Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

How the Slow Adoption of the Cloud Has Impacted 3 Industries

"It's in the cloud" has become a phrase we don't think twice about, but less than a decade ago, you might have received some awkward looks using this kind of talk in the boardroom. Cloud-based software applications are heralding the fourth industrial revolution that will eventually lead to the industrial internet of things (IIOT). The reasons for this are because... more

Australia Sets Rules for Access on Incumbent’s Fixed Network

In December 2005 the Australian Competition & Consumer Commission (ACCC) launched an inquiry into the future regulation of wholesale access on fixed networks. It has now announced a final decision, following a public inquiry, under section 152AL of the Trade Practices Act 1974 on six fixed-line services that had been due to expire at the end of this month. The following will remain declared services until July 2014... more

For ccTLD Registries: 4 Steps to Guaranteed Success

The introduction of New gTLDs has increased the rate at which individuals and businesses are getting online today and we're already seeing mainstream adoption of New gTLDs. By going the extra mile to spread awareness about their extensions among the masses, New gTLD Registries are bringing attention to their value propositions and, more importantly, are sharing the idea of 'getting online' to audiences. more

Change of Leadership at ICANN as Cerf Makes Way for Intellectual Property Expert

Intellectual property and computer law barrister Peter Dengate-Thrush has been elected as new Chairman of the Board of the Internet Corporation for Assigned Names and Numbers (ICANN). The former chairman of InternetNZ, the country-code top-level domain (ccTLD) registry for New Zealand (.nz), and cofounder of the Association of Asian Pacific ccTLDs, succeeds the legendary Vinton Cerf... more

3 Steps for Managing ICANN Registry Compliance

If you are like the majority of Registry Operators we have spoken to, you may now be thinking that compliance with your new gTLD Registry Agreement is much more difficult than first envisaged -- especially if you are one of the lucky operators which have been chosen for ICANN's latest round of registry audits! You may also be surprised at the number of questions and requests that you need to respond to. more

Toward WSIS 3.0: Adopting Next-Gen Governance Solutions for Tomorrow’s Information Society

For the WSIS community to be effective in meeting its ambitious goals adopted in December 2015, it will have to become more evidence-based and innovative. At the beginning of the new millennium -- before the arrival of Facebook and Twitter -- Kofi Annan, then Secretary General of the United Nations, called for the creation of an inclusive "information society" -- "one in which human capacity is expanded, built up, nourished and liberated, by giving people access to the tools and technologies they need, with the education and training to use them effectively." more

The Age of Information Ubiquity… Passed?

My first day back at the office after a summer of working remotely featured a traffic jam of the sort that reminds me why I hate commuting: one car crash, a key highway closed, and no reasonable surface road alternative routes. There's just nothing to do but suffer the consequences when that road backs up. I had an early team meeting and was already scrambling to leave the house with a buffer of half the regular commute time. It wasn't going to be enough. I dropped a note to my team, who'd all be participating from their locations (in other cities and countries), and warned them. more

Holding Times – A Phenomenon Happening With ISP Networks That No One Seems to Talk About

During the last year, we saw a big change in the nature of our broadband usage in that many of us are connecting to remote work or school servers, or we are connecting to long Zoom calls. We already can see that these changes have accelerated the average home usage of broadband. OpenSignal reports that the average broadband usage per home grew from 274 gigabytes per month just before the pandemic up to 462 gigabytes per month measured at the end of the first quarter of this year. more

GDPR Fine Enough or More Disclosure?

The UK cares about its citizens' privacy to the tune of a $229 million (US) fine of British Airways for a breach that disclosed information of approximately half a million customers. It's exciting -- a significant fine for a significant loss of data. I think GDPR will lead to improved security of information systems as companies scramble to avoid onerous fines and start to demand more from those who provide information security services and products. more

ICANN Clarifying Questions - How to Respond (Part 2 of 3)

In the first part of this series on ICANN's impending Clarifying Questions period, I outlined what you can expect in terms of question structure. Here I would like to outline how the points work and provide some advice on how to answer questions for best success. more

Is Technology the Problem?

We do live in turbulent times. There is such a lot happening, with many people feeling overwhelmed and lost. One of the reasons given why we do have these problems is technology. I would argue against that. In all reality, technology is a tool that we can use, and yes, we all know that we can use it for the wrong reasons (cars kill people, atom bombs, killer robots, chemical and biological warfare and so on). However, we have learned to live with it, and in general, the outcome from science, innovation and technology has been positive. more

Threat Intelligence Platform in Action: Investigating Important Use Cases

As technology gets more and more sophisticated, tech-savvy cybercriminals are having a field day devising increasingly ingenious ways to steal confidential data from ill-prepared targets. What this means is that an equally sophisticated cybersecurity response is needed to keep attackers at bay. This would involve re-examining reactive cybersecurity practices and adopting a proactive approach towards an active search for risks and vulnerabilities with the help of threat intelligence (TI). more

Top Level Domains and a Signed Root

With DNSSEC for the root zone going into production in a couple of weeks, it is now possible for Top Level Domain (TLD) managers to submit their Delegation Signer (DS) information to IANA. But what does this really mean for a TLD? In this post we're going to try to sort that out. more

The West Is Shooting Itself in Its IT Foot

In our globalized economy, it is vital that we do establish levels of fair trade, and the USA is right in addressing that issue. However, making technology a key element of the trade war will backfire. Let's take (again) the Huawei issue as an example. The company has admitted that the US boycott is hitting them severely with an estimated loss of $30 billion in revenues. One of the other elements of the trade boycott is that Google is no longer allowed to provide... more

Why Homegrown Subscriber ID Solutions Limit Problem Solving

Most service providers are aware that there needs to be a simple, fast way to identify subscribers. Unfortunately, in reality, mapping IP addresses back to subscribers for identification purposes - such as lawful interception requests or acceptable use policy violations - can be complicated. It usually involves analyzing data sets, completing manual audits, or reliance on multi-step solutions. more

Topics

DNS

Sponsored byDNIB.com

Threat Intelligence

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days