Cloud Computing

Blogs

We’re Drowning in Data - A New Kind of Memory Could Change That

As AI devours ever more information, the world faces a costly data-storage crisis. Researchers are betting etched silica glass could preserve vast archives for centuries while consuming far less energy than today's hard drives and magnetic tapes.

The Illusion of Digital Sovereignty (Part III) - Collision, Geopolitical, Compute Concentration, Future Governance

Geopolitical fragmentation is colliding with the internet's distributed architecture, exposing how sovereign cloud concentration and AI infrastructure can weaken resilience, amplify strategic vulnerabilities, and challenge whether governance can preserve interoperability while managing dependency under stress.

The Illusion of Digital Sovereignty (Part II) - Emergence, Sovereign AI Ecosystem, the RIR System, Number Resources

As states chase digital sovereignty through clouds, AI and localized infrastructure, the internet's globally coordinated foundations reveal a harder truth: operational continuity depends less on control than on interoperable systems built on trust and governance.

The Illusion of Digital Sovereignty (Part I) - Cloud Infrastructure, Survivability, and the Territorialization of the Internet

Missile strikes on Gulf data centres exposed a deeper contradiction at the heart of digital sovereignty: governments seek territorial control over internet infrastructure whose resilience still depends upon globally distributed coordination and interdependence across borders.

Beyond Connectivity: How Submarine Cable Resilience Dictates Digital Sovereignty in the Age of Fragmented Governance

Subsea cables underpin global data flows, yet resilience, control and deep sea access now define digital sovereignty as governance fragments, hyperscalers consolidate ownership, and states prioritize survivability over efficiency in an increasingly contested geopolitical seabed.

Domain Security Report: Unicorns Show Strong Adoption in Key Domain Security Measures

Unicorn firms lead in DNS-based security adoption, signaling technical maturity, while Global 2000 rely on enterprise registrars. Gaps in redundancy and brand protection expose supply chain risks as cyberattacks intensify across industries globally today.

The Kinetic Frontier: Lessons From Geopolitical Violence and the Bunkerization of AI Infrastructure

Kinetic attacks on Gulf data centres expose the cloud's physical fragility, recasting AI infrastructure as strategic targets and accelerating bunkerisation, while outdated data laws leave firms choosing between legal compliance and digital survival.

Africa’s AI Governance Crisis Is Not a Regulatory Gap, It Is a Sovereignty Emergency

Africa's looming AI rules expose a deeper problem: foreign-controlled infrastructure, weak enforcement capacity and externally governed data flows are eroding digital sovereignty, leaving states unable to regulate, protect citizens or meet global obligations.

Regional Internet Registries’ Thick Governance Turns Uniqueness Into Double Extraction

Regional Internet registries, built for coordination, now sit atop scarce IPv4 assets while bearing little liability, suppressing capitalization and imposing "double extraction" that weakens operators, distorts markets and threatens the stability of global internet uniqueness.

Internet Number Resources Are Not Political Property

Internet number resources, once clerical entries, now underpin real economic value, exposing a mismatch between registry power and accountability, while misplaced political narratives obscure the case for decentralised, operator-led control.

The Hyperscale IPv4 Moat: Analyzing AWS’s Latest 9M Address Acquisition

AWS has quietly acquired nine million more IPv4 addresses, turning internet scarcity into strategic leverage. As hyperscalers consolidate dwindling supply worldwide, IPv4 is evolving from legacy protocol into a profitable infrastructure moat for cloud giants.

Iran’s Digital Arsenal: When Invisible Fences Rise in the Conflict

Iran's near-total internet blackout during airstrikes reveals how cyberattacks, sanctions and platform power can isolate a nation. The conflict shows digital infrastructure, satellites and cloud services becoming decisive weapons in modern geopolitical competition worldwide today.

