Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

The Trade War for Undersea Fiber

A recent article by Joe Brock for Reuters describes a new geopolitical battle over undersea fibers. There are about 400 undersea fiber routes that cross oceans and that connect the world with fiber. This is a huge business, and about 95% of all international broadband traffic passes through the undersea fibers. more

The History of Broadband Price Competition

It's sometimes easy to forget that the broadband business is just over twenty-five years old. The telephone companies had a monopoly on copper-based technologies until Congress passed the Telecommunication Act of 1996, which forced the big telephone companies to allow competition for copper-based broadband services. more

Cloud-Edge Collaboration: The Inevitable Future of AI Computing

Over the past decade, cloud computing has experienced explosive growth, evolving from its nascent stage to widespread adoption and fundamentally changing how businesses and individuals use information technology. At the same time, traditional on-premise computing, while still having its use cases, has been progressively integrated with, and often even controlled by, Cloud Service Providers (CSPs) in many aspects. more

Diagnosing Load Test Errors - Where to Start for Holiday Success

Picture this: you just completed hours of internal Web services preparations with your system administrative team prior to the holidays. You discovered possible points of failure and made appropriate modifications with the expectation of a perfect load test. You take a few minutes to relax, refill the coffee mug sitting in front of you, and connect to the conference bridge where real-time discussion about the load test will occur. Things go well for the first 20 minutes of the test... Then it happens: one of the simulated users logs an error stating that it has timed out. more

Building a Trusted Internet Starts with Hosting Providers

The Secure Hosting Alliance has introduced a certification programme to establish clear, verifiable standards for internet hosting providers, aiming to improve accountability, boost transparency, and strengthen the trust that underpins global online infrastructure. more

Rethinking Digital Sovereignty: The Pitfalls of an Infrastructured Approach

In an era where our lives are increasingly intertwined with digital technologies, a recent development in the realm of digital sovereignty has sparked a pressing concern for nations and individuals alike. The concept of digital self-determination, once hailed as a great equalizer, has become a battleground for power, privacy, and control, with governments and tech giants vying for dominance in the digital realm. more

Q3 Broadband Report Shows Uploads Rising Faster Than Downloads

OpenVault's latest broadband report shows U.S. households using more data, with uploads rising faster than downloads and a major shift toward midrange speed tiers. Growing gaming, streaming, and cloud activity continues to reshape network demand and subscriber behavior. more

.ORG Stewardship Council Will Ensure .ORG’s Commitment to Freedom of Expression Continues

The .ORG Stewardship Council is, in a lot of ways, a natural progression or evolution from our current PIR Advisory Council. The Advisory Council is made up of independent .ORG community members from around the world that provide advice to PIR on policy issues affecting them. The "AC," or the Advisory Council, has been a key part of PIR's work since its inception. more

Munich Cybersecurity Conference 2026: Moving Into the Twilight Zone

At Munich's twin security gatherings, leaders warned that cyber conflict, transatlantic rifts and weaponised AI are pushing the rules-based order into a perilous transition, where deterrence falters, norms erode and digital sovereignty trumps multistakeholder ideals. more

Tactics for Responding to Cyber Attacks - Squeezing Your Cyber Response-Curve: Part 2

In part one of this post we introduced the cyber response curve. In this post, we have outlined some observations which illustrate how different level of maturity and approaches can affect your cyber response curve. more

ICANN’s Ultimate Demise?

ICANN's proposed overhaul of root server governance would empower a new council to revoke America's operator status, risking a clash with a resurgent Trump administration and potentially imperiling the multistakeholder model that underpins the internet's core infrastructure. more

For ICANN to Have a Future, It Needs to Take Human Rights Considerations Seriously

Despite previous attempts1 I think it is safe to say that the discussion about Human Rights in ICANN was, until recently, fairly dead, even taboo. Nowadays, there seems to be a renewed demand for ICANN to have a future, and it needs to take Human Rights considerations seriously. During the ICANN Cancun meeting, representatives from several stakeholder groups mentioned HR and how they might support ICANN by informing its policy-making processes. more

Can a CDN Help Website and Application Performance?

Before we answer the question, "Can a CDN help your website and application performance," let's take a moment for a short CDN 101. A CDN (content delivery or content distribution network) is a system of computers placed at different network nodes to provide the same content from the shortest distance possible. In other words, a CDN attempts to take pieces of content from your website and pass it to various nodes around the Internet. more

Making Sure March Madness Doesn’t Live Up to Its Name

Last month, I talked about keeping the Winter Olympics from clogging up your networks as employees raced to stream live events during the workday. Well, in the U.S., we are in the middle of NCAA Men's Basketball Tournament, the annual "madness" repeats itself all over again. And let's be honest, most of us want to sneak a peek at the scores and witness some of the thrilling upsets that happen every year. more

ICANN Is Violating Its Legal Agreements with the U.S. Government – Who’s Next?

In April, I published an article, The Multistakeholder Moment of Truth: Will Stakeholders Hold ICANN Accountable?, alerting stakeholders that ICANN is violating its legal agreements with the U.S. Government -- namely the InterNIC licensing agreement and merged Memorandum of Understanding. At that time, I warned that it is essential for stakeholders not to remain silent in the face of this transgression, "hoping that such behavior left unchecked will end of its own accord." more

Topics

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

DNS Security

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days