Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

An Update on Satellite Broadband

Ookla recently published a blog that looks at the speed performance of satellite broadband, focusing mostly on Starlink. I haven't looked at this broadband sector for a while and thought it was time for an update. Starlink has had a busy year. At the end of November, the company had 5,500 satellites in orbit, up from over 3,200 at the end of 2022. The first constellation is still slated to reach almost 12,000 satellites, and the company has tentative permission from the FCC to extend to 42,000. more

Making the Most of the Cloud: Four Top Tips

Cloud computing is on the rise. International Data Corp. predicts a $195 billion future for public cloud services in just four years. That total is for worldwide spending in 2020 - more than twice the projection for 2016 spending ($96.5 billion). As a result, companies are flocking to both large-scale and niche providers to empower cloud adoption and increase IT efficacy. The problem? Without proper management and oversight, cloud solutions can end up underperforming, hampering IT growth or limiting ROI. more

Are You Ready for WiFi 7?

It wasn't that long ago that we saw a major update to WiFi standards with the release of WiFi 6 in 2019 and WiFi 6E in 2020. But we're on the verge of the next generation of WiFi with the official launch of the new WiFi 7 standard in November 2022. There has already been a soft release of WiFi 7 routers in China, and we'll start seeing the new routers in the market here sometime this year. more

Security Against Election Hacking - Part 2: Cyberoffense Is Not the Best Cyberdefense!

State and county election officials across the country employ thousands of computers in election administration, most of them are connected (from time to time) to the internet (or exchange data cartridges with machines that are connected). In my previous post I explained how we must audit elections independently of the computers, so we can trust the results even if the computers are hacked. more

A New Busy Hour – One of the Many Consequences of the COVID-19 Pandemic

One of the many consequences of the coronavirus is that networks are going to see a shift in busy hour traffic. Busy hour traffic is just what it sounds like -- it's the time of the day when a network is busiest, and network engineers design networks to accommodate the expected peak amount of bandwidth usage. Verizon reported on March 18 that in the week since people started moving to work from home that they've seen a 20% overall increase in broadband traffic. more

Mobilizing the Internet Community for Coronavirus Pandemic Communications

The Coronavirus pandemic has profound impact on every aspect of every person's life. We all have turned to the Internet to stay informed on this one subject. Unfortunately, the Internet community is not equipped to organize the Internet around one subject. Governments and businesses are reorganizing their websites daily to make new paths to new coronavirus information on many topics suitable for their many audiences. more

Can Zero Trust Security Put an End to Human Security Weaknesses?

How bad is the human security weakness problem? Verizon's 2022 Data Breaches Investigations Report says 82 percent of data breaches have human involvement. This involvement can mean misconfigurations, poor security policy implementation, negligence, and falling prey to social engineering schemes. Essentially, a vast majority of data breaches have penetrated cyber defenses because of human carelessness, inconsistencies, and gullibility. more

Technology Vendors Must Be Proactive in Dealing With COVID-19 Problems

Early action now on possible performance issues will "flatten the curve" of customer problems in the coming weeks and months. Here are three things technology and software vendors can do right now to get ahead of problems that may appear (if they are not already) with services such as development, implementation and support... Check your contracts to see whether there are any "material assumptions" that have failed or will fail - perhaps because of some governmental action or unavailability of personnel... more

Intentional Disruptions to Internet Access Cost Countries $2.4 Billion Last Year

Around the world, digital technology is seen as vital for economic development. In the U.S. alone, the Internet accounts for about six percent of the entire economy. Digital technology has expanded its role in the global economy in recent years, as both developed and developing nations have become increasingly reliant on the Internet. more

China Shows Positive Attitude Towards IANA Transition

Observers of IANA transition may have found a remarkably interesting fact that both supporters and opponents of the transition like citing China, along with a small number of other countries, as evidence in favor of their arguments. For supporters, take Larry Strickling as an example, blocking transition benefits China in that it will "intensify their advocacy for government-led or intergovernmental management of the Internet via the United Nations." On the contrary... more

Broadband Now or Later?

I just heard about a U.S. County that is using its American Rescue Plan Act (ARPA) funds to build fixed wireless broadband. This is a traditional fixed wireless broadband technology that will probably deliver speeds of 100 Mbps to those close to the towers, slower speeds to homes further away, and which will not reach all homes in the County. more

RIPE 86 Bites: What’s the Time?

A little appreciated aspect of our digital infrastructure is just how dependent we are on access to time. Disrupting the time base can not only lead to disruption in communications but can result in various forms of compromise of the integrity of communications. Accurate time was all but unobtainable for centuries, and then, as we spent significant sums devising even more accurate timekeeping instruments, accurate time became a specialized service. more

Are You Playing Roulette With Your Network Upgrades?

Exponential growth in network bandwidth requirements has created a need for large CAPEX investments for most service providers. Unfortunately, each provider faces limits on all expenditures and must upgrade only what is needed, when it is needed. Nobody should waste time or money by performing unnecessary network upgrades. To avoid needless upgrading, providers must have all the data they can get from their network to guide them through the decision-making process.  more

Unintended Consequences of Satellite Constellations

Astronomy & Astrophysics published a research paper recently that looked at "Unintended Electromagnetic Radiation from Starlink Satellites." The study was done in conjunction with the Low-Frequency Array (LOFAR) telescope in the Netherlands. The LOFAR telescope is a network of over forty radio antennas spread across the Netherlands, Germany, and the rest of Europe. more

Engaging Consumers in Cyber Security: It’s Up to You

In a perfect world, consumers recognize authentic emails from fake, update their operating system, browser and anti-virus software, and have a healthy skepticism about the safety of the Internet. The bad guys hate perfect, so we should be working with consumers to stop them. ... Organizations like mine are joining forces to recruit consumers -- who are also your customers and employees -- in the fight against cybercrime. more

Topics

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days