Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Internet Governance and End-User Engagement

As the digital landscape continues to evolve at an accelerated pace, the role of end-user participation in Internet governance has never been more crucial. With the World Summit on the Information Society (WSIS) +20 Review on the horizon, it's time to critically evaluate the progress made and the vast terrains yet to be charted. This topic was recently discussed at the EURALO round table moderated by Pari Esfandiari with panelists Sandra Hoferichter, Olivier Crépin-Leblond, and Lucien Castex, delving into the intricacies of fostering a user-centric, inclusive, and development-oriented information society since the inaugural WSIS meetings in 2003 and 2005. more

Winning the 6G Race

America has declared its intent to win the 6G race, casting next-generation wireless as vital to security and growth. Yet standards are global, vendors multinational, and the rhetoric looks like spectrum lobbying than technological rivalry. more

Quantifying the Benefits of Telemedicine

There was a recent article in JAMA Network Open, part of the monthly journals of the American Medical Association, that reported on a large study to quantify the benefits of using telemedicine with cancer patients. The study was conducted at National Cancer Institute - Designated Comprehensive Cancer Center in Florida from April 2020 through June 2021. The study wanted to quantify the cost savings for patients that were able to conduct visits via telehealth rather than drive to the cancer center. more

6 Reasons a Billing Solution Won’t Cut It for Service Fulfillment

You don't always need to dazzle consumers -- but you do need to deliver what they want, when they want it, or else risk being left behind. The crux of service activation is to provide requested services to the subscriber in the shortest possible timeframe. The rise in multi-play service offerings can sometimes make this goal difficult, with service fulfilment involving multiple back-end components, including billing, provisioning, activation, monitoring, and diagnostics, as well as different technology types. more

Securing Digital Brand Borders in a Fragmented World

GlobalBlock's expansion into China and Germany signals a shift from reactive brand protection to centralized prevention, as firms seek scalable, cost efficient defences against proliferating AI driven domain abuse worldwide amid a fragmented digital landscape. more

Engaging Consumers in Cyber Security: It’s Up to You

In a perfect world, consumers recognize authentic emails from fake, update their operating system, browser and anti-virus software, and have a healthy skepticism about the safety of the Internet. The bad guys hate perfect, so we should be working with consumers to stop them. ... Organizations like mine are joining forces to recruit consumers -- who are also your customers and employees -- in the fight against cybercrime. more

Are You Playing Roulette With Your Network Upgrades?

Exponential growth in network bandwidth requirements has created a need for large CAPEX investments for most service providers. Unfortunately, each provider faces limits on all expenditures and must upgrade only what is needed, when it is needed. Nobody should waste time or money by performing unnecessary network upgrades. To avoid needless upgrading, providers must have all the data they can get from their network to guide them through the decision-making process.  more

Smartphones and Digital Literacy

As smartphones become the primary gateway to the internet for billions, a critical question emerges: does app-based digital fluency prepare users for the demands of computer-based work in a modern economy? more

The History of Broadband Price Competition

It's sometimes easy to forget that the broadband business is just over twenty-five years old. The telephone companies had a monopoly on copper-based technologies until Congress passed the Telecommunication Act of 1996, which forced the big telephone companies to allow competition for copper-based broadband services. more

The Fractured Web: How Internet Fragmentation Threatens Our Connected World

As governments, firms and engineers reshape networks, the internet is fragmenting into rival systems. Interoperability erodes, raising costs, curbing rights and weakening resilience, with global growth, innovation and cooperation increasingly at risk. more

The Trade War for Undersea Fiber

A recent article by Joe Brock for Reuters describes a new geopolitical battle over undersea fibers. There are about 400 undersea fiber routes that cross oceans and that connect the world with fiber. This is a huge business, and about 95% of all international broadband traffic passes through the undersea fibers. more

Rethinking Digital Sovereignty: The Pitfalls of an Infrastructured Approach

In an era where our lives are increasingly intertwined with digital technologies, a recent development in the realm of digital sovereignty has sparked a pressing concern for nations and individuals alike. The concept of digital self-determination, once hailed as a great equalizer, has become a battleground for power, privacy, and control, with governments and tech giants vying for dominance in the digital realm. more

What If IANA Transition Was Only a Mirage?

The U.S. government has long had a far-reaching control over the internet's technical center. What will happen now when ICANN's Board puts together a proposal on how to transfer responsibility for certain key functions within the domain name system to the internet community? Last week, ICANN had its 55th conference in Marrakech. The most important result of the meeting is that all parts of the so-called internet community approved that ICANN's Board will send a proposal to the U.S. National Telecommunications and Information Administration (NTIA) which suggests how to transfer responsibility for certain key functions within the domain name system to the internet community... more

AI: The Squandered Opportunity in India

India's AI summit promised a Global South rethink of digital governance. Instead, a weak declaration and Delhi's accession to America's Pax Silica exposed widening power asymmetries, leaving countries like Brazil outside the real circuitry of control. more

The Kinetic Frontier: Lessons From Geopolitical Violence and the Bunkerization of AI Infrastructure

Kinetic attacks on Gulf data centres expose the cloud's physical fragility, recasting AI infrastructure as strategic targets and accelerating bunkerisation, while outdated data laws leave firms choosing between legal compliance and digital survival. more

Topics

DNS Security

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days