Congratulations. You have successfully defended your PhD dissertation, and it was a defining moment in your life. Your professorial experience and teaching assistant credentials are finally going to pay off. Further, you might have hundreds of citations, and PhDs are sought after because of their subject matter expertise. Well, that is OK. All that hard work and discipline allows you to use your newly earned moniker and seek out additional opportunities, either within the scope of academia or corporate options. Wait, Wait, Wait, not so fast. If you are thinking of just strolling into the industry and immediately begin earning a six-figure salary, think again, my friend. more
A recent study conducted by Brandsight has revealed that 28% of the top 500 most-highly trafficked sites now employ registry locking. In contrast, only 15% of the top 500 most highly-trafficked sites were leveraging registry locking in 2013. Back in 2013, only 356 of the top 500 most-highly trafficked sites could be registry locked, but that number has also risen significantly so that now 396 of the top 500 most-highly trafficked sites are eligible. more
I've always been impressed by the marketing folks at the big cable companies. They are masters of extracting money from customers willing to pay for better broadband. The latest example comes from Comcast. The company is introducing a new product in the Northeast that offers faster upload speeds -- for a price. Comcast knows that its biggest weakness is upload speeds. more
During the recent pandemic, many homes came face-to-face with the realization that their home broadband connection is inadequate. Many students trying to finish the school year and people trying to work from home found that their broadband connection would not allow them to connect and maintain connections to school and work servers. Even families who thought they had good broadband found they were unable to maintain multiple connections for these purposes. more
I'm writing this piece on the plane on my way back to Vancouver after a 12-day trip in China. I've written about China before, and every time I go, I understand and appreciate this complex country and culture a little more. If you think China is "up and coming," well, you might want to go and take a look for yourself. To be honest, I think they are already here. more
This is the first post in a series from Corey Grant, Senior Industry Consultant at ARI Registry Services, on what .brand TLDs need to do to get started and make the most of their TLDs... If you are a .brand Top Level Domain (TLD) and have a Registry Agreement from ICANN which you have not yet signed, you need to sign it by July 29, 2015. You're not alone; there are many others in the same boat -- all staring at their Registry Agreement trying to figure out what to do next. more
Developments in the telecommunications industry and the broader digital economy have opened up many new markets over the last few decades. Telecoms has changed from a more or less standalone, horizontally-organized industry to one that has become a key facilitator in a range of vertical markets. The keyword that is used to indicate that change is "smart." We are talking about smart transport, smart energy, smart cities and so on. more
Trust is the lifeblood of the Internet and central to everything that is done here. In order for the current 3.5 billion users to continue using the Internet and its services, and for the next billion users to connect to the Internet, trust is required. The importance of trust is seen even more in Africa where, though there is a high growth of Internet users, the e-commerce uptake rate is very low. Users are very reluctant to carry out financial transactions over the Internet because of fear of being attacked by cybercriminals. more
When I wrote the BuddeComm analysis on the introduction of Apple's iPhone I commented that the most significant element of this event was that it would begin to create cracks in the flawed business models of the mobile operators, who are desperately hanging on to their closed networks very much like the fixed operators were fighting tooth and nail against opening up their networks. We have seen that the fixed operators have largely lost this battle and we predict that the future of the mobile networks will be no different... more
In the previous decade and the beginning of this one, Server Load Balancing (SLB) reigned supremely in the web data center. Lately, a new class of products is replacing the older load balancers. These products are known as Application Delivery Controllers (ADC) and in the following paragraphs I will share my thoughts on the reasons for that. more
The applicant community is working its will on the rules for generic top-level domain (gTLD) auctions published by the Internet Corporation for Assigned Names and Numbers (ICANN). But, as always, ICANN is no pushover. ICANN posted the new gTLD auction rules for public comment last month after community outcry over the preliminary rules during ICANN's Public Meeting in Buenos Aires in November. more
When the scale of global surveillance carried out by the NSA (USA) and by the GCHQ (UK) was exposed by Edward Snowden through The Guardian, people around the world were shocked to discover how two established democracies routinely resort to methods that they have long deplored -- and rightly so -- in dictatorships, theocracies and other single-party arrangements. In a previous article, I lamented the fact that by carrying out this surveillance on an unprecedented scale, the US and the UK are, in fact, converging with the very regimes they criticize. more
Trump and his enablers are well known to disrespect if not disdain legal systems, including public international law. He has effectively abrogated every treaty instrument relating to international communications at the whim of a tweet. His behavior has dishonoured the USA in a way that will take years to remedy. Trump's actions to ban access to Android Operating System updates on Chinese products have significantly harmed cybersecurity worldwide. more
It seems that every day, a new artificial intelligence (AI) capability emerges, posing exciting possibilities for technological advancements -- but also great potential to equal or greater risks. Cybercriminals have taken notice of this rapid surge in the popularity of AI technologies and are attempting to take advantage. more
Around the world, the growing sophistication of cyber criminals is challenging the capacity of governments, businesses and individuals to defend themselves. In the Caribbean, governments are forging strategic partnerships with regional actors like the Caribbean Telecommunications Union (CTU) and the Caribbean Network Operators Group (CaribNOG), the region's largest volunteer-based community of network engineers, computer security experts and tech aficionados. more
Sponsored byVerisign
Sponsored byCSC
Sponsored byRadix
Sponsored byIPv4.Global
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byDNIB.com