Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Providers Eye OTT Content at The Independent Show 2013

The future of broadband was the main focus of The Independent Show 2013. In particular, the event highlighted how the convergence of video, phone, Internet, and wireless broadband is shaping the industry. As with previous years, the show focused strongly on the programming community and there was no shortage of new, emerging programming to keep attendees interested. One of the breakout sessions focused on the growth of high-quality over-the-top (OTT) content distribution and how NCTC members could take advantage of this trend to target subscribers drifting away from traditional cable. more

The Next Development in Wireless Broadband

In the USA the FCC has started the discussion on the next level of telecoms in the wireless market, aimed at making spectrum in bands above 24GHz available for flexible-use of wireless services, including next-generation, or 5G networks and technologies. New technologies such as massive-MIMO are going to make it possible to deliver 'fibre-like' speeds over short distance wireless networks operating in the 24+GHz bands. This will make the technology especially useful for high-speed broadband services in densely populated areas. more

Remote Work Demands Encryption

Now that we are all working from home (WFH), the need for encryption must also increase in priority and awareness. Zoom's popular video conferencing solution got in hot water because they promised "end-to-end" encryption but didn't deliver on it - prompting some organizations to ban it from use altogether. Encryption protects confidential information from being exposed in transmission, providing a secure way for the intended recipient to get the information without snooping by others. more

Persistent Threat Detection on a Budget

If there's one simple - high impact - thing you could do to quickly check whether your network has been taken over by a criminal entity, or uncover whether some nefarious character is rummaging through your organizations most sensitive intellectual property out of business hours, what would it be? In a nutshell, I'd look to my DNS logs. It's staggering to me how few security teams have gotten wise to regularly interrogating the logs from their recursive DNS servers. more

One Step Closer to an Accountable ICANN

We believe that certain updates in the latest draft that limit the scope of ICANN's Mission, as specified in paragraph 188, could explicitly prevent ICANN from actively enforcing its contracts with Registries and Registrars or use contracts as a tool to implement consensus policies in the future. We suggest in our comments that revised bylaw text be added explicitly stating that the enforcement and creation of ICANN's contracts with Registries and Registrars... more

GFC Slows Down Cloud Computing Developments

The ongoing Global Financial Crisis (GFC) has also had a significant impact on some of the developments in our industry -- for example, cloud computing. It looks as though the GFC is the key reason that developments in cloud computing have not happened more quickly. Industry evidence suggests that shifting to the cloud saves 20%-50% off current IT deployments, and, according to its advocates, it can be many times more than that. more

FCC’s McDowell Warns of “Irreversible International Regulation”

The stakes of the U.S. communications policy debates are larger than many assume. Subjecting broadband to new and extensive regulation in the U.S., says FCC Commissioner Robert McDowell in today's Wall Street Journal, could invite a regulatory ripple effect across the globe. more

In Response to ‘Networking Vendors Are Only Good for the Free Lunch’

I ran into an article over at the Register this week which painted the entire networking industry, from vendors to standards bodies, with a rather broad brush. While there are true bits and pieces in the piece, some balance seems to be in order. The article recaps a presentation by Peyton Koran at Electronic Arts (I suspect the Register spiced things up a little for effect); the line of argument seems to run something like this... more

Survey: Public Interest Representation in the Information Society

All civil society organisations and other self-identified public interest representatives in the regime of Internet governance and related areas of information and communications policy are invited to complete a survey titled Public interest representation in the information society. This survey contributes towards the development of a map of Internet governance... more

Freedom on the Internet: Where Does Your Country Stand?

Out of the 3 billion users on the Internet, how many can trust that their online communications will not be monitored or censored? How many feel safe that they can express their opinions online and will not be arrested for their ideas? How many feel confident in communicating anonymously online? For us at the Internet Society this is a key element of an Internet of opportunity: Internet access is only meaningful if people can trust that their fundamental rights will be respected and protected online as well as offline. more

If It’s Not Neutral It’s Not Internet

The success of a proposal by AT&T and Verizon to end net neutrality does not threaten the Internet. The broadband customers of AT&T and Verizon will just no longer have access to the Internet. The development appropriately creates alarm among AT&T and Verizon's customers, but the combined customer bases of these companies represent less than 2% of the billion or so users of the Internet. The fact that access to the Internet requires net neutrality does not depend on laws passed by the US Congress or enforced by the FCC. Neutrality arises as a technical and business imperative facilitating the interconnection 250,000 independent networks that choose to participate in the Internet. more

Mix It Up: Key Ingredients of Successful Cloud Management Systems

The cloud cuts both ways; while the ability to spin up compute power on demand has empowered even small businesses to compete on a global scale, this same flexibility has led to a significant amount of "cloud sprawl." According to Tech Radar, 61 percent of companies surveyed said cloud sprawl - both from employees using unauthorized services and not fully utilizing approved resources - is responsible for business-wide inefficiencies. Bottom line? more

Why Platform Regulation Concerns ICANN

With the publication of the Australian Governmental report on Digital Platforms1and in the light of the ongoing work on the EU's Digital Services Act, the spotlight of policymaking is on platforms such as Google, Facebook and Amazon. It is natural that members of the ICANN community want to discuss the role of platforms within the ICANN framework, but sadly and predictably, the usual bylaws jockeys and keepers of the true ICANN faith were quick to stifle the conversation. more

Insights from ARI’s New TLD Workshop

Never let it be said that group therapy isn't effective. Prior to hosting a new Top-Level Domain (TLD) workshop for a group of Australian applicants last week, the only therapy I would have advised for new TLD applicants was electroshock therapy - given the confidence-sapping delays and the catastrophic impact of constant changes to the program such as Digital Archery, Name Collisions and GAC Advice. more

AOL Issues This Week to Look Out For

A few issues may affect some senders/outbound mail across the email industry this week... A few folks in the industry said they saw false positives of RLY:B1 blocks since Monday the 8th. If you notice these, ensure you follow necessary procedure: check to see all is good on your end, and then submit a support ticket to AOL's postmaster group. more

Topics

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

DNS Security

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days