Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Looking Forward to ‘The Conversation We Should Be Having’

No, this topic hasn't yet been exhausted: There's still plenty more conversation we can and should have about the proposed sale of the .ORG registry operator to a private firm. Ideally, that conversation will add more information and more clarity about the issues at stake and the facts that underpin those issues. That's why I'm planning to attend today's event at American University where the sale's proponents, opponents and undecideds will have a tremendous opportunity to better understand one another. more

On the Way to the G7 ICT Ministers’ Meeting in Japan

This week in Japan I have been invited to address the Multi-Stakeholder Conference that will officially open the G7 ICT Ministerial summit in Takamatsu. The focus of the ICT Ministerial will be on four distinct areas: (1) Innovation and economic growth; (2) Unrestricted flow of information, and ensuring the safety and security in cyberspace;
(3) Contributing to the resolution of global issues, including digital connectivity; (4) International understanding and international cooperation in the future. more

What Would a Human Rights-Based Approach to AI Governance Look Like?

Over the past year, discussions around artificial intelligence (AI) have saturated media and policy environments. Perspectives on it vary widely: from boosterist narratives, which posit the limitless potential of AI-powered technologies to help overcome social inequalities and accelerate industrial development, to apocalyptic framings, which suggest that a (speculative) 'artificial general intelligence' could make humans extinct. more

The Internet of Trash

It's often a clear signal that we're in deep trouble when politicians believe they need to lend a hand and help out with regulations. A bill has been passed by the US Congress, and now signed into law, that requires the National Institute of Science and Technology to work with other agencies in developing guidelines for the use of devices that manage security vulnerabilities, patching, together with configuration and identity management. more

Unveiling the Lead Legacy: Addressing the Challenges of Abandoned Telephone Cables

A recent article in the Wall Street Journal discusses the possible contamination of copper telephone cables with outer lead sheathing. I'm not linking to the article because it is behind a paywall, but this is not a new topic, and it's been written about periodically for decades. The authors looked at locations around the country where lead cables are still present around bus stops, schools, and parks. more

ICANN LAC-i Roadshow Stirs “High Interest” in Caribbean ccTLDs

The Caribbean can create a unique flavour on the Internet by using effectively managed and financially stable Country Code Top-Level Domains. Speaking after ICANN's first Caribbean edition of its Latin American and Caribbean Internet Roadshow (LAC-i Roadshow), recently held in Turks and Caicos Islands, Albert Daniels said the event yielded "very high interest" in the management and operations of the local ccTLD, .tc. Daniels is ICANN's senior manager of stakeholder engagement in the Caribbean. more

The Birth of the Digital Divide

A lot of the money being spent on broadband infrastructure today is trying to solve the digital divide, which I define as a technology gap where good broadband is available in some places but not everywhere. The technology divide can be as large as an entire county that doesn't have broadband or as small as a pocket of homes or apartment buildings in cities that got bypassed. more

Facebook Size Estimates

At a staggering $100 billion dollar valuation and reported 900 million users, Facebook represents a massive presence in the global economy. From an Internet infrastructure perspective, Facebook also ranks amongst the largest of the "hyper giants" generating a significant share of daily global Internet traffic. This blog explore Facebook's size in terms of its Internet traffic contribution. more

Creating a Russian No-Cyber Zone

In response to Russia's horrific invasion and war against the Ukrainian nation ordered by Dictator Putin that will live in infamy, an array of nations, organizations, and companies have responded to shun and shut off Russia in every possible manner. The actions include no-fly zones, removal from ICT network services, and essentially universal declarations of condemnation. For the first time ever, all Russian proposals to the International Telecommunication Union (ITU) quadrennial standards body plenary known as the WTSA have been "bracketed"... more

Finding the Holes in Your Application Security Blanket

Last month, application security provider Veracode came out with a study that stated that more than half of all enterprise applications aren't secure. The company tested approximately 2,900 applications over an 18-month period, and 57 percent failed to meet Veracode's "acceptable levels" of security. While this study gained a tremendous amount of traction in the media... it does not focus on the bigger issue... more

Internet Evolution: Moore’s Law, Addressing Architectures, and the Future of Internet Scale

The Internet has evolved from a scarcity-driven system into one defined by abundance, reshaping infrastructure, governance, and economic models while challenging long-held assumptions about addressing, network roles, and the future of protocol design. more

Who Should Solve the Digital Divide?

Adjit Walia, a Global Technology Strategist at Deutsche Bank, suggested in a recent paper that it's in the best interest of U.S. tech companies to tackle the digital divide. He says that those companies rely on a computer-literate public and workforce and that they ought to take a small sliver of their earnings and invest in students today before they fall on the wrong side of the digital divide. more

Huawei Now One of China’s Largest Software Companies

The latest report from China's Ministry of Industry and Information Technology (MIIT) shows Huawei at the top of the list of 100 largest software companies in China. On reflection, that's not surprising. Half of Huawei's business is now phones, where chief rival Apple has long considered itself a software company. The great achievement of Huawei's phone division was to pull ahead of everyone in the quality of picture-taking. The hardware can be matched; Huawei's advantage comes from software. more

What Is Privacy?

Ask ten people what privacy is, and you'll likely get twelve different answers. The reason for the disparity is that your feelings about privacy depend on context and your experience. Privacy is not a purely technical issue but a human one. Long before computers existed, people cared about and debated privacy. Future U.S. Supreme Court Justice Louis Brandeis defined it as "the right to be left alone" in 1890. Before the Web became a ubiquitous phenomenon, people primarily thought of privacy in terms of government intrusion. more

The Diet Pill Security Model

The information security industry, lacking social inhibitions, generally rolls its eyes at anything remotely hinting to be a "silver bullet" for security. Despite that obvious hint, marketing teams remain undeterred at labeling their companies upcoming widget as the savior to the next security threat (or the last one -- depending on what's in the news today). I've joked in the past that the very concept of a silver bullet is patently wrong... more

Topics

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

DNS Security

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days