/ Most Commented

EU Privacy Case Could Backfire, Turn EU into Data Island, Say Experts

Experts fear European Union court case attempting to keep personal data private could backfire and prove damaging to Europe. more

“Keep Those Eyebrows Up!” - Cybersecurity at the Global Women’s Forum

News of cyberattacks is slowly becoming a new normal. We are still at a stage where high-profile cases, like the recent attack against the American credit reporting company Equifax, in which 145.5 million users had their personal information compromised, raise eyebrows. But we need those eyebrows to stay up because we should never accept cyber threats as the new normal. more

Software Has Already Eaten Telecoms (It Just Has Indigestion)

The unconscious and near-universal belief is that packet networks are a telecoms service, and one that constructs an 'additive' resource called 'bandwidth'. This is demonstrably technically false. They deliver distributed computing services, as they calculate how to divide up an underlying telecoms transmission resource. The ubiquitous error is a failure to recognise that the hardware platform has already been devoured by the software industry. more

Virgina Governor Announces Facebook Investing $1 Billion for New Data Center in Henrico County

Virgia governor Terry McAuliffe today announced Facebook will spend $750 million to establish a 970,000-square-foot data center in the White Oak Technology Park in Henrico County. more

Cyberattacks Against Abortion Clinics on the Rise

Over the past few years, cyberattacks and internet harassment have escalated against abortion clinics intended to disrupt services, intimidate providers and patients. more

‘Beyond the Scope’ of the UDRP

Not all domain name disputes are appropriate for resolution under the Uniform Domain Name Dispute Resolution Policy (UDRP). While the UDRP is clearly the "go-to" legal tool for trademark owners pursuing cybersquatters, some disputes are about larger -- or different -- issues than the UDRP was designed to address. As stated in WIPO's Overview: Depending on the facts and circumstances of a particular case, and irrespective of whether the parties may also be engaged in court litigation... more

General Data Protection Regulation and the Future of WHOIS

Why does all of the discussion around potential options for WHOIS in the era of the EU's GDPR (General Data Protection Regulation) feel like déjà vu? Is it because issues around WHOIS never really go away, and become a hot topic every few years? Is it because no one is really happy with the current system? Privacy advocates would be delighted to do away with it altogether, while business and Intellectual Property professionals press for improvements to accuracy and availability, which I fully support. more

Domain Marketing for Powerful Branding

46 percent of U.S. small businesses still don't have a website for their company. Without a website, these businesses are missing the most critical piece to their overall success and are causing users to be unable to easily find their products, services and offerings. Domain names are the foundation of a business's digital identity. Relying on nothing more than a Facebook page or an Instagram account makes companies too dependent on a single outlet and reliant on the popularity of a specific platform. more

An Overview of the 27th DNS Operations, Analysis, and Research Center Meetings

The DNS Operations, Analysis, and Research Center (DNS-OARC) meetings are an instance of a meeting that concentrates on the single topic of the DNS, and in this case, it delves as deep as anyone is prepared to go! It's two days where too much DNS is barely enough! The hot topic of the meeting was the news that the proposed roll of the Key-Signing-Key of the root zone of the DNS, originally scheduled for October 11, was to be postponed. more

Russia Appears to Have Begun Providing an Internet Connection to North Korea

Network experts monitoring North Korea have detected activation of a new internet path out of North Korea. Doug Madory, Director of Internet Analysis at Dyn, along with North Korea expert Martyn Williams, report that at 09:07:51 UTC on 1 October 2017, the country's single internet provider, Star JV (AS131269), gained a new connection to the global internet through Russian fixed-line provider Transtelecom (AS20485), often referred to as TTK. more

Why Bitcoin Will Not Solve the Caribbean’s Financial Inclusion Woes

There's a deluge of hype around Bitcoin and blockchain technologies right now, and policymakers and regulators in the Caribbean are doing their best to wrap their heads around the advantages and disadvantages of this virtual currency. Similar questions are being contemplated in the ICTs for development (ICT4D) community, taking into account that electronic money (e-money) platforms such as Safaricom's M-PESA have essentially solved the financial inclusion quandary for millions of people in Kenya. more

Amazon Web Services Targets Startups and Creators With .aws

It will come as no surprise to those who've read my blogs that I get pretty excited about seeing .brand domains launch. At Neustar we're all in on promoting .brand usage in any industry, from all around the world and as such, we're always watching closely for any signs of new domains on the horizon, trawling for case studies or any hint of new activity. So imagine my surprise when a brilliant .brand example jumped out in front of me at JFK airport. more

A Closer Look at Postponing of the Root Zone KSK Rollover Decision

On Sept. 27, Internet Corporation for Assigned Names and Numbers (ICANN) announced that the first root zone Key Signing Key (KSK) rollover - originally scheduled to take place on Oct. 11 - will be postponed. Although this was certainly a difficult decision, we fully agree that erring on the side of caution is the best approach to take. In this blog post, I want to explain some of the involvement Verisign has had in KSK rollover preparations, as well as some of the recently available research opportunities which generated data that we shared with ICANN related to this decision. more

Why Homegrown Subscriber ID Solutions Limit Problem Solving

Most service providers are aware that there needs to be a simple, fast way to identify subscribers. Unfortunately, in reality, mapping IP addresses back to subscribers for identification purposes - such as lawful interception requests or acceptable use policy violations - can be complicated. It usually involves analyzing data sets, completing manual audits, or reliance on multi-step solutions. more

China Blocks WhatsApp, Says Messaging Service Should Stop Spread of “Illegal Information”

WhatsApp is now broadly disrupted in China including text messages which were going through despite China's censorship of the app beginning mid-July which only effected photographs and video chats. more