Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

RIPE NCC Members Secure their Resources Using Certification

Resource certification verifies that an Internet number resource (IP address space or autnonomous system number) has legitimately been allocated by a Regional Internet Registry. It will also benefit every network operator and Internet user in the world by helping to ensure long-term routing stability. more

Net Neutrality, Slippery Slopes &  High-Tech Mutually Assured Destruction

Ten years ago, Nobel Prize-winning economist Milton Friedman lamented the "Business Community's Suicidal Impulse:" the persistent propensity to persecute one's competitors through regulation or the threat thereof. Friedman asked: "Is it really in the self-interest of Silicon Valley to set the government on Microsoft?" After yesterday's FCC vote's to open a formal "Net Neutrality" rule-making, we must ask whether the high-tech industry -- or consumers -- will benefit from inviting government regulation of the Internet under the mantra of "neutrality." more

Telcos Players in the U.S. Set to Become Even Lazier

With all of the current turbulence in the American society, it is no wonder that its telecommunications market is also under severe pressure. In his election campaign, Trump promised his American supporters to make changes to what he called the Washington swamp, but it has become clear that the opposite is happening. While in previous Administrations lobbyists were at least somewhat separated from the politicians, now many of these lobbyists are actually part of the Trump Administration. more

Sovereignty Strikes the Internet: When Two Don’t Become One

On January 28, the UK government was set to announce whether it would allow Huawei, the Chinese information and communication technologies provider, to develop its 5G infrastructure. Given Brexit and its need to form new alliances, the decision was marked as a significant moment for the UK's trade future. Leading up to the day of the decision, the UK was subjected to a significant amount of pressure from the United States government to reject any deal with Huawei. more

The Costs of a Dysfunctional Relationship - Part 2

Part 1 described the impasse between the ICANN board and the Governmental Advisory Committee (GAC) over the introduction of new gTLDs. This part analyzes the conflicts and offers suggestions for beginning to resolve them. ... Some of these conflicts turn out to have clear answers. Approving the DAG before public comments could be considered violated ICANN's bylaws, but the board has unmistakable authority to reject the GAC's advice. more

The ANA and Hand-Wringing

The Association of National Advertisers is at it again, this time spelling the death of new gTLDs barely after they emerge from the gate. In 1982, at the dawn of the video age, Motion Picture Association of America President Jack Valenti infamously told Congress, with more than one unfortunate reference to various types of violent crime, that the advent of the VCR would spell immediate and irrevocable doom to the motion picture industry, and that the device should certainly be thrown to the scrap heap even before its arrival. more

ATRT and the Dog That Didn’t Bark

A favorite Sherlock Holmes story has the detective unraveling the mystery of a murdered horse trainer and the theft of a prized thoroughbred by concentrating on the fact that a dog didn't bark in the night when the horse was stolen. This silence implied for Holmes that it was no stranger who entered the stall. From this he deduced that it was the trainer himself who had removed the horse to fix a race for his profit and that the horse had killed the trainer when he tried to cripple it. ICANN 41 has been afflicted by a similarly curious silence. more

We NEED More Young Women to Consider Careers in Information and Communications Technologies (ICTs)

Science, technology, engineering and mathematics (STEM) careers are some of the most challenging, dynamic, and lucrative in the world. STEM fields are crucial to driving innovation and sustained economic prosperity, yet finding the right talent to make businesses sustainable appears to be harder than ever before as 2.4 million STEM jobs will be unfilled by 2018. more

WTSA, WCIT, WTPF: Apocalypse Now?

The year 2012 isn't meant to be apocalyptic, and with a little forethought it won't be, but it is the year in which we will reopen the International Telecommunications Regulations (ITRs). For many companies this will be bad news for reasons that are already well-understood and for new reasons that countries keep piling onto the agenda: a recent favorite from Russia calls for the treaty to govern and regulate all telecommunications services, "existing, emerging, and future." more

Cyberspace Solarium Commission Report

The Cyberspace Solarium Report released today is another, in an endless string of reports, that disgorge from Washington committees dealing with the eternal mantra of "defending American interests and values in cyberspace." The challenges (and many reports) here trace back 170 years when transnational telecommunication internets emerged. The dialogue and reports scaled in the 1920s with the emergence of radio internets and cyber threats, then again in the early 1980s... more

The Data Divide

A report from the Center for Data Innovation warns of a new broadband gap they call the data divide, which is when some parts of society are not sharing in the big societal advantages that come from using and understanding the huge amounts of data that are being generated today. The report includes examples of the data divide that make the concept easier to understand. more

An Agreement in Geneva

For all the tranquility at the end of last week's World Technology/ICT Policy Forum (WTPF), E.B. White's words come to mind: "there is nothing more likely to start disagreement among people or countries than an agreement." One also has to wonder though what a literary stylist like White would think of the linguistic gyrations demanded by the compromises reached at the WTPF in Geneva, and what they portend. more

Protection Is Only One Side of the Security Coin

"Security is all about protecting the user." That's the comment that came up the other week in the twittersphere that kicked off a not-unexpected trail of pro and con tweets. Being limited to 140 characters makes it rather difficult to have a deep and meaningful discussion on the topic and the micro-blogging apparatus isn't particularly conducive to the communicating the nuances of a more detailed thought. So I thought I'd address the topic here in blog format instead. more

Deadline of Feb 1 for Nominations for Public Interest Registry (.ORG Operator) Board of Directors

Would you be interested in helping guide the future of the Public Interest Registry (PIR), the non-profit operator of the .ORG, .NGO and .ONG domains? If so, the Internet Society is seeking nominations for three positions on the PIR Board of Directors. The nominations deadline is 23:00 UTC on Thursday, February 1, 2018. Find out more about the positions and the required qualifications. more

Attacking DNS Abuse: The Next Amendments Needed

Abusive behavior that leverages the domain name system (DNS) continues to be a problem, with a reach that has been widely and credibly documented. There is little doubt that bad actors continue to use the DNS for nefarious and costly purposes. While the amendments made in 2024 to ICANN's Registry Agreement (RA) and Registrar Accreditation Agreement (RAA) were a step in the right direction, more advanced tools are needed to bring abuse rates down. more

Topics

DNS Security

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days