NANOG 96: Gigawatt AI Data Centres and the Risk of a Bubble

At NANOG 96, the AI boom dominated discussions as firms race to build gigawatt-scale data centres packed with advanced GPUs, liquid cooling, and lossless networks, raising fears of overinvestment, neglected security priorities, and a looming infrastructure bubble.

SpaceX Proposes a Million More Satellites on Paper

SpaceX has filed a plan to place more than a million satellites in low Earth orbit, recasting data centres as spaceborne infrastructure while testing regulators, safety, competition and the line between vision and paper ambition.

What Will Shape the Internet in 2026: Power, Politics, and Infrastructure

In 2026, internet infrastructure will be reshaped by geopolitics, grid constraints, and regulatory shifts. Firms that treat data location, power access, and legal compliance as strategic priorities will gain competitive advantage.

News Briefs

AI-Driven Cyber Threats Are Growing, Google Warns

AWS Unveils Route 53 “Accelerated Recovery” to Bolster DNS Resilience

Massive AWS Outage Disrupts Global Internet, Services Restored After DNS Failure

Security Shortfalls Exposed in End-to-End Encrypted Cloud Storage Providers

UK Communications Watchdog Calls for Investigation into Microsoft and Amazon’s Cloud Market Dominance

Gartner Says Worldwide IaaS Public Cloud Services Market Grew 31.3% in 2018

IBM’s $34B Red Hat Aquisition Makes It the World’s Largest Hybrid Cloud Provider

Demand for Cybersecurity Workers in the United States Has Nearly Doubled Since 2013

Data Center Hardware and Software Grew by 17% in 2018

Facebook Enters Wholesale Fiber Business, Plans to Sell Unused Capacity on New Fiber Routes

A Data Dumb Exposes 773 Million Unique Email Addresses, 22 Million Passwords

IBM to Acquire Red Hat, Plan to Provide Open Approach to Cloud

Google Drops Out of Pentagon’s $10B Cloud Competition, Says Deal May Clash With Its AI Values

Google to Deploy Its First Private Trans-Atlantic Subsea Cable

China Has Nearly 3 Times the Number of Internet Users as the US, and the Gap Will Only Widen

Enterprise Networks Are Being Impacted by Unwanted and Unidentified Cryptomining Activity

Researchers Discover Over 1.5 Billion Files Exposed Through Misconfigured Data Services

Hackers Use Tesla’s Amazon Cloud Account to Mine Cryptocurrency

US Congress Considering Legislation to Authorize Faster Access to International Electronic Data

China Cloud Providers Catching Up to American Firms, Plus China Has Home Market Advantage

Most Viewed

Most Commented

Industry Updates

Exploring the State of Network Infrastructure in 2026

Four Steps to Mitigate Subdomain Hijacking

3 Key Recommendations to Trust the Cloud More by Trusting It Less

As Global Internet Demands Skyrocket, Expert Share Advice on How to Optimize IT Infrastructure to Meet Modern-Day Challenges

Smart City Market Boom: New eco Study Forecasts Over 17 Percent Annual Growth

Looking Into the Latest Microsoft Exchange Server Vulnerability Exploitation

New Study by eco Alliance: Best Practices Show Future Potential for Green IT 2030

Not All VPN Users Are Worth Trusting, a Lesson for Cloud Service Providers

i2Coalition and DNA Merger Creates North America’s Largest Internet Infrastructure Advocacy Group

i2Coalition Launches Survey on the Impact of COVID-19 Pandemic on Internet Infrastructure Providers

The Internet Infrastructure Industry Is Protecting Digital Trust and Fighting COVID-19 Related Fraud

Mitigating Phishing Attacks on Cloud/File Storage Services through Domain Reputation API

Moving from the Castle-and-Moat to the Zero-Trust Model

Cloud and IaaS DLP Woes: Is Additional Threat Intelligence a Solution?

Cybercrime Innovation: Tackling Emerging Threats and Vulnerabilities

Participants – Random Selection