Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Toward an ITU Renaissance

For nearly fifty years now, a significant portion of my professional engineering and lawyering life has been threaded through the International Telecommunication Union (ITU). It has included all of its multiple sectors, working on the inside for two Secretary-Generals and running its Relations between Members and Regulations Division, writing two books including "The ITU in a Changing World" with the late George Codding, representing the U.S. at several conferences... more

Is the Internet Sustaining the Growth Trajectories Observed as the COVID-19 Pandemic Hit the World?

With the COVID-19 pandemic hitting the fifth month of global disruption, many companies have readily shared data, statistics and observational insights on how the pandemic has impacted the global data infrastructure. At DE-CIX, we quickly observed core Internet infrastructure demand increasing and readily reported this data in April of 2020. Microsoft's CEO Satya Nadella remarked to DatacenterDynamics in April of 2020 "we have seen two years' worth of digital transformation in two months." more

9 Things You Need to Consider When Choosing a Registrar Solutions Partner for Your New gTLD

The ICANN board has passed a resolution approving the renewal of .INFO, .ORG and .BIZ Registry agreements with the clause on cross -- ownership (aka Vertical Integration) removed. What this means is that these Registries will now be allowed to own, part or whole, of a Registrar business. This will enable them to sell their TLD directly to end customers and also establish a reseller chain thus allowing much greater control and flexibility over sales channels. more

Rural Home Connectivity in Cuba

Cuba's government monopoly ISP ETECSA in October announced special home connectivity rates for some of the poorest towns in rural Cuba. The monthly charge for 30 hours of 512/256 Kbps DSL access in those towns will be 5 CUC. In other areas where home connectivity is available, the minimum monthly charge is 15 CUC for 30 hours of 1,024/256 kbps service and faster, more expensive, plans are available. more

Encryption = good : Backdoor = bad

Every time there is a tragic attack on people or property, there is a cry from various authorities or politicians for law enforcement to get unfettered access to all kinds of communication tools. But that would cause far more harm than good, and is a really bad idea. The argument goes something like this: 'These bad actors hide behind encrypted communications to plan their evil deeds...' more

BGP Security: A Gentle Reminder that Networking is Business

At NANOG on the Road (NotR) in September of 2018, I participated in a panel on BGP security -- specifically the deployment of Route Origin Authentication (ROA), with some hints and overtones of path validation by carrying signatures in BGP updates (BGPsec). This is an area I have been working in for... 20 years? ... at this point, so I have seen the argument develop across these years many times, and in many ways. more

The 3 Biggest Challenges Facing New gTLDs

When ICANN announced the nTLD program, thousands of applicants threw their hats in the ring. It seemed pretty straight forward; the existing TLDs were running out of short meaningful options, all that was needed was to create newer options that would be more relevant for specific sets of customers. Years later, the process is well underway; hundreds of nTLDs have hit the market, yet less than 10% of those that have gone live seem to have found success. more

Fear of Disaster: 5 Tips to Help Enterprises Cope

IT disasters can strike anywhere, anytime. In 1983, a faulty Soviet warning system nearly precipitated World War III -- the system claimed five missiles were en route from the U.S. Only quick thinking by Lt. Col. Stanislav Petrov saved the day when he realized the United States would never launch so few warheads. And in 2004, a private contractor working with the British Child Support Agency (CSA) suffered a glitch that overpaid 1.9 million people and underpaid 700,000. more

Trust, but Verify

We are at an inflection point in our lifetimes. The Internet is broken, seriously broken... Almost all of the systems currently in use on the Internet are based on implicit trust. This has to change. The problem is that these systems are so embedded in our everyday lives that it would be, sort of like, changing gravity, very difficult. more

Identify DDoS Attacks with External Performance Monitoring (Part 2 of 3)

In Part One of this series, we examined internal server, network and infrastructure monitoring applications. Now let's take a look at another way to capture DDoS information: external performance monitoring... Unlike network/infrastructure tools - which are usually installed inside a customer's network - external performance monitoring solutions are typically provided by a third party and leverage monitoring locations from around the world. more

Unregistered Gems: Identifying Brandable Domain Names Using Phonotactic Analysis

Conventional wisdom within the domain-sales industry states that the stock of unregistered domain names is 'running out,' with limited or no availability of short, desirable domain names across popular extensions (TLDs). This presents problems for would-be brand owners looking for a brand name (and accompanying suitable website presence) to utilize for newly-launched companies... more

We Blinked and the World Changed: Challenges of Generative AI to Internet Governance

The pace of generative AI development has been astonishing to the degree that the normative space has been unable to keep up. As governments start looking into some implementations of the technology, such as ChatGPT, more advanced techniques and products continue to emerge by the day. Society is changing in irrevocable ways, and it is paramount that the Internet Governance community turns its attention to this question. more

Why Don’t We Have Peak and Off-Peak Pricing for Broadband?

I saw a poster on the London Underground yesterday, and as is often the case it got me thinking about the parallels with telecoms. The poster explains the peak and off-peak fare structure for tube travel. The purpose of this pricing system is to manage the relationship between supply and demand in a system that is capacity constrained. Over short and medium timescales the supply is essentially fixed, and demand can oversaturate that supply. more

Dot Brand Trends and Recent Launches

Our latest research shows that dot brand domains continue their qualitative and quantitative growth. We carried out a complete cycle of analysis in April 2017, and found that brands had registered 6,505 domains in their Top Level Domains, which represents a progression of 3% compared to February 2017. 761 actual websites are published on these domains, which represents an increase of 6% form February 2017. more

Mass-Produced Propaganda – A Cuban Example

Earlier this month, Google sent me several notifications for an article entitled "The Internet Is Widely Accessible in Cuba. Why Is the US Insisting It Isn't?" I checked it out and found that Reese Erlich had posted it on Truthout.org, a left-leaning Web site, on February 12. On the 13th, Cabasi.com published a shortened version of the article and Salon.com published the original version on the 17th. These were all in English, and both Salon and Cubasi credited Truthout. more

Topics

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

DNS Security

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days