Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Is Broadband Essential?

For many years, I've heard people say that broadband is essential. I read it in articles. I hear it on broadband panels and webcasts. I see it said in comments on social media. It's obvious that a whole lot of people think broadband is essential. But what exactly does that mean? Does it mean that broadband is important in a lot of people's lives, or does it mean that broadband is something that society can't live without? more

Cyptech Needs You!

In August of last year I wrote in a blog about the importance of cryptech to wide-scale trust in the Internet. For those who don't know about it, http://cryptech.is is a project aiming to design and deploy an openly developed, trustable Hardware Security Module (HSM) which can act both as a keystore (holding your secrets and keeping them private) and as a signing engine. more

NTAG Chair Blog: Singapore Mid-term Update

While the media spotlights the US role in Internet governance, the NTAG Executive Committee has been focussed on the daily business of ensuring the New gTLD programme is moving forward in the best interests of applicants. There are signs that ICANN is becoming more responsive to applicant needs. Quick action implementing GAC Advice once it was resolved by the New gTLD Program Committee, the recent name collision webinar, and an ongoing dialogue on new gTLD auctions procedures are all positive steps. more

New Cyber Security Bill Could Increase Power of President and DHS

Introduced by ranking Senate members of the Homeland Security and Governmental Affairs Committee, the Protecting Cyberspace as a National Asset Act of 2010, S.3480 is intended to create an Office of Cyber Policy in the executive branch of the government, confirmed by the Senate and ultimately reporting to the president. Senators Joe Lieberman, Blanche Lincoln and Tom Carper introduced the bill publicly on June 10, and a critical part of the bill is that critical infrastructure networks such as electricity grids, financial systems and telecommunications networks need to cooperate with the Office of Cyber Policy. more

Hole in Space - the Mother of All Video Chats

New technology enables new art forms and artists Kit Galloway and Sherrie Rabinowitz (K&S) began working with geostationary satellite links in 1977. Their first work was an experiment in remote dance and music. Video of dancers at The Goddard Space Flight Center in Maryland and an educational television center in California was transmitted to a central control studio where a composite was formed and sent back to monitors the dancers could see. more

Net Neutrality Alternative: Effective Interpretation, Oversight and Enforcement of Existing Rules

The US government is proposing broad new regulations for telecommunications and cable internet service providers. The new proposals appear to target specific providers for regulation and government oversight. Specifically, Massachusetts Senator Ed Markey has proposed the Internet Freedom Preservation Act of 2009, or the "Net Neutrality" bill, outlining government policies to impose new governance and restrictions targeting telecommunications and cable providers AT&T, Verizon, Time Warner and Comcast. more

Recent Case in Federal Court Shows Inefficiencies of Anticybersquatting Consumer Protection Act

A recent case1 from a federal court in Kentucky shows why the Anticybersquatting Consumer Protection Act (15 U.S.C. 1125(d) - the "ACPA") can be - when compared to the Uniform Domain Name Dispute Resolution Policy ("UDRP") - a relatively inefficient way of resolving a domain name dispute. Here is a quick rundown of the facts. Defendant owned a business directly competitive to plaintiff ServPro. Plaintiff had used its mark and trade dress since the 1960's... more

Hosters: Is Your Platform Being Used to Launch DDoS Attacks?

As anyone who's been in the DDoS attack trenches knows, large multi-gigabit attacks have become more prevalent over the last few years. For many organizations, it's become economically unfeasible to provision enough bandwidth to combat this threat. How are attackers themselves sourcing so much bandwidth? more

APT: The Cancer Within

Unless you have a team employing the latest proactive threat-hunting techniques, the stealthy Advanced Persistent Threat (APT) hiding in your network can pass by completely unnoticed. There are as many definitions of APT as experts writing about the topic, so let's boil it down to the simple essentials: APTs are usually implanted and maintained by a team of malicious actors with the intention of living long term in your network while extracting valuable private information. more

Don’t Let Patent Wars Widen Digital Divide

For generations, large pockets of Africa were isolated from things many of us take for granted: access to medical treatment and advances that can make the difference between a healthy, productive life or debilitating illness -- or even an early death. These problems still persist, but over the last two decades technology has helped break through and enable medical professionals to reach the poorest and most remote populations and offer some hope. more

First .emarat Arabic Script Domain Name is Live!

The .emarat Arabic script Internationalised Domain Name (IDN) ccTLD for the United Arab Emirates has been entered into the DNS Root Zone and is therefore now resolving. This is a truly historic moment in the development of the Internet in the United Arab Emirates and the wider Arabic-speaking world as it removes the last hurdle preventing people without English-language skills from enjoying the full benefits that the Internet has to offer. more

AI Already Succeeding in Most Creative Tasks and Getting Better by the Day

It is redundant to point out how much progress AI applications made during the past few years. What is escaping the attention of many people, however, is that in most creative areas, there are already fully working consumer-grade tools based on generative AI that can produce output similar to that of a human with above-average capabilities, and there are many more on the way. These tools also happen to be rather affordable, making them accessible to a large amount of people. more

Carriers Constrain Entrepreneurs

Previously, I've written about how the success of the MVNO (though not without its problems) demonstrates how an Open Access-like business model can work in a wireless context. The underlying carrier, such as Sprint or Verizon, can sell access to its network at wholesale rates to a company like Virgin Mobile, which then markets to consumers. This model can be and is a success both for the retailer and the wholesaler. MVNOs are not perfect. more

What Will 2021 Have Install for the ICT Industry?

While 2021 will remain a year with lots of uncertainties, at the same time, we can say that the pandemic has not affected the information and communications technology (ICT) industry in any significant way. Yes, there has been a slowdown, for example, in the sale of smartphones. Shortages in both materials and expertise are slowing fiber deployment, and the recovery over 2021 will be slow and uncertain because of the many lockdowns and travel restrictions. more

Dot Brand Trends and Recent Launches

Our latest research shows that dot brand domains continue their qualitative and quantitative growth. We carried out a complete cycle of analysis in April 2017, and found that brands had registered 6,505 domains in their Top Level Domains, which represents a progression of 3% compared to February 2017. 761 actual websites are published on these domains, which represents an increase of 6% form February 2017. more

Topics

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

Threat Intelligence

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days