Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Tough Choices Two Years In

At the start of my term as New TLD Applicant Group (NTAG) Chair, I wrote about the importance of the 50th ICANN meeting for applicants. The meeting is significant, not only as a milestone for ICANN, but also because it marks two years since ICANN began processing new gTLD applications. Two years in, the program is at an inflection point. The final initial evaluation result was published two weeks ago and the first ICANN auction will take place this week. more

Performance Test White Paper for SDN Controller Issued

Recently, BII-Global SDN Certified Testing Center (SDNCTC EN | CH) issued the Performance Test White Paper for SDN Controller (hereinafter Whitepaper) at China Future Network and Development Innovation Forum, which truly fills the vacuum in SDN controller performance testing at home. It, by means of elaborate results from the open-source controller tests, provides reliable analysis report to all corners within the industry, which has been highly thought of and widely supported by experts both at home and broad. more

In Response to Offensive Destruction of Attack Assets

It is certainly true that DDoS and hacking are on the rise; there have been a number of critical hacks in the last few years, including apparent attempts to alter the outcome of elections. The reaction has been a rising tide of fear, and an ever increasing desire to "do something." The something that seems to be emerging is, however, not necessarily the best possible "something." Specifically, governments are now talking about attempting to "wipe out" the equipment used in attacks. more

DDoS Mitigation: A Blend of Art and Science

As DDoS attacks become larger, more frequent and complex, being able to stop them is a must. While doing this is part science, a matter of deploying technology, there is also an art to repelling sophisticated attacks. Arbor Networks, Citrix and others make great gear, but there's no magic box that will solve all your problems for you. Human expertise will always be a crucial ingredient. more

5G Security – Metrics of the Engaged

This past month on 03-06 March, the global industry sub-group that exists at the center of 5G security met virtually. It is known as SA3 within the 3GPP organization, and it met over a period of five days to deal with some of the most important 5G security requirements. 3GPP is a "partnership" created among all the world's major standards bodies, which over several decades has cooperatively developed and evolved by far the largest and most successful global electronic communications network. more

Human Rights in the Digital Age, Online Pharmacies, and the “Brussels Principles”

"Human Rights in a Digital Age" is the theme of this year's RightsCon conference in Toronto. An essential human right is access to safe, affordable prescription medications. The Internet makes this possible, our organization has proven it's achievable and sustainable over an extended period of time, and our proposed "Brussels Principles" provide the framework to take our proven success internationally. Across the Globe, to people everywhere. more

The Myth of Infinite Bandwidth

Back in the late 1990s I was often asked what I thought would happen if Internet bandwidth was infinite -- what would that change about the Internet itself? Level 3's (LVLT) recent decision to slash prices on its content distribution network and rumors of new multi-terabit cables across the Pacific have me wondering if we are actually getting closer to having infinite bandwidth. But when replying to the infinite bandwidth question I was prone to posing a return question -- what does infinite bandwidth actually mean? more

Using AM Radio Towers in Designing Wireless Networks

One existing resource that is often overlooked in designing wireless networks is AM radio towers. For the most part, companies deploying fixed wireless and microwave antenna have avoided these towers. This is due to the nature of AM radio, which transmits at such a low frequency that the entire tower is effectively used as the transmitting antenna. The entire tower is energized with the AM signal, and the typical AM tower sits on a base insulator that blocks the tower from being grounded.  more

Hole in Space - the Mother of All Video Chats

New technology enables new art forms and artists Kit Galloway and Sherrie Rabinowitz (K&S) began working with geostationary satellite links in 1977. Their first work was an experiment in remote dance and music. Video of dancers at The Goddard Space Flight Center in Maryland and an educational television center in California was transmitted to a central control studio where a composite was formed and sent back to monitors the dancers could see. more

Internet Governance: Coin of the New Realm

The Aspen Institute released the IDEA Common Statement and Principles as a do no harm Hippocratic Oath for Internet governance. The Aspen report describes the present moment as an inflection point for "the most robust medium of information exchange in history". Reed Hundt outlined the risks associated with Internet governance changes favored by China and a group of developing nations through the ITU. more

An Equal Seat at the Table: My Journey Into Multi-Stakeholder Internet Governance at ICANN 53

ICANN 53, in beautiful Buenos Aires, was the first time I experienced multi-stakeholder Internet governance Back then, I represented, as chair, the Latin American Forum of Telecommunications Regulators (REGULATEL), an observer org in GAC. I remember my amazement... more

Using LEOs and GEOs

Once you head away from the areas serviced by modern terrestrial cable infrastructure, the available digital communications options are somewhat limited. Some remote areas are served using High-Frequency radio systems, using radio signals that bounce off the ionosphere to provide a long-distance but limited bandwidth service. Or there are satellite-based services based on spacecraft positioned in geostationary orbital slots. more

WikiLeaks’ Vault 7: CIA Gives a Free Lesson in Personal Cyber Security

WikiLeaks' newly released Vault 7 trove is a tantalizing study in how one of the world's premiere intelligence agencies hacks devices. Analysts and experts have signaled that this leak appears authentic based on some clues in the content. But while it may ultimately be comparable in size to the Snowden or Manning leaks, it lacks the "wow" factor that made those landmark whistleblowing cases so important. What lessons are to be learned from the leaks, and how should we apply them to our personal digital lives? more

Stop the Presses! No Consensus at NetMundial!

We could see it as a victory for those advocating changes and adjustments in the system of internet governance. Au contraire... we could consider it as the debacle of the good intentions... all ending up in not knowing if it was worth it. I say and maintain, that the effort and the earned contributions were worth it. The final result is that ICANN should be strengthened to recognize its merits and achievements, not underestimate what this organization has accomplished in fifteen years of hard and continuous work. more

Recent Case in Federal Court Shows Inefficiencies of Anticybersquatting Consumer Protection Act

A recent case1 from a federal court in Kentucky shows why the Anticybersquatting Consumer Protection Act (15 U.S.C. 1125(d) - the "ACPA") can be - when compared to the Uniform Domain Name Dispute Resolution Policy ("UDRP") - a relatively inefficient way of resolving a domain name dispute. Here is a quick rundown of the facts. Defendant owned a business directly competitive to plaintiff ServPro. Plaintiff had used its mark and trade dress since the 1960's... more

Topics

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Threat Intelligence

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days