Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

It’s Auction Time Again

This week ICANN will auction off .WEB or .WEBS. There are seven live applications for .WEB and one for .WEBS. The string contention process decided that the two names are so similar that they'll only assign one of them, so all eight applications are in one auction... There are some deep pocketed bidders in this round including Google, Donuts, web.com which owns Network Solutions and a lot of other web properties, and Schlund which owns the largest web hoster 1&1. more

Net Neutrality’s Legal Binary: An Either/Or With No “Third Way”

People working on net neutrality wish for a "third way" — a clever compromise giving us both network neutrality and no blowback from AT&T;, Verizon, Comcast and others. That dream is delusional because the carriers will oppose network neutrality in any real form; they want paid fast lanes. They have expressed particular opposition to "Title II" of the Communications Act — something telecom lawyers mention the same way normal people might reference the First or Second Amendments. Title II is the one essential law to ban paid fast lanes. more

STEM to STEMM: It Will Take Musicians to Save the Internet

The internet is under all kinds of attacks from all kinds of people for all kinds of reasons. It’s not just the internet’s infrastructure that is under attack, so too is the very concept of the internet as an open communications platform serving the commonweal. Constructing effective technical defenses of the internet will require that America’s students learn and develop the quantitative disciplines known as STEM; Science, Technology, Engineering, and Mathematics. Constructing effective, ethical defenses of the internet will require that students study art and philosophy. The two educational paths are symbiotic... more

Net Neutrality Alternative: Effective Interpretation, Oversight and Enforcement of Existing Rules

The US government is proposing broad new regulations for telecommunications and cable internet service providers. The new proposals appear to target specific providers for regulation and government oversight. Specifically, Massachusetts Senator Ed Markey has proposed the Internet Freedom Preservation Act of 2009, or the "Net Neutrality" bill, outlining government policies to impose new governance and restrictions targeting telecommunications and cable providers AT&T, Verizon, Time Warner and Comcast. more

Moving to the Cloud? Tips for a Soft Landing

Companies are no longer afraid of the cloud. Big talk about security and performance issues has dwindled to small voices as enterprises and SMBs alike adopt cloud services to empower their global impact. Big cloud benefits, however -- agility, scalability and on-demand access -- are the result of a thoughtful, well-planned move from on-site servers to off-site resources. Here are four key tips for a soft cloud landing. more

The 4 Major Drivers for Investment in NFV

Communication Service Providers (CSPs) have been driving the industry to develop agile solutions that abstract physical hardware from their solution platforms. With this technology, they hope to commoditize service functions to increase service agility and reduce the capital required to achieve better and more efficient service. Over the years, we have seen solutions from TMForum and CableLabs that help standardize certain aspects of the CSP plant and similar initiatives in the CPE world with Reference Design Kit (RDK)... more

The [Dot]Brand Tribes - Part 1

In my last post we talked about the value of introducing new generic Top-Level Domains (gTLDs) to Tribes. We discussed what a Tribe was and how communities of people sharing knowledge and experiences can benefit from new TLDs. In the next three posts from my blog we'll discuss how brand owners can either benefit from creating a tribal home and/or come together with other tribes for the benefit of their members. more

BGP Security: A Gentle Reminder that Networking is Business

At NANOG on the Road (NotR) in September of 2018, I participated in a panel on BGP security -- specifically the deployment of Route Origin Authentication (ROA), with some hints and overtones of path validation by carrying signatures in BGP updates (BGPsec). This is an area I have been working in for... 20 years? ... at this point, so I have seen the argument develop across these years many times, and in many ways. more

Applicant Auction Set for Dec. 11th, Buenos Aires Workshops, Icann Last Resort Information Released

The Applicant Auction team is heading to ICANN 48 in Buenos Aires this month, and as we start to pack our bags, we thought it was time to share some updates with the community. Last week, ICANN held a webinar to present Auction Rules for its forthcoming Last Resort Auctions. more

Toward an ITU Renaissance

For nearly fifty years now, a significant portion of my professional engineering and lawyering life has been threaded through the International Telecommunication Union (ITU). It has included all of its multiple sectors, working on the inside for two Secretary-Generals and running its Relations between Members and Regulations Division, writing two books including "The ITU in a Changing World" with the late George Codding, representing the U.S. at several conferences... more

USA Fibre Investments Encouraging Further Operator Expansion

According to data from the FttH Council, the number of homes passed with fibre in the US increased 13% in 2015, year-on-year, to 26 million. Combined with Canada and Mexico, the number of passed homes has reached 34 million. The take-up rate is excellent by international standards, at more than 50%. Commonly operators look to about 20% to 30% take-up before work can begin on new fibre infrastructure to communities. more

Running-Code Betrayal: How the RIR System Turned Consensus Against the Technical Community

A dispute over African IP governance exposes a flaw in the RIR system, where thin policy, weak accountability and institutional self preservation risk overriding running networks and undermining the technical legitimacy that sustained global coordination. more

Internet Evolution: Moore’s Law, Addressing Architectures, and the Future of Internet Scale

The Internet has evolved from a scarcity-driven system into one defined by abundance, reshaping infrastructure, governance, and economic models while challenging long-held assumptions about addressing, network roles, and the future of protocol design. more

Rural Home Connectivity in Cuba

Cuba's government monopoly ISP ETECSA in October announced special home connectivity rates for some of the poorest towns in rural Cuba. The monthly charge for 30 hours of 512/256 Kbps DSL access in those towns will be 5 CUC. In other areas where home connectivity is available, the minimum monthly charge is 15 CUC for 30 hours of 1,024/256 kbps service and faster, more expensive, plans are available. more

Encryption = good : Backdoor = bad

Every time there is a tragic attack on people or property, there is a cry from various authorities or politicians for law enforcement to get unfettered access to all kinds of communication tools. But that would cause far more harm than good, and is a really bad idea. The argument goes something like this: 'These bad actors hide behind encrypted communications to plan their evil deeds...' more

Topics

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

DNS Security

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days