because of the way that the business is more deeply integrated into the community. more

Cuba Rolls Out 3G Mobile Access

After several months of trials, ETECSA announced the availablity of third-generation mobile access to their national intranet and the global Internet in a televised "round table." The prices are quite steep for a typical Cuban and I suspect there would be relatively few subscribers among the 34% of the population that is not yet covered. Furthermore, many users will have to buy new phones to use the service. (There are still 1,084 second-generation mobile base stations in Cuba). more

Topics

Threat Intelligence

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days