Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

When CDA Immunity is Not CDA Immunity

Here's a question: If 47 USC 230(c) (the Good Samaritan provision of the Communications Decency Act) says that online services are not liable for third party content, then can you even sue the online service? Shouldn't the online service be immune from lawsuit? Because, after all, what would be the point of being sued for something for which you cannot be liable? more

Incumbents Fight Broadband Improvement

There was a recent article in the Bangor Daily News about Charter Communications fighting a move by small towns in Maine to bring fiber broadband. To anybody who has been in the business for a while, this is nothing new. The big cable companies and telcos have fought municipal broadband for decades. The article highlights a recent public meeting in the small town of Leeds, a town of under 2,300. The town was hoping to partner with Axiom Technologies, a nearby ISP, to provide fiber broadband. more

Do Your Analytics Efforts Expose Your SQL Data Sources to Attacks?

Structured Query Language (SQL) continues to be quite relevant today. Many organizations still use SQL database systems, and it still ranks as the top in-demand language in tech job postings -- even in 2020. Companies are also increasing their analytics and business intelligence efforts, where SQL skills come in as quite handy. SQL queries allow you to pull key information from databases quickly. more

Ensuring Patient Safety: A Concise Guide to Post-Market Surveillance for IoMT

A significant segment of the IoT ecosystem, the Internet of Medical Things (IoMT), is projected to grow at a compounded annual growth rate of 23.7 percent (forecast period: 2022 -- 2032). This fast growth is indicative of how rapidly IoTM is integrating into modern society, which has understandably attracted the attention of regulators. The widespread use of IoTM devices means that their malfunction or dysfunction can affect the health and lives of many. more

WHOIS Database Download: Proactive Defense Against the Rising Tide of BEC Fraud

How many times have you heard that humans are the weakest link in cybersecurity? The headlines have proven that over and over again. In particular, business email compromise or BEC (also known as email account compromise or EAC) scams, which typically target an employee with access to the financial resources of his company -- this could be a C-level executive or any high-ranking officer -- for fraud are still on a constant uphill trend. more

The Sharing Economy and Sec. 230(c) of the Communications Decency Act

The sharing economy is a challenge for local communities. On the good, it creates economic opportunity and reduces the price. On the bad, it circumvents public safety and welfare protection. Such is the clash between Airbnb and local jurisdictions. San Francisco implemented a local ordinance that permits short-term rentals on the condition that the rental property is registered. In order to register the property, the resident must provide proof of liability insurance... more

Differing UDRP Decisions Show That Facts Matter

"Past performance does not necessarily predict future results." That's what the U.S. Securities and Exchange Commission requires mutual funds tell investors. But it's also true about domain name disputes. Cases in point: In four recent proceedings under the Uniform Domain Name Dispute Resolution Policy (UDRP), the operator of a large bank won two decisions but lost two others, despite a track record of having won more than 30 previous UDRP disputes. more

8th Registration Operations Workshop (ROW), May 9th, 2019, Bangkok

The Registration Operations Workshop (ROW) was conceived as an informal industry conference that would provide a forum for discussion of the technical aspects of registration operations in the domain name system. The 8th ROW will be held in Bangkok, Thailand on Thursday, May 9th, 2019 in the afternoon, at the end of the GDD Industry Summit, in the same venue. more

Smart Cities Love IPv6

I recently attended a Forum on Internet of Things in Smart Sustainable Cities: A New Age of Smarter Living staged in Singapore on 18 January 2016. The public forum provided a contextual overview to the second meeting of the ITU Study Group 20: IoT and its applications including Smart Cities and Communities which took place back-to-back with the Forum. more

In Search of the Killer 5G App

AT&T and Comcast recently joined forces and joined the 5G Open Innovation Lab. This is a venture that has been funding start-ups and others working in 5G research. Along with looking to improve 5G edge technology, a primary goal of the OAI Lab is to search for killer apps for 5G. The two big companies join the other founding members of the effort, which includes Dell, Intel, Microsoft, Deloitte, and Nokia. more

One Week Left for the Upcoming Brands and Domains Conference

There is only less than one week left for the second edition of the Brands and Domains conference to take place in The Hague, Netherlands, at the Amrath Kurhaus. The domaining conference will be held during the 2nd and 3rd of October, 'the place to be' for all those whose companies are interested in developing the so-called dotBrands. More than 500 companies have already requested their dotBrand domain, and many of them are already using it, but it is 'together' how we can move forward... more

Disinformation and Our Technology Industries

It was interesting to see that, albeit belatedly, the American media started to stop giving Trump opportunities to spew out his lies across the country and beyond. It obviously had now reached a point where the media realized that if they continued to provide Trump with their avenues, this would make them accomplices in inciting violence. Is this going to be a turning point? more

Entrenched Decision Makers Won’t Hold Back IaaS Adoption

In an interesting article on Information Week, Jonathan Feldman makes the argument that because of entrenched attitudes and established practices among "IT infrastructure gurus," Infrastructure as a Service (IaaS) will fail to gain traction, forcing developers to turn towards Platform as a service (PaaS) as the route of least resistance. Feldman is not anti-IaaS, he makes it clear that he thinks enterprise infrastructure managers are making a mistake, but believes they'll continue to make it anyway. more

Call for Participation – ICANN DNSSEC and Security Workshop at ICANN67, Cancun, Mexico

The ICANN Security and Stability Advisory Committee (SSAC) and the Internet Society Deploy360 Programme are planning a DNSSEC and Security Workshop during the ICANN67 meeting held from 07-12 March 2020 in Cancun, Mexico. The original DNSSEC Workshop has been a part of ICANN meetings for many years and has provided a forum for both experienced and new people to meet, present, and discuss current and future DNSSEC deployments. more

The Missing Data: Measuring ISP User Populations

In our physical world, census information is used to inform the planning processes behind the provision of infrastructure, such as schools, hospitals, housing, and similar. It can be used to assess the impact of natural disasters or to understand a society's needs in terms of food and energy security. Demographic data is also used to inform investment and business decisions. You'd think that the Internet itself would be awash with similar information. more

Topics

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

DNS Security

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days