Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

6 Reasons a Billing Solution Won’t Cut It for Service Fulfillment

You don't always need to dazzle consumers -- but you do need to deliver what they want, when they want it, or else risk being left behind. The crux of service activation is to provide requested services to the subscriber in the shortest possible timeframe. The rise in multi-play service offerings can sometimes make this goal difficult, with service fulfilment involving multiple back-end components, including billing, provisioning, activation, monitoring, and diagnostics, as well as different technology types. more

Winning the 6G Race

America has declared its intent to win the 6G race, casting next-generation wireless as vital to security and growth. Yet standards are global, vendors multinational, and the rhetoric looks like spectrum lobbying than technological rivalry. more

Engaging Consumers in Cyber Security: It’s Up to You

In a perfect world, consumers recognize authentic emails from fake, update their operating system, browser and anti-virus software, and have a healthy skepticism about the safety of the Internet. The bad guys hate perfect, so we should be working with consumers to stop them. ... Organizations like mine are joining forces to recruit consumers -- who are also your customers and employees -- in the fight against cybercrime. more

Fake Domains, Real Damage: What the Latest Data Reveals

Third-party domains exploiting brand names are proliferating, with 88% of homoglyphs externally owned. Many remain dormant yet email-enabled, creating scalable phishing risks as attackers increasingly target trust rather than infrastructure. more

Are You Playing Roulette With Your Network Upgrades?

Exponential growth in network bandwidth requirements has created a need for large CAPEX investments for most service providers. Unfortunately, each provider faces limits on all expenditures and must upgrade only what is needed, when it is needed. Nobody should waste time or money by performing unnecessary network upgrades. To avoid needless upgrading, providers must have all the data they can get from their network to guide them through the decision-making process.  more

The History of Broadband Price Competition

It's sometimes easy to forget that the broadband business is just over twenty-five years old. The telephone companies had a monopoly on copper-based technologies until Congress passed the Telecommunication Act of 1996, which forced the big telephone companies to allow competition for copper-based broadband services. more

Smartphones and Digital Literacy

As smartphones become the primary gateway to the internet for billions, a critical question emerges: does app-based digital fluency prepare users for the demands of computer-based work in a modern economy? more

The Trade War for Undersea Fiber

A recent article by Joe Brock for Reuters describes a new geopolitical battle over undersea fibers. There are about 400 undersea fiber routes that cross oceans and that connect the world with fiber. This is a huge business, and about 95% of all international broadband traffic passes through the undersea fibers. more

Rethinking Digital Sovereignty: The Pitfalls of an Infrastructured Approach

In an era where our lives are increasingly intertwined with digital technologies, a recent development in the realm of digital sovereignty has sparked a pressing concern for nations and individuals alike. The concept of digital self-determination, once hailed as a great equalizer, has become a battleground for power, privacy, and control, with governments and tech giants vying for dominance in the digital realm. more

What If IANA Transition Was Only a Mirage?

The U.S. government has long had a far-reaching control over the internet's technical center. What will happen now when ICANN's Board puts together a proposal on how to transfer responsibility for certain key functions within the domain name system to the internet community? Last week, ICANN had its 55th conference in Marrakech. The most important result of the meeting is that all parts of the so-called internet community approved that ICANN's Board will send a proposal to the U.S. National Telecommunications and Information Administration (NTIA) which suggests how to transfer responsibility for certain key functions within the domain name system to the internet community... more

The Fractured Web: How Internet Fragmentation Threatens Our Connected World

As governments, firms and engineers reshape networks, the internet is fragmenting into rival systems. Interoperability erodes, raising costs, curbing rights and weakening resilience, with global growth, innovation and cooperation increasingly at risk. more

AI: The Squandered Opportunity in India

India's AI summit promised a Global South rethink of digital governance. Instead, a weak declaration and Delhi's accession to America's Pax Silica exposed widening power asymmetries, leaving countries like Brazil outside the real circuitry of control. more

Securing Digital Brand Borders in a Fragmented World

GlobalBlock's expansion into China and Germany signals a shift from reactive brand protection to centralized prevention, as firms seek scalable, cost efficient defences against proliferating AI driven domain abuse worldwide amid a fragmented digital landscape. more

Fixing Geofeed: From Self-Reported Data to Verified Trust

Geofeed data, long reliant on unverifiable self-assertions, faces mounting security risks. Integrating RPKI could transform it into a trusted, cryptographically validated infrastructure, strengthening routing integrity, regulatory compliance, and digital sovereignty across an increasingly contested internet. more

Diagnosing Load Test Errors - Where to Start for Holiday Success

Picture this: you just completed hours of internal Web services preparations with your system administrative team prior to the holidays. You discovered possible points of failure and made appropriate modifications with the expectation of a perfect load test. You take a few minutes to relax, refill the coffee mug sitting in front of you, and connect to the conference bridge where real-time discussion about the load test will occur. Things go well for the first 20 minutes of the test... Then it happens: one of the simulated users logs an error stating that it has timed out. more

Topics

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

DNS Security

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days