Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Experts Call for Caribbean to Make Its Voice Heard on Global Internet Governance

The internet has come to play a vital role in the social and economic development of the Caribbean. Yet, countries in the region are, in the main, relying heavily on external interests to make important decisions about the technical specifications and security of the technology and rules that impact how the Internet is governed. "We find that the Caribbean governments are abdicating their seats at the table in global fora where major decisions are made regarding the future of the Internet. more

Unintended Consequences of Satellite Constellations

Astronomy & Astrophysics published a research paper recently that looked at "Unintended Electromagnetic Radiation from Starlink Satellites." The study was done in conjunction with the Low-Frequency Array (LOFAR) telescope in the Netherlands. The LOFAR telescope is a network of over forty radio antennas spread across the Netherlands, Germany, and the rest of Europe. more

EPDP Team Marches Toward Major Milestone

If it feels like the work of the latest group addressing registration data within ICANN has been going on forever, try participating in it! Since the summer of 2018, the team has regularly been meeting for several hours each week, participating in numerous face-to-face meetings and exchanging thousands of emails. Last week in Los Angeles, the team got together once again to continue our Phase 2 work creating policy that will (among other issues) govern the disclosure of non-public registration data to third parties. more

Can Zero Trust Security Put an End to Human Security Weaknesses?

How bad is the human security weakness problem? Verizon's 2022 Data Breaches Investigations Report says 82 percent of data breaches have human involvement. This involvement can mean misconfigurations, poor security policy implementation, negligence, and falling prey to social engineering schemes. Essentially, a vast majority of data breaches have penetrated cyber defenses because of human carelessness, inconsistencies, and gullibility. more

Unregistered Gems: Identifying Brandable Domain Names Using Phonotactic Analysis

Conventional wisdom within the domain-sales industry states that the stock of unregistered domain names is 'running out,' with limited or no availability of short, desirable domain names across popular extensions (TLDs). This presents problems for would-be brand owners looking for a brand name (and accompanying suitable website presence) to utilize for newly-launched companies... more

Making the Most of the Cloud: Four Top Tips

Cloud computing is on the rise. International Data Corp. predicts a $195 billion future for public cloud services in just four years. That total is for worldwide spending in 2020 - more than twice the projection for 2016 spending ($96.5 billion). As a result, companies are flocking to both large-scale and niche providers to empower cloud adoption and increase IT efficacy. The problem? Without proper management and oversight, cloud solutions can end up underperforming, hampering IT growth or limiting ROI. more

Security Against Election Hacking - Part 2: Cyberoffense Is Not the Best Cyberdefense!

State and county election officials across the country employ thousands of computers in election administration, most of them are connected (from time to time) to the internet (or exchange data cartridges with machines that are connected). In my previous post I explained how we must audit elections independently of the computers, so we can trust the results even if the computers are hacked. more

Building Resilient Broadband Networks: Lessons from the Power Industry’s Transformation

It's almost impossible to talk about broadband at the community level without talking about resiliency and redundancy. It's hard to find rural communities that haven't experienced a broadband outage due to a fiber being cut somewhere. The issue hits the news when there are reports of regional or national broadband outages. more

Mobilizing the Internet Community for Coronavirus Pandemic Communications

The Coronavirus pandemic has profound impact on every aspect of every person's life. We all have turned to the Internet to stay informed on this one subject. Unfortunately, the Internet community is not equipped to organize the Internet around one subject. Governments and businesses are reorganizing their websites daily to make new paths to new coronavirus information on many topics suitable for their many audiences. more

Recursive DNS and You

In the world of DNS, there are two types of DNS servers, 'recursion disabled' and 'recursion enabled'. Recursion disabled servers, when asked to resolve a name, will only answer for names that they are authoritative for. It will absolutely refuse to look up a name it does not have authority over and is ideal for when you don't want it to serve just any query. It isn't, however, very useful for domains you don't know about or have authority over... more

Deadline of September 6 for Grant Funding for Internet Exchange Points (IXPs)

If you operate an Internet Exchange Point (IXP) or are interested in creating one, the Internet Society has a “Sustainable Peering Infrastructure” funding program that is open for applications until this Friday, September 6, 2024... Grant funds from USD $5,000 up to $50,000 are open to all regions and are available to assist in equipment purchases (switches, optic modules, servers, and routers), training, capacity building, and community development. more

WiFi QoE Assurance with TR-069 - Part 2: Optimizing a Single Access Point

As we have seen in the first installment of this series, TR-069 offers unprecedented visibility into the customer premises network to highlight devices beyond the gateway, and in the case of WiFi, the issues affecting service quality. Insights into the surrounding WIFI landscape alone provide ample data to provision the access point (AP) to operate in a part of the spectrum with the least amount of interference. more

Technology Vendors Must Be Proactive in Dealing With COVID-19 Problems

Early action now on possible performance issues will "flatten the curve" of customer problems in the coming weeks and months. Here are three things technology and software vendors can do right now to get ahead of problems that may appear (if they are not already) with services such as development, implementation and support... Check your contracts to see whether there are any "material assumptions" that have failed or will fail - perhaps because of some governmental action or unavailability of personnel... more

Using Bigger Bandwidth Applications

The recent Cisco Annual Internet Report for 2018–2023 had one chart that I found intriguing. The purpose of Cisco's report is to look at the future of broadband usage, and the report included a chart showing the amount of bandwidth needed for various web functions. To me, this list was reminiscent of the list that the FCC made in 2015 when they set the definition of broadband at 25/3 Mbps -- except that all of the items on this list require more bandwidth than the functions the FCC foresaw just five years ago. more

IRAN Nuclear Deal; the Flag of Changes? the End of Civil Society Isolation? or What?

The crucial importance of Iran Nuclear Deal and, hopefully, the imminent expectation, for reaching to an indisputable solution and agreement among 5+1+ Iran (as well as the other parties who claim to have interest in this matter) all have created a special climate and proper ground for all the activists and the observers in order to seriously sit and make a review of the actual situation and the potentials of the main player of the field, say Iran, or Civil Society of Iran... more

Topics

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Threat Intelligence

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days