/ Most Viewed

For the First Time in Recent Internet History a Subsea Cable Across South Atlantic Activated

For the first time in recent Internet history, a new submarine cable carrying live traffic across the South Atlantic was activated, directly connecting South America to Sub-Saharan Africa. more

7th Registration Operations Workshop (ROW), Vancouver, Thursday May 17th 2018

The Registration Operations Workshop (ROW) was conceived as an informal industry conference that would provide a forum for discussion of the technical aspects of registration operations in the domain name system. The 7th ROW will be held in Vancouver, Canada on Thursday, May 17th 2018 in the afternoon, at the end of the GDD Industry Summit, in the same venue. more

ICANN, Ukraine and Leveraging Internet Identifiers

Ukraine's representative to ICANN's Governmental Advisory Committee (GAC) has sent a letter to the Internet Corporation for Assigned Names and Numbers (ICANN) to remove Russian-administered top level domains (.RU, .SU and .рф) from the DNS root zone. In a separate letter, Ukraine's representative also asked RIPE NCC to withdraw the right to use all IPv4 and IPv6 addresses by all Russian members of the regional IP registry for the European region. more

The Director

On Thursday, Stephen J. Lukasik passed away peacefully at the age of 88. He was the legend in a field with no peer. For nearly half a century, he shaped the development of national security and network technology developments at a level and extent that is unlikely ever to be matched. For a great many of us in that arena from the 1960s past the Millennium, he was the demanding visionary leader who set the policies and directions, framed the challenges, approved and funded the projects, and questioned the results. more

Combating Counterfeit and Substandard ICT Devices

Counterfeiting is a negative activity that is affecting almost all areas of economies, incidentally it has become a menace in the Internet world. Apart from selling of fake products online, the production and sale of imitated or counterfeit products create huge market for products that hurt the producers of the genuine goods and also create a menancing health risk to the users. more

Network Security: How Attackers Gain Access from Inside

Most people - mistakenly - believe that they are perfectly safe behind a firewall, network address translation (NAT) device or proxy. The fact is quite the opposite: if you can get out of your network, someone else can get in. Attackers often seek to compromise the weakest link in a network and then use that access to attack the network from the inside, commonly known as a "pivot-and-attack." more

A Proposed New gTLD Timeline Without Batching

Following the release of our new gTLD multiple batch timeline yesterday, today we would like to take the opportunity to demonstrate to ICANN and the community exactly how a single batch timeline could be implemented and how this would benefit all applicants. In recent weeks, ARI Registry Services has publicly expressed concern about the current batching model and digital archery system. Several other key stakeholders within the community have also raised concerns and expressed support for our position. more

.ONEWORLD .SOMEINTERNET: New gTLD Registries and Sanctioned Countries

Imagine that you run an organization out of a building. Imagine that the landlord comes one day and says, "Oh I didn't know you are a resident of country X or dealing with anybody from country X. I have to close this place down right now." And then you are done. You don't have an organization anymore. This very scenario happens on the Internet. more

Hassle Over LEOs

Every second, 4.5 billion people using computers and other electronic devices send 100,000 gigabytes of information to each other. Around 60% of the world's population has an Internet connection. North America and Europe have penetrations of 95% and 87%. But Asia and Africa do not yet get beyond 54% and 40%. On those continents, there are many remote areas where there is no Internet yet. At least no affordable Internet. more

Data Center Operators Are Essential Critical Infrastructure Workers Amid COVID-19 Pandemic

The March 19, 2020, guidance from the U.S. Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA) declared what global citizens appreciate more each day as the COVID-19 pandemic crisis unfolds: "Functioning critical infrastructure is imperative during the response to the COVID-19 emergency for both public health and safety as well as community well-being." more

Who’s Who in the New Dot Brandscape - And Why Should You Care?

Let's go to the scoreboard. There are 1751 applications for new top-level domains. Nearly 1/3 (635) are brands. The rest are generics (e.g. .Buzz) and geographies (e.g .NYC). So, brands are definitely interested in new TLDs - and a handful of major industries have jumped into the lead. If you're in any of those verticals, it's time to pay attention. Your competitors may be giving your customers new ways to reach out, learn and buy from them. more

Second House Amendment Ups the Stakes on IANA Transition

The House of Representatives has passed another measure related to the proposed IANA functions transition, and has again attached it to "must pass" legislation. This move ups the ante and may well be the final straw that compels the Senate Commerce Committee to hold its own oversight hearing on the IANA transition proposal.On May 30th the House adopted the Duffy Amendment to the Appropriations bill funding the Commerce, Justice, and State Departments in FY 2015. The final vote on the amendment was 229 in favor and 178 opposed -- it was fairly partisan outcome, with only ten Democrats voting aye while just one Republican voted nay. more

The IG Marathon, Who Will Win the Internet Governance Race

2015 has already started to make its own land marks in the internet of things world. A major thing that has definitely hit the headlines is cyber security issue, which gives an indication that organizations will probably have to make generous budgetary allocations to answer to these anticipated breaches. Internet governance is perhaps going to remain in the headlines for the rest of 2015. more

Celebrating 35 Years of the DNS Protocol

In 1987, CompuServe introduced GIF images, Steve Wozniak left Apple and IBM introduced the PS/2 personal computer with improved graphics and a 3.5-inch diskette drive. Behind the scenes, one more critical piece of internet infrastructure was quietly taking form to help establish the internet we know today. November of 1987 saw the establishment of the Domain Name System protocol suite as internet standards. more

EU launches Future Internet Public Private Partnership

Wout de Natris writes to report: "EU Commissioner for the Information Society Neelie Kroes today launched the EU co-funded project for the Internet of the future in which everything will be connected to everyone in the cloud. Here's the link to Mrs. Kroes' speech." more