Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

RIPE 86 Bites: Encryption and Active Network Management

Change is hard, and the larger the system, the slower the pace of change. There are just so many systems that need to change their behaviors, and the motivations of users, vendors, service providers, content generators and many others all vary. Getting all of us to change some aspect of our technology, platform or application set is hard, if not impossible, to orchestrate such that it happens at the same time. more

Towards a Quantitative Approach for Objectively Measuring the Similarity of Marks

Central to many intellectual property disputes is an assessment of the degree of similarity of two contested marks. A determination of similarity is fundamentally a subjective decision involving a range of relevant tests, which include consideration of the perception of the relevant consumer and recognition of the existence of degrees of similarity within a spectrum (from high to low). more

A Look at the New ISO27001:2013 Revision

Recently the 2013 revisions of the internationally acclaimed standard for information security management, ISO27001 and accompanying 27002, 'Code of practice for information security management controls' were released. Whether you're new to this or are looking for a smooth transition, it's important to reflect on the changes made. Being compliant with the latest information security standards is becoming more and more important these days. more

Flying the Flag for the Technical Community: CENTR Provides Feedback to the United Nations’ Initiative on a Global Digital Compact

CENTR, the association which represents European country code top-level domain name registries (ccTLDs), such as .de for Germany or .no for Norway, has provided feedback to the United Nations' initiative on a Global Digital Compact (GDC). The GDC seeks to "outline shared principles for an open, free and secure digital future for all", and invites multistakeholder participation in the consultation phase. more

.brand Delegated? Now Comes the Fun Part

A little over a year ago I wrote a series of articles to help guide those with a .brand TLD through the delegation process. After ICANN's recent push for .brands to delegate, the majority are now across the line. There would be many organizations out there currently feeling like first time parents who've just brought a newborn home from the hospital -- it's been a long process already, and the hard work hasn't even begun. more

National Broadband Growth is Slowing

Leichtman Research recently released the U.S. broadband customer statistics for the end of the fourth quarter of 2021. The numbers show that broadband growth has slowed significantly for the sixteen largest ISPs tracked by the company. LRG compiles these statistics from customer counts provided to stockholders, except for Cox, which is privately owned. Net customer additions sank each quarter during the year. more

Looking Beyond IGF 2015 to WSIS+10

IGF 2015 in João Pessoa, Brazil will be seen as a milestone for the global Internet community. After 10 years of intense work, the Internet Governance Forum (IGF) has earned the right to celebrate its success and prepare itself for the future. As we come out of the meeting, we are urging all who want to be heard at this important moment in the evolution of the Internet to join over 110 organizations and individuals who have already signed on to a message to the UN General Assembly that will 1) help safeguard the IGF for the future; 2) preserve the multistakeholder model of governance; and 3) help keep us focused on the work at hand. more

Further Ideas in Mark Similarity Measurement

In the final three articles in my series looking at algorithms for measuring the similarity of marks, I extend the ideas to provide a more sophisticated and adaptable framework. Article 4 introduces a similarity score based on color distance in RGB space, offering a quantitative approach to trademark similarity. Article 5 refines word mark similarity by using the International Phonetic Alphabet to improve phonetic analysis. The final article presents a method for sorting colors by dominant shade, aiding in trademark review and potential guidelines for color mark protection. more

Give Network Administrators a Zero-Impact Firmware Update Solution

Struggles with the firmware update process are well known by Network Administrators in the cable industry. The copious tasks required to complete an end-to-end firmware update are painstaking and error-prone, often making the investment not worth the time it takes to complete the work... imagine doing these manual tasks over and over for hundreds to thousands of devices, many from different vendors, each with its own unique device update path! Clearly, this complex challenge needs a solution. more

Reframing the Infrastructure Debate

Fast and reliable infrastructure of any kind is good for business. That it's debatable for the Internet shows we still don't understand what the Internet i -- or how, compared to what it costs to build and maintain other forms of infrastructure, it's damned cheap, with economic and social leverage in the extreme. Here's a thought exercise... Imagine no Internet: no data on phones, no ethernet or wi-fi connections at home - or anywhere. No email, no Google, no Facebook, no Amazon, no Skype. That's what we would have if designing the Internet had been left up to phone and cable companies... more

The Missing Piece of the Security Conference Circuit

So far this year I think I've attended 20+ security conferences around the world - speaking at many of them. Along the way, I got to chat with hundreds of attendees and gather their thoughts on what they hoped to achieve or learn at each of these conferences. In way too many cases I think the conference organizers have missed the mark. I'd like to offer the following thoughts and feedback to the people organizing and facilitating these conferences (especially those catering to local security professionals). more

There is Always a Back Door

A long time ago, I worked in a secure facility. I won't disclose the facility; I'm certain it no longer exists, and the people who designed the system I'm about to describe are probably long retired. Soon after being transferred into this organization, someone noted I needed to be trained on how to change the cipher door locks. We gathered up a ladder, placed the ladder just outside the door to the secure facility, popped open one of the tiles on the drop ceiling, and opened a small metal box with a standard, low-security key. more

5G and the Health Scare

Having been involved in the telecommunications industry for a long time, I followed many of the discussions involving health concerns when the 3G and 4G mobile technologies were introduced. This time, with 5G, the situation is no different. Again, there are many communities worried about the potential negative health effects of the radiation that emanates from mobile communications. more

Are You Ready for WiFi 7?

It wasn't that long ago that we saw a major update to WiFi standards with the release of WiFi 6 in 2019 and WiFi 6E in 2020. But we're on the verge of the next generation of WiFi with the official launch of the new WiFi 7 standard in November 2022. There has already been a soft release of WiFi 7 routers in China, and we'll start seeing the new routers in the market here sometime this year. more

Internet Society Seeks Nominations for 2026 Board of Trustees

The Internet Society is seeking nominations for its 2026 Board of Trustees. Four seats are open across its global stakeholder communities, offering an opportunity to help steer the future of a trusted, open Internet. more

Topics

Brand Protection

Sponsored byCSC

DNS Security

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days