/ Featured Blogs

Reusing Existing Easements for Building New Fiber Networks

Casey Lide and Thomas B. Magee of Keller & Heckman highlight an issue that anybody building fiber on utility poles should be aware of. A recent article on their website notes that in some cases, an easement obtained for using private land to bring electric service might not automatically allow an easement for bringing fiber.

Starlink Sales Are Straining Capacity in Parts of the U.S. And Canada

On June 5th Elon Musk said SpaceX had nearly 500,000 customers in 32 nations and 9 languages. By now, there must be 500,000 customers, most of whom are in the U. S. and Canada, and their performance is suffering. In the first quarter of this year, OOKLA reported that the median Starlink download speed fell from 104.97 to 99.55 Mbps in the U.S. and from 106.64 to 97.4 Mbps in Canada.

The Hidden Value of IPv4 Addresses

All devices that connect to the internet need unique addresses. The number of IP addresses is limited, creating a demand for addresses worldwide, particularly from the cloud computing industry. This demand has raised the value of IPv4 to levels that the internet's original developers didn't predict, in part because the internet was considered an experiment at the time. Of course, use - and so demand -- has exceeded anyone's realistic expectations.

Calculating the Return on Investment of Online Brand Protection Projects

In the early days of Online Brand Protection (OBP), before it was commonly understood how damaging to revenue infringements could be, this was an extremely popular topic. I remember delivering webinars on the subject then and even running a couple of half-day in-person workshops for brand owners at major conferences.

The Proliferation of Microtrenching

There is an interesting new trend in fiber construction. Some relatively large cities are getting fiber networks using microtrenching. Just in the last week, I've seen announcements of plans to use microtrenching in cities like Mesa, Arizona, and Sarasota Springs, New York. In the past, the technology was used for new fiber networks in Austin, Texas, San Antonia, Texas, and Charlotte, North Carolina.

Where Domain Security Meets the Supply Chain Crunch

Over the last two years, we've all faced supply shortages on items we previously never thought could be in short supply. Most recently, the baby formula and semiconductor markets were hit. Before that, supply chain attacks on Colonial Pipeline and JBS Foods showed us that an attack on one company through a singular point of compromise has the potential to disrupt an entire network of connected companies, products, partners, vendors, and customers.

A New Definition of Broadband?

FCC Chairman Jessica Rosenworcel has circulated a draft Notice of Inquiry inside the FCC to kick off the required annual report to Congress on the state of U.S. broadband. As part of preparing that report, she is recommending that the FCC adopt a new definition of broadband of 100/20 Mbps and establish gigabit broadband as a longer-term goal. I have a lot of different reactions to the idea.

IP Address Blocking

A network can fence its own IP addresses or block specific external ones from access. Administrators frequently block access to their own IP addresses to bar unwanted access to content. Individual IPs or blocks of IPs may also be blocked due to unwanted or malicious behavior. IP address blocking prevents a specific IP address or group of IP addresses from connecting with a server, computer, or application.

The Impact of Open Connectivity

The Internet hints at the much larger possibilities of open connectivity in enabling discoveries such as the web but for the physical world. The ideas themselves go to a deeper level of thinking about how we build systems and how we can enable the future. This post is aimed at people building systems and devices which can be interconnected to create systems and meta-devices.

Dealing With Non-Compliant Infringers – “The Other 50%”

I often read marketing material from Online Brand or Content Protection vendors, especially some of the newer ones, that make IP rights enforcement sound very straightforward. In some scenarios, given the correct processes are followed, this can be the case - using eBay's VERO program or similar offerings from the major legitimate platforms, counterfeit listings can be removed very quickly.