/ Featured Blogs

A Winning Biden 5G Strategy: Flatten the Curve

No, not the COVID curve - the curve of U.S. engagement in global industry 5G activities. Let me explain. What is known as 5G actually consists of a broad array of fundamentally revolutionary virtualization platforms that are constantly, collectively developed by industry in several dozen open global bodies. These bodies meet every few weeks, and several score companies around the world process scores to hundreds of input documents to produce many hundreds of effectively mandatory... more

ICANN Should Keep Content Regulation and Other Arbitrary Rules Out of Registry Contracts

The domain name system is not the place to police speech. ICANN is legally bound not to act as the Internet's speech police, but its legal commitments are riddled with exceptions, and aspiring censors have already used those exceptions in harmful ways. This was one factor that made the failed takeover of the .ORG registry such a dangerous situation. But now, ICANN has an opportunity to curb this abuse and recommit to its narrow mission of keeping the DNS running... more

Holiday Shoppers Beware: Tips on Protecting Brand Owners and Consumers from Domain Security Threats

With the COVID-19 pandemic persisting, online shopping will be the preferred method for the 2020 holiday shopping season. While staying home to shop is the safest option right now, it means consumers are more vulnerable to online fraud, counterfeits, and cyber crime. Increased online activity provides opportunities for unscrupulous infringers to abuse trusted brand names to drive visitors to their own fraudulent content. more

Authenticated Resolution and Adaptive Resolution: Security and Navigational Enhancements to the DNS

The Domain Name System (DNS) has become the fundamental building block for navigating from names to resources on the internet. DNS has been employed continuously ever since its introduction in 1983, by essentially every internet-connected application and device that wants to interact online. Emerging from an era where interconnection rather than information security was the primary motivation, DNS has gradually improved its security features. more

Speculating in Domain Names: Pricing War(e)s

Speculation in one form of another has an ancient and honorable history. It not only creates entrepreneurial activity but fuels markets for selling wares and offering services, but also generates competition for consumers and wars over loyalty. The commercialization of the Internet in the 1990s, which extended market activity into virtual (cyber) space, has many of the virtues of the actual but also its vices: cheating and fraud, and other skullduggery. more

What Does an Administration Change Mean for the FCC?

Just as the last change in administration changed the course of the FCC, so will the swing back to a Democratic administration. If you've been reading me for a few years, you know I am a big believer in the regulatory pendulum. Inevitably, when a regulatory agency like the FCC swings too far in any direction, it's inevitable that it will eventually swing back the other way. more

Starlink Will Be Priced to Be Affordable

SpaceX is now serving customers (aka beta testers) in the northern United States. They will soon be doing so in Southern Canada and recently announced that Germany, where they have applied for permission and have begun construction on two ground stations, will probably be next. Early customers in the US are paying $499 for their user terminals and $99 per month for Internet service. more

Disinformation and Our Technology Industries

It was interesting to see that, albeit belatedly, the American media started to stop giving Trump opportunities to spew out his lies across the country and beyond. It obviously had now reached a point where the media realized that if they continued to provide Trump with their avenues, this would make them accomplices in inciting violence. Is this going to be a turning point? more

Network Outages Go Global

On August 30, CenturyLink experienced a major network outage that lasted for over five hours and disrupted CenturyLink customers nationwide as well as many other networks. What was unique about the outage was the scope of the disruptions as the outage affected video streaming services, game platforms, and even webcasts of European soccer. more

An Investigative Analysis of the Silent Librarian IoCs

The Silent Librarian advanced persistent threat (APT) actors have been detected once again, as the academic year started in September. With online classes increasingly becoming the norm, the group's phishing campaigns that aim to steal research data and intellectual property could have a high success rate. Dozens of phishing domain names have been reported, although some may have already been taken down. more