/ Featured Blogs

A Report on the ICANN DNS Symposium

By any metric, the queries and responses that take place in the DNS are highly informative of the Internet and its use. But perhaps the level of interdependencies in this space is richer than we might think. When the IETF considered a proposal to explicitly withhold certain top-level domains from delegation in the DNS the ensuing discussion highlighted the distinction between the domain name system as a structured space of names and the domain name system as a resolution space...

Know Someone Who Has Made the Internet Better? Postel Service Award Nominations Deadline May 15

Do you know of someone who has made the Internet better in some way who deserves more recognition? Maybe someone who has helped extend Internet access to a large region? Or wrote widely-used programs that make the Internet more secure? Or maybe someone who has been actively working for open standards and open processes for the Internet?

Gall’s Law and the Network

In Systemantics: How Systems Really Work and How They Fail, John Gall says: "A complex system that works is invariably found to have evolved from a simple system that worked. A complex system designed from scratch never works and cannot be patched up to make it work. You have to start over with a working simple system." In the software development world, this is called Gall's Law...

How Do You Know if You’re Choosing the Best IP Geolocation API?

If you can't address your customers and the people interacting with your network face to face, at least know where they are -- anywhere in the world, anytime you want to. That's possible with geolocation technology, and many businesses are keen on acquiring the best IP geolocation API for cybersecurity and other purposes. However, before committing to a particular solution, each product needs to be carefully evaluated according to the exact needs of a prospective buyer.

Satellite Internet Service Progress by SpaceX and Telesat

This has been a busy week in the race to deploy constellations of low-earth orbit (LEO) Internet-service satellites. In their quarterly report, Telesat mentioned progress in two, disparate markets. As I noted earlier, they have signed their first LEO customer - Omniaccess a provider of connectivity to the superyacht market.

Efficient Threat Intelligence: Learning the Secrets

How can our threat intelligence platform deliver more? This is a question many business professionals employing threat intelligence practices are asking themselves as their companies continue to fall short against the machinations of modern-day cybercriminals. The truth is that while threat intelligence is certainly not a silver bullet, organizations often make a mistake when they opt for a platform without considering several important factors that can help them evaluate the market better and deploy the practice more effectively.

Understanding 5G: A Basic Primer

The initial, essential step toward understanding 5G is to perform an intellectual body purge of the endless disgorging of cluelessness and disinformation that emerges from the Washington White House and radiates out around that city and then to the outside world that it infects. The institutes, pundits, self-professed experts, summits, and even the U.S. press all pretty much feed out of the same trough of 5G political slop that gets passed around as incantations of ignorance, spin, and K-street lobbying.

UDRP Complaint: Actually, a Motion for Summary Judgment

Trademark owners (and here I'm talking about those with U.S. registrations even if they are foreign entities) have a choice of forum for challenging alleged cybersquatting domain names. They can either sue in district court under the ACPA, or get a quicker and less expensive result by filing a complaint and asserting a claim under the UDRP. But to get to a quicker and less expensive result everything about the process is accelerated, and this begins with drafting the complaint.

What Is the Business Case for 5G?

There is much hype around 5G, but none of it is new. We saw the same propaganda -- fueled by the manufacturers -- in the run-up to the launch of the 3G and 4G versions of the mobile technology. Driverless cars and a range of other IoT applications can indeed potentially open new revenue streams. The reality, however, is that these markets might not eventuate until somewhere between 2025 and 2030.

Greater Caribbean Cooperation Needed to Combat Cyber Crimes

The Caribbean is under virtual siege as incidents of cyber attacks and cyber crimes surge across the region. "The sophisticated use of technology by highly incentivised criminal organisations has created unprecedented opportunities for transnational crime elements that no one region, country or entity can fight on its own. More inter-regional cooperation and collaboration are needed to develop and implement smart and integrated approaches to fight new and emerging cyber threats."