Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Call for Participation – ICANN DNSSEC and Security Workshop for ICANN74 Policy Forum

Do you have information about DNS security or routing security that you would like to share with the global community? Have you developed a new tool or system in this area? Do you have results from a research project that you want to share with a technical community? If so, please consider submitting a proposal to the DNSSEC and Security workshop to be held at ICANN 74 in June 2022. more

It’s Time to Curtail the Censorship Industry Cartel

Last month INHOPE, a global trade association of child abuse reporting hotlines, rejected a joint call from Prostasia Foundation, the National Coalition Against Censorship, Article 19, and the Comic Book Legal Defense Fund, that its members should stop treating cartoons as if they were images of child sexual abuse. As our joint letter pointed out, INHOPE's conflation of offensive artwork with actual abuse images has resulted in the misdirection of police resources against artists and fans... more

New Data on Domain Name Contact Availability and Privacy

Nearly 90% of the internet's generic top-level (gTLD) domain names do not have identifying contact information in the Registration Data Directory Services (RDDS) system, according to a report by Interisle Consulting Group. A key finding of the report is the rapid growth of registrar-provided proxy service offerings and the inclusion of these services for both new and existing registrations. more

Toward WSIS 3.0: Adopting Next-Gen Governance Solutions for Tomorrow’s Information Society

For the WSIS community to be effective in meeting its ambitious goals adopted in December 2015, it will have to become more evidence-based and innovative. At the beginning of the new millennium -- before the arrival of Facebook and Twitter -- Kofi Annan, then Secretary General of the United Nations, called for the creation of an inclusive "information society" -- "one in which human capacity is expanded, built up, nourished and liberated, by giving people access to the tools and technologies they need, with the education and training to use them effectively." more

On the Road to WSIS+10: Open Frameworks for Successful Discussions

This year we must work together to open up Internet governance processes so that everyone can have their voices heard in the development of Internet policies. In 2015, the Internet governance landscape is peppered with events and meetings as a number of key Internet policy issues are debated. There are key global, regional and local discussions underway about how to strengthen the Internet governance model in ways that will be meaningful to users around the globe, and how to be more inclusive of new ideas and perspectives. more

Progress in US Telecoms Transformation

The impact of the changes set in motion by President Obama back in late 2008 in relation to the direction the telecommunications are slowly becoming apparent and are taking many Americans by surprise, even many of the experts and analysts in this industry. This has created a lot of noise and confusion, as people are trying to understand what is happening and how it will affect them. more

Ten Years of Secure DNS at .se! (What We Learned)

Ten years ago today, and with 300,000 domains in the zone file, we introduced DNSSEC at .se. It was the end of a fairly long journey, or at least the first stage. The first Swedish workshop to test the new function according to the specifications from the Internet Engineering Task Force was arranged in 1999. At that time, I was still working in the IT Commission's Secretariat, and the standard was far from complete as it turned out. Our ambition was to change the world, at least the world that exists on the internet. more

Mobile’s Need for Fibre

It was interesting to see that in New Zealand Vodafone had second thoughts and decided to come up with its own proposal of forming a consortium of network operators, rather than simply supporting the government's announcement of its FttH plans. Our analysis of this change of mind is that mobile operators increasingly need fibre networks to sustain the enormous growth in mobile broadband. Most mobile stations around the world are not connected to a fibre network. more

The Velocity of Change at SCTE

Engineering wise, how's the industry doing? With that question in mind, hundreds descended on Denver for this year's Society of Cable Telecommunications Engineers (SCTE) Cable-Tec Expo. That question begs to be answered. Really, can we still separate the engineering 'cool' stuff from the business chic? By that, I mean the business requirements from subscribers who demand communication and entertainment when they want it, where they want it, and on whatever device they want it delivered to. more

Fiber in the Water Pipes

Fiber networks are getting a surprising new route: water pipes. An innovative technology promises faster, cheaper installations while avoiding traditional construction hurdles. However, concerns about water utility cooperation and repair challenges remain. This approach could revolutionize fiber deployment in municipal and greenfield communities, but its adoption hinges on proving its reliability and safety. more

Fixed Cellular Broadband Performance

One of the first in-depth reviews I’ve found for T-Mobile’s fixed cellular broadband was published in the Verve. It’s not particularly flattering to T-Mobile, and this particular customer found the performance to be unreliable – fast sometimes and barely functioning at other times. But I’ve seen other T-Mobile customers raving about the speeds they are receiving. We obviously can’t draw any conclusions based upon a single review by one customer... more

Minimized DNS Resolution: Into the Penumbra

Over the past several years, domain name queries - a critical element of internet communication - have quietly become more secure, thanks, in large part, to a little-known set of technologies that are having a global impact. Verisign CTO Dr. Burt Kaliski covered these in a recent Internet Protocol Journal article, and I'm excited to share more about the role Verisign has performed in advancing this work and making one particular technology freely available worldwide. more

Defending Against the Hackers of 1995

Two factor authentication that uses an uncopyable physical device (such as a cellphone or a security token) as a second factor mitigates most of these threats very effectively. Weaker two factor authentication using digital certificates is a little easier to misuse (as the user can share the certificate with others, or have it copied without them noticing) but still a lot better than a password. Security problems solved, then? more

The Challenge of Access to Safe Internet Pharmacies and Medicines During Pandemics

With 300+ sessions and over 7,800 participants from 158 countries across every time zone, RightsCon Online 2020 (July 27-31) demonstrated the importance of convening people worldwide to bring about positive changes in a time of crisis. The Dahdaleh Institute for Global Health Research (York University, Canada) organized a panel of diverse experts and academics to discuss "Promoting human rights and access to safe medicines during pandemics: The critical role of Internet pharmacies." more

We Need to Disconnect from Facebook Right Now

The smartphone has effectively transformed us into cyborgs, we have in our hands a highly efficient computing device equipped with a photo and video camera, microphone, GPS, accelerometer, gyroscope, magnetometer, light and proximity sensors, as well as other features that allow creation of increasingly useful, impressive and addictive applications. more

Topics

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

DNS Security

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days