/ Featured Blogs

Leaked Documents Reveal Xi Jinping’s Communist Chinese Plan to Control the Internet’s Root

Yesterday, The Epoch Times reported on leaked internal Chinese government documents revealing that premier Xi Jinping has "personally directed the communist regime to focus its efforts to control the global Internet, displacing the influential role of the United States." Xi's ultimate aim is for the Chinese Communist Party (CCP) to wield "discourse power" over communications and discussions on the global geopolitical stage by controlling content on the Internet. more

Think Beyond .com: From Country Codes to Internationalized Domain Names

One of the major takeaways from the Web Globalization Report Card is the importance of providing "front doors" to your localized websites. These doors begin with the addresses themselves, which may not include the .com domain. In fact, I'd recommend that most localized websites not use the .com domain, as this is an overloaded domain. This article looks at the many ways brands are creating more localized addresses, beginning with country code top-level domains (ccTLDs). more

Avoiding Low-Earth Orbit Collisions – the Clock Is Ticking

There was a recent dispute between OneWeb and SpaceX regarding the possibility of a collision between two of their low-Earth orbit (LEO) satellites. OneWeb's satellite (OneWeb-1078) was launched on March 25 and headed for its orbit at an altitude of 1,200 km when, in early April, it passed near a SpaceX satellite (Starlink-1546) in orbit at about 450 km. There was no collision, but subsequently, OneWeb's government affairs chief Chris McLaughlin said... more

Trusted Notifiers and the Future of DNS Abuse

Efforts have been ongoing in the ICANN community to develop a better understanding of its role in the combat of abuse. This theme has been rising in prominence every year since 2018, and 2021 appears to be the tipping point, in which consensus has built around the idea that more can be accomplished in terms of reducing the impact of rogue actors using the Internet for malicious purposes. more

Facebook’s “Supreme Court” Has Implications for International Law

Last year, Facebook created its widely dubbed "Supreme Court" (officially the Oversight Board) in an effort to outsource some of the platform's most difficult content decisions. By all accounts, Facebook hoped the Board would have global legitimacy to make the toughest content decisions and help avoid reputational damage for being biased, arbitrary, tone-deaf, or worse. more

Investing in Rural Broadband

There was a headline in a recent FierceTelecom article that I thought I'd never see - Jeffries analyst says the rural broadband market is ripe for investment. In the article, analyst George Notter is quoted talking about how hot rural broadband is as an investment. He cites the large companies that have been making noise about investing in rural broadband. Of course, that investment relies on getting significant rural grants. more

Is NIST’s Recent Letter on o.com a Bureaucratic Coup d’Etat?

Verisign recently informed ICANN that it had received a letter from the National Institute for Standards and Technology (NIST), an agency of the U.S. Department of Commerce, regarding the proposed auction of o.com described in the Second Amendment to the .com Registry Agreement agreed to by ICANN and Verisign in March 2019. This letter, which doesn't appear to be on official letterhead, is from a NIST Grants Officer and purports to overturn a letter raising objections to the auction... more

Connectivity Starts at Home

Today's Internet is just one application of the powerful idea of best-efforts connectivity. The home router (NAT) decouples the connectivity within the home from the larger internet, enabling innovation that leverages the Internet without being limited by it. Connectivity starts at home. Your computers and devices all interconnect locally. In a sense, the larger Internet is just one more connected device. You are free to innovate and experiment without asking a provider's permission. more

Making the Platform Relationship Win-Win

CSC recently participated in an open discussion at the World Trademark Review's APAC WTR Connect, where we moderated a discussion with brand owners, Western Digital and PVH, and platform owner, Alibaba, on the topic: "Making the Platform Relationship Win-Win." How do brands define what a platform is? For the brand owners, a platform could be any distribution service of their products -- be it a traditional eCommerce marketplace like Alibaba or Amazon.com -- or other digital service enablers... more

New Research Indicates Nearly 80% of Top US Energy Companies Are at Serious Risk for Cyberattacks

In light of the Biden administration's recent efforts in protecting critical infrastructure from cyber threats, new research from CSC indicates that a majority of the top energy companies in the U.S. are vulnerable to attack due to shortcomings in their online operations. Specifically, these organizations are vulnerable to domain name and domain name system (DNS) hijacking and phishing attacks based on their lack of effective domain security. more