Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Would You Fly an Airplane That Had a Pre-flight Checkout That Was Only 40 Percent Complete?

In the aviation world safety is paramount. Commercial airlines go to major lengths to make sure that their planes are fully up to code and can fly safely in the air. The risks - loss of human lives - are far too extreme to take any chances. One result of this diligence is the fact that travel by plane is far safer than any other method - nearly 40 times safer per mile than travel by car. While application security risks are not as dire, research shows CSOs fail to use the same stringent level of safety to secure their Internet-facing applications. more

Human Rights and the Digital Domain Primer - Part 1

The digital domain encompasses the different spaces and spheres we use to relate and interact with the people and things that surround us using digital technologies. The digital domain is not limited to the technologies itself, but it has an important ethical dimension that encompasses the values, principles and instruments that inform and govern it. Created by humans for humans, our beliefs, cultural backgrounds, and biases are reflected in the codes we write and the algorithms we create. more

Taking the Long View: Will This Be the Year ISPs Rethink Their Business Plans

I have to wonder if this year is making the big ISPs rethink their business plans. For years, many big ISPs have foregone making long-term investments in broadband and instead chased the quick return. A good example is CenturyLink. Before the merger with Level 3, the company had started a program to replace the copper plant in urban markets with fiber aggressively. At the peak, the company built fiber to pass 700,000 homes a year. more

Why the Dot Org Sale Is Failing and How Brooks, Nevett and Sullivan Could Have Wired It

When ISOC, PIR and Ethos announced the sale in November they hoped for a quick transaction. PIR CEO Jon Nevett announced the same week that PIR would be going on a buying spree. This was optimistic. Six months, if at all, is now the more likely outcome. How many times in recent history have companies surprised stakeholders with their best-laid plans, only to discover we no longer live in a world where business has free reign. The glory days of the 2000s died with Lehman Brothers. more

FCC to Review State AI Regulation

The FCC is considering whether it can preempt state-level AI regulations using telecommunications law. Legal precedent and jurisdictional ambiguity, however, make such a maneuver uncertain and likely to face significant industry and judicial resistance. more

How to Best Manage the Social Media

The internet started to take on momentum in the 1990s. At that time many analysts, myself included, marveled at the opportunity of creating a platform that would boost grassroot democracy. There was no need for a middleman and there were few barriers to ordinary people becoming involved. This included organizing groups, discussions and events, sharing knowledge, insights and information, publishing opinions -- just some of the potential attached to the internet. more

An Update on Satellite Broadband

Ookla recently published a blog that looks at the speed performance of satellite broadband, focusing mostly on Starlink. I haven't looked at this broadband sector for a while and thought it was time for an update. Starlink has had a busy year. At the end of November, the company had 5,500 satellites in orbit, up from over 3,200 at the end of 2022. The first constellation is still slated to reach almost 12,000 satellites, and the company has tentative permission from the FCC to extend to 42,000. more

Using Data to Amplify Your Business

The digital realm is bursting with data. The buzz words of today are "big data," and I know you've heard them. There's a reason why. It can boost business in extraordinary ways. But how? Let's first look at what exactly big data is: enormous collections of information developed either internally from the company itself or from a vast array of new media. At times, this data is so large, it cannot be analyzed using standard means of examination. more

Small Computers Will Connect Everything

Size and cost have always been restraining factors to the utilization of computers. The first computers occupied whole rooms. When personal computers arrived, they were still rather bulky. Today, we have slim ultrabooks and compact small form factor PCs. Computers are not only getting smaller in this age, they're also becoming cheaper. And single-board computers like the Raspberry Pi are taking cost and size down a step further. These units bring compact and affordable processing to the masses. more

If You’re Thinking About Applying to Be the Next ICANN CEO…

ICANN is preparing to search for its next CEO. In the past and again now, each of us has been asked for advice about applying for the job. We have willingly offered our perceptions of what the job requires. The general thrust of our advice is to alert the potential applicant about the complexities and demands of the job so they can assess for themselves whether they might be a viable candidate. Our comments in these situations are, of course, purely our own opinions, and are not connected to the official posture of ICANN. more

Can We Control the Digital Platforms?

The digital market has matured over the last 20 years, and it is no longer an excuse for governments to do nothing with the aim to let new markets and innovations emerge without immediate regulatory oversight. It has become clear this period is now well and truly over. The European Commission has already launched several lawsuits against the digital giants. Regulation, in general, is known as "ex-post" (after the deed has been done). This is set to change, as I will explain later. more

Steps on How Service Providers Can Combat CPE Fraud and Protect Network Security

Cable modem fraud can be a major source of revenue leakage for service providers. A recent study found that communication service providers lost $3 billion dollars worldwide due to cable modem cloning and fraudulent practices. To combat this problem, device provisioning solutions include mechanisms to prevent loss -- but what do you really need to protect your bottom line? more

Highlights from SCTE Cable-Tec EXPO

As a product manager and engineer, I really enjoy attending the technology-oriented Cable-Tec Expo each year. It has a stronger technology focus than many other industry trade shows and it's always a good opportunity to talk to the engineering teams from all of the operators and vendors. more

How to Combat Counterfeiters on Chinese Marketplaces

Establishing your brand in an effort to combat counterfeiters on the ever growing and incredibly popular Chinese marketplace Alibaba can seem like a daunting task. Alibaba has grown so popular that it now ships over 12 million packages a day, compared the 3 million shipped by Amazon. Additionally, on Cyber Monday, a popular day for online shopping during the holiday season, Amazon processed 37 million orders. In comparison on Singles Day, an annual holiday in China, Alibaba processed 278 million orders. more

The Emotional Cost of Cybercrime

We know more and more about the financial cost of cybercrime, but there has been very little work on its emotional cost. David Modic and I decided to investigate. We wanted to empirically test whether there are emotional repercussions to becoming a victim of fraud (Yes, there are). We wanted to compare emotional and financial impact across different categories of fraud and establish a ranking list (And we did). more

Topics

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

DNS Security

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days