/ Most Viewed

In AI, We Trust!?

When it comes to Artificial Intelligence (AI), there is a widespread fear that AI machines will "take over" and dominate humanity. Today, we should be concerned when governments and digital corporations use AI to replace trust as the fundamental value and principle in the digital domain. more

.COM About to Hit 100-Million Mark

Although not quite there yet, statistical figures indicate total registration for the .com top-level domain will soon be reaching 100 million by the end of this year. The worlds most popular TLD currently has 98 million registered domains and accounts for 45% of all TLDs. more

Stop Propagating False Information About the .ORG Transaction

We were disappointed to see The Pittsburgh Post-Gazette publish a recent editorial on February 13 about the sale of Public Interest Registry (PIR, the company that operates .ORG) that propagates false information about the transaction, including runaway prices, censorship and lack of experience. Runaway prices? Ethos Capital and PIR have committed to capping price increases to no more than ten percent per year on average. more

Using AI to Develop the Informal Sector in Africa

Artificial intelligence is transforming Africa's informal economy by improving access to finance, optimizing business operations, and helping small-scale entrepreneurs transition into the formal sector, despite challenges such as digital illiteracy and infrastructure gaps. more

China Issues New Rule Requiring Licence for People Live-Streaming News, Entertainment Content

China's most powerful internet regulator has formally set controls over the country's thriving online broadcasting sector, requiring people live-streaming news and entertainment content to have a licence, among other rules," Zhuang Pinghui reporting today in South China Moring Post. more

Pen Testing the US Cyber Strategy

If it's not an era of intense faith in the multilateral system, somewhere among the Trump Administration's anonymous adults in the room there is a believer, and the Internet might be the better for it. Evidence for the existence of this fifth columnist lies in the US National Cyber Strategy, launched last month under the commander-in-chief's unprepossessing signature, which looks to provide security for America's connected economy. more

Market Flatlines After ICANN Introduces New gTLDs

The choices for consumers and business in Europe to get themselves online have never been so great. Social media, apps and blogsites all have made a lasting impression, and we are now in an increasingly crowded market with the addition of hundreds of new gTLDs. So how has all this affected growth and market shares among domain names in Europe? more

Professional Services Are a Safe Bet to Address Staff Shortages

Many organizations today are tightening their belts. They have smaller budgets and fewer resources even though they face an ever-growing list of projects, tasks and corporate IT initiatives to complete. IT departments are hard pressed to streamline operations but don't necessarily have the manpower -- be it resources or specific skillsets -- to add capabilities that will achieve such efficiency. There are only a few possible solutions organizations can consider to address this common problem... more

VeriSign Announces Increase in .com and .net Domain Name Fees

VeriSign today announced that effective July 1, 2010 there will be an increase in registry domain name fees for .com and .net, per its agreements with ICANN. According the press release, the registry fee for .com domain names will increase from $6.86 to $7.34 and the registry fee for .net domain names will increase, from $4.23 to $4.65. more

Google to Distrust Symantec-Issued Certificates Amid Misuse

In a post on a developers’ forum, software engineer on the Google Chrome team Ryan Sleevi has announced Google’s plan to start gradually distrust all existing Symantec-issued certificates. more

Facing the Future of ICANN’s Volunteer Recruitment

The musings of one volunteer summarize the problem: "As a newcomer to ICANN, I was always frustrated by the fact that I could never get a straight answer to the question 'How much time does it take?' There was always an awkward silence, a vaguely worded response. Now, years later, I know that no one in their right mind would sign up knowingly for the long hours and late shifts required to be a full participant in this game. It is a groundbreaking project that really matters. But you will get a lot more recognition and immediate satisfaction for volunteering far fewer hours at your local food bank." more

The 3 Keys to Unlock Your Operational Performance

Like any business, service providers must constantly evaluate the success of their operations. For implementations and installments, this is usually done by setting a strategic objective and then measuring progress made towards completion. But for operational teams, success is often measured by the repeated achievement of daily goals aligned to corporate objectives. Setting these benchmarks and collecting this data is accomplished by frequently running key performance indicators (KPIs). more

Google Data on State of Web Security

As part of its Transparency Report, Google recently released large amount of data related to unsafe websites. Google groups unsafe websites into two main categories: Malware and Phishing sites. more

Internet Society: ITU-T Failure to Adhere to Its Own Agreements With Respect to MPLS

Today, the ITU-T Study Group 15 determined a Recommendation that defines Y.1731 based operations, administration and management (OAM) for MPLS transport networks. This decision sets the stage for a divergence in MPLS development; it creates a situation where some vendors will use the IETF standard for MPLS OAM while other vendors implement the ITU-T Recommendation for OAM. This situation ensures that the two product groups will not work together. more

Am I Safer Within an Organization or by Myself?

An Internet Bill of Rights may or may not be a good idea. The point here is that, besides highly commendable topics such as net neutrality and privacy, some of them seem to mandate cybersecurity. Approved in Brazil last May, the Marco Civil includes the principle of preservation of stability, security and functionality of the network, via technical measures consistent with international standards.  more