/ Most Viewed

Update on Assigning 32-bit ASNs

As mentioned in Assigning 32-bit ASNs published one year ago, 16-bit Autonomous System Numbers (ASNs) are becoming a scarce resource just like 32-bit IP addresses. In 2007, the Internet Engineering Task Force (IETF) addressed this scarcity by developing a new format: 32-bit AS Numbers (RFC 4893), which increased the supply of ASNs to four billion. more

Using LEOs and GEOs

Once you head away from the areas serviced by modern terrestrial cable infrastructure, the available digital communications options are somewhat limited. Some remote areas are served using High-Frequency radio systems, using radio signals that bounce off the ionosphere to provide a long-distance but limited bandwidth service. Or there are satellite-based services based on spacecraft positioned in geostationary orbital slots. more

Submarine Cable Resiliency in the Face of Disruptions

I have on my desk a rather small tube. It's a little under 2cm in diameter, 6 cm long, and looks like it's made from a dull white polycarbonate material. At the end, I can see a copper inner tube, and inside that, another polycarbonate layer, and then a smaller steel tube that holds a thin steel thread and some fibre optic cables. There are no layers of steel jacketing, nor any other additional wrapping at all. more

Global Standards Collaboration: Is It Possible?

On 24-27 April, a 33-year-old international organisation of ICT organisations will convene a meeting at London under ETSI auspices after a four-year hiatus. Known today as the GSC or Global Standards Collaboration organisation, it began its existence in the Spring of 1990 at Fredericksburg, Virginia, as an umbrella mechanism for all of the world's ICT standards bodies to collaborate on "high interest subjects." more

Defending the Network Several Times Over

Modern networks can be attacked in a variety of ways, meaning that companies need different types of protection. This article explains some of the risks involved, and provides some easy ways to deal with them. more

Cyber Scorecarding Services

Ample evidence exists to underline that shortcomings in a third-parties cybersecurity posture can have an extremely negative effect on the security integrity of the businesses they connect or partner with. Consequently, there's been a continuous and frustrated desire for a couple of decades for some kind of independent verification or scorecard mechanism that can help primary organizations validate and quantify the overall security posture of the businesses they must electronically engage with. more

China’s Top Diplomat Calls for Global Cyberspace Fairness, Urges Resistance to Technological Dominance

In a call for "fairness and justice" in cyberspace, China's top diplomat, Wang Yi, has encouraged emerging economies to collectively resist any attempts at dominance in science, technology, or the internet. more

Software Glitch Causes ICANN to Extend New gTLD Application Deadline

Due to unusual behaviour with the operation of its TLD Application System (TAS), ICANN announced today that it has shut down the system until Tuesday. ICANN has also extended the submission deadline: "In order to ensure all applicants have sufficient time to complete their applications during the disruption, the application window will remain open until 23:59 UTC on Friday, 20 April 2012." more

Domain Name Security Gains Prominence in German-Speaking World

The 2010 Domain Pulse, hosted by SWITCH (the .CH registry) was held in the snowy Swiss city of Luzern. Domain Name Security (DNS) was of particular importance in this year's meeting with DNSSEC being implemented in the root zone in 2010 by ICANN, and by many registries in the next few years. ICANN plan to have all root servers signed with DNSSEC by mid-2010 Kim Davies, Manager, Root Zone Services at ICANN told the meeting, starting with the L root server, then A root server with the last being the J root server as all are gradually signed. more

AI Boom Spurs Record Investment in Undersea Cables Amid Geopolitical and Security Concerns

As AI accelerates global data demand, tech giants are investing heavily in subsea cables. These critical networks face rising geopolitical scrutiny and security risks, reshaping the future of digital infrastructure and global connectivity. more

Google Instant - Great for Top Internet Brands

In late September Google introduced Google Instant, an auto-complete algorithm that assists users in searching with greater speed. Google's new service predicts search queries in real time, can catch a mistake if the user mistyped and guides users to previously performed searches. This new service greatly benefits top brands on the Internet and those that have purchased key words and ad words; while it might not be as beneficial for companies with low website traffic or those that are not well known. more

Using AM Radio Towers in Designing Wireless Networks

One existing resource that is often overlooked in designing wireless networks is AM radio towers. For the most part, companies deploying fixed wireless and microwave antenna have avoided these towers. This is due to the nature of AM radio, which transmits at such a low frequency that the entire tower is effectively used as the transmitting antenna. The entire tower is energized with the AM signal, and the typical AM tower sits on a base insulator that blocks the tower from being grounded.  more

The ICANN Accountability and Transparency Review Team Recommendations: To Implementation, And Beyond

Buzz Lightyear, the astronaut character from the movie Toy Story, is known for his tagline, "To infinity, and beyond!" ICANN can take a lesson from the ebullient Buzz with respect to accountability and transparency. Just as Buzz believed he could fly beyond infinity, ICANN should view full implementation of the Accountability and Transparency Review Team (ATRT) recommendations not as the last stop, but as the next stop on its important journey of accountability and transparency. more

Explaining the Legal Enforceability of the PIC Proposed by Ethos for .ORG

Ethos Capital has recently announced that it has voluntarily proposed to add an amendment to Public Interest Registry's (PIR) .ORG Registry Agreement with ICANN in the form of a Public Interest Commitment, also known as a "PIC." In the press release Ethos indicated that the PIC would become "legally binding" and "enforceable" both by ICANN and by members of the community. I anticipate that some would ask a number of logical questions: How would that work in practice? more

‘Beyond the Scope’ of the UDRP

Not all domain name disputes are appropriate for resolution under the Uniform Domain Name Dispute Resolution Policy (UDRP). While the UDRP is clearly the "go-to" legal tool for trademark owners pursuing cybersquatters, some disputes are about larger -- or different -- issues than the UDRP was designed to address. As stated in WIPO's Overview: Depending on the facts and circumstances of a particular case, and irrespective of whether the parties may also be engaged in court litigation... more