Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Keeping Cyberspace a Public Space

I recently had an opportunity to re-read a pamphlet I wrote in 2000 for a series on new thinking about mutualism published by the Co-operative Party. In 'e-Mutualism, or the tragedy of the dot.commons' I talked at length about the co-operative basis of the Internet, the need for online public spaces which are not controlled or dominated by commercial interests, and the opportunities that the network offers for mutual organisations of all sizes, from small co-operatives to retailers like John Lewis... Re-reading it now I wasn't too embarrassed by my ten-year old analysis. more

Ladies and Gentlemen, China’s Netizen Day…

Just after the government announces a crackdown on Internet smut. Yesterday, they announced plans for "Netizen Day" on September 14th, which apparently marks 15 years since the first e-mail message was sent from China in 1987. The new celebratory day (I don't think it's an official holiday) was unveiled at an official ceremony presided over by Chinese government officials and Internet execs, many of whose companies - including Google, Sina, and Sohu, who were named in the smut crackdown just 24 hours before. more

Forward-Thinking Remedies

Just a year ago, I gave a talk at David Isenberg's 2005 Freedom to Connect conference. I said, essentially, that we should be careful in asking for regulation to protect the net, because the power to protect carries with it the power to constrain. This was a very troubling message for the audience, and the chatroom projected behind me went wild with disapproval. Since then, I've become very concerned about the concentration in broadband service provision in this country, and worried that there won't be any competition for unfettered internet access. more

Four Critical IT Elements for a More Productive Business

IT is now a boardroom discussion. Beyond troubleshooting server issues and maintaining network security, IT initiatives must provide company-wide ROI and work in unison with other department objectives. But the link between corporate efficiency and technology spending isn't always obvious -- here are four critical IT elements your business needs to improve productivity. more

MySpace Wins Big Against Richter?

News rumblings are that MySpace is celebrating its $6mm award against Scott Richter and his entities... Who Won? ...I'm not sure what MySpace asked for (their complaint is probably not a reliable barometer) but the overall tone of the document written by the arbitrator is that Richter's companies shouldn't be held entirely liable for all damages to MySpace. (In fact, the arbitrator's decision takes pains to show both sides of Richter. Some would say this is typical in arbitration.) more

Wireless VoIP: Loss Leader or Upselling Strategy?

Verizon Wireless' decision to allow their subscribers to access Skype raises a question about strategy. Is Verizon leveraging Skype access as an inducement for subscribers to upgrade to smartphones and commit to $30 a month data plans, has the company acknowledged that its future marketplace success lies in data and not voice services, and how will the company prevent a substantial reduction in plain old voice subscriptions priced above the $30 data plan benchmark? more

Securing the Core

BGP. Border Gateway Protocol. The de-facto standard routing protocol of the Internet. The nervous system of the Internet. I don't think I can overstate the importance, the criticality of BGP to the operation of the modern Internet. BGP is the glue that holds the Internet together at its core. And like so many integral pieces of the Internet, it, too, is designed and built on the principle of trust... The folks who operate the individual networks that make up the Internet are generally interested in keeping the Internet operating, in keeping the packets flowing. And they do a great job, for the most part. more

The Utility Formerly Known As WHOIS

Muscle memory is a funny thing. We don't even think about it really, but when we do the same thing over and over again, it just becomes second nature to us. This is how we've come to use WHOIS over the past two decades to get contact information for registered domain names. If you wanted to see who owned a domain, you'd simply do a WHOIS search. I've probably done hundreds of thousands of them during my time in the industry. Well as of this week, a major step in the retirement of WHOIS officially took place. more

Fair Notice and Applying for a New gTLD

Applying for a new generic Top-Level Domain (gTLD) will be expensive and complex. ICANN's Applicant Guidebook comprises 350 pages of dense instructions, spelling out the procedures to apply for a gTLD and to comment or object to the gTLDs applied for by others. Hidden among the forest of criteria and procedures is a problem that, unless solved, could deny good faith applicants the fair notice they deserve. more

Biggest Deal in Telecom Policy Since the AT&T Divestiture

The biggest communications policy moment since the AT&T divestiture has just happened: The $100 million-dollar-march (or more -- what Comcast spent to make sure this happened) has ponderously, self-evidently reached its conclusion with the FCC's approval of the merger between Comcast and NBCU. It wasn't the subtlest campaign; it didn't need to be; it was effective in its discipline and heavy persistence. The tweets are flying and the journalists are already weighing in. more

The ITRs and Cybersecurity

Cybersecurity is a top-of-mind issue with calls for individual vigilance, national legislation, and international treaties to address gaps that are exploited causing significant harm and financial loss on a daily basis. The vast majority of these calls are well-intentioned though even among the best-intentioned, some are poorly directed. Such is the case with all of the proposals that would introduce security into the International Telecommunication Regulations (ITRs) of the International Telecommunication Union (ITU). more

The Evolution of 5G

Technology always evolves, and I've been reading about where scientists envision the evolution of 5G. The first generation of 5G, which will be rolled out over the next 3-5 years, is mostly aimed at increasing the throughput of cellular networks. According to Cisco, North American cellular data volumes are growing at a torrid 36% per year, and even faster than that in some urban markets where the volumes of data are doubling every two years. The main goal of the first-generation 5G is to increase network capacity to handle that growth. more

China Sends a Wake-Up Call to All Multinationals - Are You Awake?

If you visit Marriott's China website today, you're likely to see this (see screenshot). I dumped the text within this page into Google Translate and included below is what it loosely said. So what exactly happened here? Marriott sent a survey in Mandarin to its Chinese loyalty members that referred to Tibet, Macau, and Taiwan as "countries." As readers of this site might know quite well by now, in the eyes of Chinese authorities, this is no trivial oversight. more

HD Voice Really is Great

Listen for half a minute to a demo of a high-bit-rate codec and you expect they will transform our industry. The difference is like a CD with great headphones versus a little transistor radio. Suddenly, you realize just how awful the sound is on your regular telephone. Who wouldn't want their call to sound dramatically better was my first reaction. When Thomson and some of the cable folks discussed plans, I was enthusiastic. Years later, nearly no one is taking advantage... more

LAC, the DNS, and the Importance of Comunidad

The 1st Latin American & Caribbean DNS Forum was held on 15 November 2013, before the start of the ICANN Buenos Aires meeting. Coordinated by many of the region's leading technological development and capacity building organizations, the day long event explored the opportunities and challenges for Latin America brought on by changes in the Internet landscape, including the introduction of new gTLDs such as .LAT, .NGO and others. more

Topics

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Threat Intelligence

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days