I believe the infrastructure of our country, states, and counties is critically important to our future. If we can get focused on infrastructure and global warming, the future for our kids and grandkids will be bright. All it takes is vision, leadership, and investment. Unfortunately, the issues have become politicized. In the case of infrastructure, the politicians have a tough time just defining what infrastructure is. more
At ICANN's recent virtual meeting, I was fortunate enough to join a panel facilitated by the Brand Registry Group (BRG), an association of organisations promoting the use of brand top-level domains, where we discussed the release of the next round of the generic top-level domain (gTLD) program. The fact that I was participating in a discussion like this is hardly news, as I've been commenting on the policy discussions and debating its role in the digital landscape for years. more
As Internet governance fragments in 2026, authority shifts from open, multistakeholder forums to state-led security regimes, legal instruments, and alliance-based cooperation, challenging longstanding institutions and reshaping global norms through enforcement rather than consensus. more
What might look like a routine procedural dispute over votes is, in fact, a glaring reminder that Regional Internet Registries (RIRs) are now geopolitical pressure points - and that ICANN's oversight of RIR governance must evolve to meet these risks. On 23 June 2025, AFRINIC, the RIR that serves Africa, attempted to hold long-delayed elections to restore stability after years of legal battles and board paralysis. Yet instead of restoring trust, the process imploded almost immediately. more
The page with the WSIS version of enhanced cooperation of Internet governance, developed in 2005, was turned forever on 30 September 2016 with the expiration of the IANA contract between the NTIA and ICANN. The IANA arrangement was the last issue that remained unchanged since the WSIS Tunis phase where the international community discussed Internet governance related issues for the first time. On 1 October 2016, the concept of enhanced cooperation as defined by the Tunis Agenda ceased to exist. more
Over the years, I've kept tabs on residential Internet services in my local area (Vancouver, BC) and noticed that almost all providers have the following "limited time offer"... On the surface, this sounds like a great way to entice users to sign up -- or more importantly, switch over. But are we missing something here? After the initial discounted rate, subscribers receive a friendly reminder of what their subscription actually costs. And chances are, they're not going to be happy with their next bill. more
In a previous article, I reported on the problems that Facebook (Meta) is facing – currently betting the house on its Meta service, based on a software platform that will create a virtual reality (VR) networked environment. I mentioned that I was critical about this business model and that I don’t see, at least for the foreseeable future, a platform (based on VR) that would turn the internet or mobile networks into VR environments. I also mention that I do see interesting markets for VR in certain sectors. more
In direct response to the enormous interest and input we have seen from the .ORG community over the past several months, Ethos and Public Interest Registry (PIR) have made tremendous strides in laying out our collective vision for .ORG and put forth unprecedented commitments and protections for the .ORG community. Over the last two weeks, in particular, we have taken concrete actions to better align the community's interests with the operations of PIR and .ORG. more
Our relationship to human rights is ambivalent. We take them for granted, we don't want to be without them, but on the other hand, we see them as somewhat abstract and aspirational, a lofty ideal easily forgotten and set aside in our daily struggles. When it comes to the digital domain, human rights are seen by many as an unwanted source of regulations in an industry that demands "unregulated innovation." more
Craig Moffett, of MoffettNathanson, was recently quoted in FierceTelecom asking if the broadband industry is reaching maturity. Other than in rural areas, where many homes are still hungry for better broadband, the broadband penetration rate in cities is approaching 90%. It's a fair question to ask if there is room for much more growth in the industry. This is a question that has bounced around for the last five years. more
Fiber manufacturers are always trying to make it easier to deploy fiber. One of the most interesting trends is the increasing migration from 250-micron fiber to 200-micron fiber. For those not familiar with the metric system, a micron is one-thousands of a millimeter. A 250-micron fiber has a diameter of 0.25 millimeters, while a 200-micron fiber has a diameter of 0.2 millimeters. more
Let's face it, when it comes to digital technologies, fundamental human rights are not on top of the digital agenda. They seem irrelevant and remote, even an obstacle to digital innovation and opportunities. We are quick to pay lip service to them, but we permit the profit motive and stakeholder self-interests to override human rights principles. It does not matter how right and righteous the cause might be; to be implemented, it must be profitable or carry stakeholder benefits. more
Wolfgang Kleinwaechter, in his Internet Governance Outlook 2024, reminded us that 2024, as the years before and future years, will be pivotal for Internet Governance processes. We eagerly await Wolfgang's missives every January, and we trust what we read because we know him, and we trust CircleID. We should be grateful and cherish this example of straightforward, digitally enabled, and trust-based human communication... more
Over the years, most communication service providers will build up their information systems bit by bit. Every so often as new services are required, a new process and vendor product is installed. Several years later, there can be many legacy processes and vendor products chosen and designed by many different people. Generally, each implementation team is diligently aware of these legacy processes and vendor products. But in a lot of cases the whole enterprise architecture becomes very convoluted and complicated. more
Zoom programmers made elementary security errors when coding, and did not use protective measures that compiler toolchains make available. It's not a great stretch to assume that similar flaws afflict their server implementations. While Mudge noted that Zoom's Windows and Mac clients are (possibly accidentally) somewhat safer than the Linux client, I suspect that their servers run on Linux.Were they written with similar lack of attention to security? more
Sponsored byIPv4.Global
Sponsored byCSC
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byRadix
Sponsored byVerisign
Sponsored byDNIB.com