Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

A Note on Subscriptions with Introductory Pricing

Over the years, I've kept tabs on residential Internet services in my local area (Vancouver, BC) and noticed that almost all providers have the following "limited time offer"... On the surface, this sounds like a great way to entice users to sign up -- or more importantly, switch over. But are we missing something here? After the initial discounted rate, subscribers receive a friendly reminder of what their subscription actually costs. And chances are, they're not going to be happy with their next bill. more

Binding .ORG and the Community Together

In direct response to the enormous interest and input we have seen from the .ORG community over the past several months, Ethos and Public Interest Registry (PIR) have made tremendous strides in laying out our collective vision for .ORG and put forth unprecedented commitments and protections for the .ORG community. Over the last two weeks, in particular, we have taken concrete actions to better align the community's interests with the operations of PIR and .ORG. more

Exploring Common Ground: Human Rights at ICANN

Our relationship to human rights is ambivalent. We take them for granted, we don't want to be without them, but on the other hand, we see them as somewhat abstract and aspirational, a lofty ideal easily forgotten and set aside in our daily struggles. When it comes to the digital domain, human rights are seen by many as an unwanted source of regulations in an industry that demands "unregulated innovation." more

The Geopolitical Protocol: Can QUIC and LEO Satellites Mitigate the Risks of Fragile Subsea Cables?

As geopolitical tensions expose the fragility of subsea cables, Low Earth Orbit satellites and the QUIC protocol promise a more resilient internet by diversifying routes, preserving session continuity, and redefining control over global data flows. more

What Drives IPv4 Demand in Today’s Market?

Predictions of IPv4's demise were premature. A market webinar shows demand has diversified, prices reflect structure not relevance, and leasing, policy shifts and broadband funding will keep the ageing protocol strategically important for years ahead. more

Is the Broadband Industry Reaching Maturity?

Craig Moffett, of MoffettNathanson, was recently quoted in FierceTelecom asking if the broadband industry is reaching maturity. Other than in rural areas, where many homes are still hungry for better broadband, the broadband penetration rate in cities is approaching 90%. It's a fair question to ask if there is room for much more growth in the industry. This is a question that has bounced around for the last five years. more

China, AFRINIC, and the Dangerous Precedent That Could Destabilize the Global Internet

A dispute over 6.2m IPv4 addresses at AFRINIC exposes how litigation and market incentives could erode regional stewardship, setting a precedent that risks turning the Internet's allocation system into a vehicle for global arbitrage. more

Entering the Growing IPv4 Market: What Enterprises Should Do Now

With IPv4 addresses fetching up to $30 apiece and IPv6 adoption lagging, companies may be sitting on hidden digital assets. A strategic audit could unlock unexpected revenue and enhance long-term infrastructure planning. more

How to Restore Trust Into Cyberspace? Beer Has the Answer!

Let's face it, when it comes to digital technologies, fundamental human rights are not on top of the digital agenda. They seem irrelevant and remote, even an obstacle to digital innovation and opportunities. We are quick to pay lip service to them, but we permit the profit motive and stakeholder self-interests to override human rights principles. It does not matter how right and righteous the cause might be; to be implemented, it must be profitable or carry stakeholder benefits. more

FCC Alert on Cybersecurity Risks

The FCC warns telecom companies of rising ransomware threats after attacks quadrupled since 2022. The agency urges stronger defenses including patching, multifactor authentication, network segmentation, and closer oversight of vendors and incident response planning. more

Would the “Mensch” in the Room Please Stand Up!

Wolfgang Kleinwaechter, in his Internet Governance Outlook 2024, reminded us that 2024, as the years before and future years, will be pivotal for Internet Governance processes. We eagerly await Wolfgang's missives every January, and we trust what we read because we know him, and we trust CircleID. We should be grateful and cherish this example of straightforward, digitally enabled, and trust-based human communication... more

African SMEs Are Paying the Price for Global Digital Policy Blind Spots

Global digital policy frameworks often overlook the realities of African SMEs, imposing compliance standards shaped by mature economies and infrastructure, thereby constraining innovation, competitiveness, and inclusion in the digital economy. more

When the Registry Itself Is Contested: The Unseen Geopolitical Risk in the 2026 gTLD Round

As the 2026 gTLD round opens, applicants face an overlooked geopolitical hazard: what happens if the registry or RIR underpinning their domain collapses under sanctions or war, leaving contracts stranded and accountability elusive. more

Legacy or Not to Be?

Over the years, most communication service providers will build up their information systems bit by bit. Every so often as new services are required, a new process and vendor product is installed. Several years later, there can be many legacy processes and vendor products chosen and designed by many different people. Generally, each implementation team is diligently aware of these legacy processes and vendor products. But in a lot of cases the whole enterprise architecture becomes very convoluted and complicated. more

Is Zoom’s Server Security Just as Vulnerable as the Client Side?

Zoom programmers made elementary security errors when coding, and did not use protective measures that compiler toolchains make available. It's not a great stretch to assume that similar flaws afflict their server implementations. While Mudge noted that Zoom's Windows and Mac clients are (possibly accidentally) somewhat safer than the Linux client, I suspect that their servers run on Linux.Were they written with similar lack of attention to security? more

Topics

IPv4 Markets

Sponsored byIPv4.Global

DNS Security

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days