Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Trump, Tides, and the US Tech Sector

When a tax is too high people avoid it, and when the political cost of supporting the US government becomes too high, foreign governments will avoid it too. Add to that cost America's new inclination to withdrawal, and consider the muddy tidal flat on which could soon list the hull of what used to be American technological primacy... When countries try to develop technology policies to compete with the United States, they often begin with rules over immigration. more

Many Libraries Still Have Slow Broadband

During the recent pandemic, many homes came face-to-face with the realization that their home broadband connection is inadequate. Many students trying to finish the school year and people trying to work from home found that their broadband connection would not allow them to connect and maintain connections to school and work servers. Even families who thought they had good broadband found they were unable to maintain multiple connections for these purposes. more

The Trajectory of the Broadband Industry

For well over a decade, it was fairly easy to understand the trajectory of the broadband industry. In the residential market, cable companies snagged all the growth while telcos shrank as customers abandoned DSL. Other technologies like fiber or fixed wireless gained customers but were a blip on the national scale. more

At the NCPH Intersessional, Compliance Concerns Take Centre Stage

The non-contracted parties of the ICANN community met in Reykjavík last week for their annual intersessional meeting, where at the top of the agenda were calls for more transparency, operational consistency, and procedural fairness in how ICANN ensures contractual compliance. ICANN, as a quasi-private cooperative, derives its legitimacy from its ability to enforce its contracts with domain name registries and registrars... more

Abuse Reporting: Names vs Numbers

For email usage, abuse reporting requires cooperation between senders and receivers. That's why RFC 5965 specified a standard format for it. However, Wikipedia lists only 18 feedback providers today. It is often said that the number of legitimate mailbox providers in the world is rather small, possibly some hundreds of thousands, but certainly more than that. more

Carriers Are No Longer Operators

The classic view of a wireline or mobile carrier is that it was an "operator", it ran out cables, raised poles, installed switches, constructed central offices and base stations and the like. However, the figures from Nokia Siemens Networks (NSN) show that firm is making 45% of its sales from services, meaning it is constructing and managing networks on behalf of "carriers". NSN is "carrying" a lot of telecoms traffic. This has been accelerated by the global financial crisis... more

Another G Generation: The Promise of 5.5G

I've read several articles coming out of the Mobile World Congress trade show in Barcelona, Spain, and one of the common threads is that there was a lot of talk about 5.5G (or 5G Advanced) - the next iteration of 5G. My first question on reading about this was to ask what new features are being discussed that were not part of the original announced promises of 5G. I went back and read a few of my blogs and other articles that were written when 5G was first announced. more

ICANN Clarifying Questions - How Are They Structured? (Part 1 of 3)

Several weeks ago ICANN issued clarifying questions to approximately 50 of the 1,930 new gTLD applications submitted last spring. Some of our clients were selected for this pilot effort and we've had the opportunity to review seven sets of clarifying questions totaling approximately 30 individual questions. ICANN has indicated that in late November they will begin issuing Clarifying Questions to the balance of applicants. more

Suggestions on IDN Variant Management

To some applicants, ICANN's variant management policy in DAG4 has become a big obstacle to the new generic Top-Level Domain (gTLD) application. The policy is to delegate the string while reserving the variants, and these variants will not be delegated until a sound mechanism is developed and the desired variants are evaluated. But for some languages, Chinese for example, the so called string and its variant, namely simplified Chinese and traditional Chinese, are equivalent and must be simultaneously delegated. more

Our Digital Illiteracy

Pew Research Center recently surveyed 4,272 adults and tested their knowledge of basic computer topics. The results showed that there was a lack of general knowledge about a few of the terms that are important for how people use the Internet. For example, the survey showed that only 30% of survey takers knew that website starting with https:// means that the information provided over that site is encrypted. Only 28% of respondents understood the concept of two-factor authentication... more

The Strange Structure of ISP Service Semantics

I have been having a number of conversations recently with several clients and colleagues about "semantics". It's clear that there is not a lot of clarity on this philosophical subject! Whilst is may be an obscure issue, it is a very important one. Our ideas lead us to take actions, and if we want those actions to have the consequences we had in mind, then we need to have done our epistemological homework. more

When a Domain Name Dispute is ‘Plan B’

While having a backup plan is usually a good idea, it's often not an effective way to obtain someone else's domain name - at least not when Plan B consists of a company filing a UDRP complaint with the hope of getting a domain name to which it is not entitled and could not acquire via a negotiated purchase. "Plan B" as a derogatory way of describing an attempted domain name acquisition usually arises in the context of a domain name that is not protected by exclusive (or any) trademark rights, or where the complainant clearly could not prevail in a UDRP proceeding. more

NTAG Chair Blog: The Road Ahead

The next six months will be a pivotal period in ICANN & New gTLD applicant relations. April 2014 will mark one year since the Governmental Advisory Committee - better known as the GAC - issued advice that put nearly 400 applications on hold. The Name Collision issue, while no longer a gate for many applicants, currently puts thousands of second level domain names on hold. March will be a key inflection point for this issue as well. more

Dictators Could Rule the Internet: A Response to Robert McDowell and Gordon Goldstein

The Obama administration's proposals to regulate the Internet according to common carrier rules have set off a storm of opposition from carrier interests, whose scale and reach have been impressive. The arguments they muster are fatuous and deceitful. The Internet is not what the carriers own or have created; the Internet is what they seek to extract money from. "Regulating the Internet" is not the issue; regulating the carriers is. more

Google and ETECSA Will Agree to Exchange Internet Traffic Without Charge

Google and ETECSA have signed a memorandum of understanding agreeing to negotiate a peering agreement that would allow cost-free data exchange between their networks once an undersea cable physically connects them. Google has worked hard to establish a relationship with ETECSA and the Cuban government. In recent years, Cuba, not the US, has limited the Cuban Internet. This agreement telegraphs a change in Cuban policy. more

Topics

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days