Cloud Computing

Blogs

Regional Internet Registries’ Thick Governance Turns Uniqueness Into Double Extraction

Regional Internet registries, built for coordination, now sit atop scarce IPv4 assets while bearing little liability, suppressing capitalization and imposing "double extraction" that weakens operators, distorts markets and threatens the stability of global internet uniqueness.

Internet Number Resources Are Not Political Property

Internet number resources, once clerical entries, now underpin real economic value, exposing a mismatch between registry power and accountability, while misplaced political narratives obscure the case for decentralised, operator-led control.

The Hyperscale IPv4 Moat: Analyzing AWS’s Latest 9M Address Acquisition

AWS has quietly acquired nine million more IPv4 addresses, turning internet scarcity into strategic leverage. As hyperscalers consolidate dwindling supply worldwide, IPv4 is evolving from legacy protocol into a profitable infrastructure moat for cloud giants.

Iran’s Digital Arsenal: When Invisible Fences Rise in the Conflict

Iran's near-total internet blackout during airstrikes reveals how cyberattacks, sanctions and platform power can isolate a nation. The conflict shows digital infrastructure, satellites and cloud services becoming decisive weapons in modern geopolitical competition worldwide today.

NANOG 96: Gigawatt AI Data Centres and the Risk of a Bubble

At NANOG 96, the AI boom dominated discussions as firms race to build gigawatt-scale data centres packed with advanced GPUs, liquid cooling, and lossless networks, raising fears of overinvestment, neglected security priorities, and a looming infrastructure bubble.

SpaceX Proposes a Million More Satellites on Paper

SpaceX has filed a plan to place more than a million satellites in low Earth orbit, recasting data centres as spaceborne infrastructure while testing regulators, safety, competition and the line between vision and paper ambition.

What Will Shape the Internet in 2026: Power, Politics, and Infrastructure

In 2026, internet infrastructure will be reshaped by geopolitics, grid constraints, and regulatory shifts. Firms that treat data location, power access, and legal compliance as strategic priorities will gain competitive advantage.

The hiQ Decision Legalized Infrastructure Theft - We Need a Federal Fix

The hiQ ruling erased legal protections against commercial scraping, leaving infrastructure providers to absorb escalating costs. Without federal action defining data misappropriation, a free-rider AI economy could undermine open networks, investment, and long-term data integrity.

The Hidden Risks of AI Notetakers: Precaution or Paranoia?

As AI notetakers become common in virtual meetings, concerns grow over data privacy, potential misuse, and the risks of unknowingly sharing sensitive corporate information with unseen third parties beyond organizational control.

Leased, Not Owned: Why the Future of the Internet Is Likely Subscription-Based

From software to network architecture, the internet is shifting from ownership to on-demand access. Subscription models now underpin the digital economy, offering scalability and agility while raising fresh questions about control, cost and compliance.

Big Tech AI Companies Should Invest in Energy and AI Infrastructure in Africa

Big Tech firms should back Africa's AI future by investing in its vast energy resources and infrastructure needs. Doing so offers a strategic answer to growing data demands and an opportunity for shared prosperity.

Rethinking Europe’s Cloud Future: Balancing Regulation and Innovation

European efforts to build independent cloud infrastructure face challenges from regulatory overreach and dependence on U.S. cloud providers. Some say that a balanced approach focused on collaboration and flexible standards will be needed to strengthen data sovereignty and foster regional growth. Eighty percent of corporate executives in Germany say that Europe's future prosperity will depend on secure and independent digital infrastructure.

Cloud-Edge Collaboration: The Inevitable Future of AI Computing

Over the past decade, cloud computing has experienced explosive growth, evolving from its nascent stage to widespread adoption and fundamentally changing how businesses and individuals use information technology. At the same time, traditional on-premise computing, while still having its use cases, has been progressively integrated with, and often even controlled by, Cloud Service Providers (CSPs) in many aspects.

An Internet Infrastructure Perspective on AI Service Provision

This study analyzes the differences in domain name and IP address strategies among a number of current mainstream artificial intelligence (AI) service providers. We find that these technical choices not only reflect deployment decisions but also deep-seated corporate knowledge and capabilities in Internet infrastructure service provision, as well as brand positioning and market strategies.

Why Small and Medium-Size Operators Should Care About Sustainability

A new resource dedicated to small and medium-sized digital infrastructure providers highlights the benefits of incorporating sustainability into their operations, offers a consolidated list of best practices and recommendations, and shares additional resources to help make practical changes to save time, energy, and money.

News Briefs

AWS Unveils Route 53 “Accelerated Recovery” to Bolster DNS Resilience

Massive AWS Outage Disrupts Global Internet, Services Restored After DNS Failure

Security Shortfalls Exposed in End-to-End Encrypted Cloud Storage Providers

UK Communications Watchdog Calls for Investigation into Microsoft and Amazon’s Cloud Market Dominance

Gartner Says Worldwide IaaS Public Cloud Services Market Grew 31.3% in 2018

IBM’s $34B Red Hat Aquisition Makes It the World’s Largest Hybrid Cloud Provider

Demand for Cybersecurity Workers in the United States Has Nearly Doubled Since 2013

Data Center Hardware and Software Grew by 17% in 2018

Facebook Enters Wholesale Fiber Business, Plans to Sell Unused Capacity on New Fiber Routes

A Data Dumb Exposes 773 Million Unique Email Addresses, 22 Million Passwords

IBM to Acquire Red Hat, Plan to Provide Open Approach to Cloud

Google Drops Out of Pentagon’s $10B Cloud Competition, Says Deal May Clash With Its AI Values

Google to Deploy Its First Private Trans-Atlantic Subsea Cable

China Has Nearly 3 Times the Number of Internet Users as the US, and the Gap Will Only Widen

Enterprise Networks Are Being Impacted by Unwanted and Unidentified Cryptomining Activity

Researchers Discover Over 1.5 Billion Files Exposed Through Misconfigured Data Services

Hackers Use Tesla’s Amazon Cloud Account to Mine Cryptocurrency

US Congress Considering Legislation to Authorize Faster Access to International Electronic Data

China Cloud Providers Catching Up to American Firms, Plus China Has Home Market Advantage

US Department of Defense Getting Aggressive on Adoption of Cloud, Machine Learning

Most Viewed

Most Commented

Industry Updates

Exploring the State of Network Infrastructure in 2026

Four Steps to Mitigate Subdomain Hijacking

3 Key Recommendations to Trust the Cloud More by Trusting It Less

As Global Internet Demands Skyrocket, Expert Share Advice on How to Optimize IT Infrastructure to Meet Modern-Day Challenges

Smart City Market Boom: New eco Study Forecasts Over 17 Percent Annual Growth

Looking Into the Latest Microsoft Exchange Server Vulnerability Exploitation

New Study by eco Alliance: Best Practices Show Future Potential for Green IT 2030

Not All VPN Users Are Worth Trusting, a Lesson for Cloud Service Providers

i2Coalition and DNA Merger Creates North America’s Largest Internet Infrastructure Advocacy Group

i2Coalition Launches Survey on the Impact of COVID-19 Pandemic on Internet Infrastructure Providers

The Internet Infrastructure Industry Is Protecting Digital Trust and Fighting COVID-19 Related Fraud

Mitigating Phishing Attacks on Cloud/File Storage Services through Domain Reputation API

Moving from the Castle-and-Moat to the Zero-Trust Model

Cloud and IaaS DLP Woes: Is Additional Threat Intelligence a Solution?

Cybercrime Innovation: Tackling Emerging Threats and Vulnerabilities

Participants – Random Selection