/ Most Viewed

The Internet of the Future – What Happens Behind the Scenes?

Today's Internet is a critical infrastructural element whose continued development influences industries, cultures, and the private space of most individuals. However, the world-encompassing network sometimes needs to be adapted to new requirements to keep pace with current innovations. We have recently seen accelerating development of Internet usage on the user side. Whether it is online shopping's expansion or the greater distribution of mobile devices or streaming services... more

Air Pollution in China Causing Higher Data Center Equipment Failure Rates

China's notoriously high air pollution levels are a well-documented public-health issue. But pollution also has other less talked about effects. One of them is on the efficiency of data centers in the country. more

Network Outages Costing Mobile Operators $15B Annually

Sarah Reedy reporting in LightRading: Mobile operators suffer from an average of five network outages or degradations that impact subscribers each year, costing them around $15 billion annually, according to new Heavy Reading research. Put another way, that's about one outage every other month. More than 80 percent of those outages affect just one or a subset of networks or services. more

Domain Name Registrations Reaching 200 Million World Wide

The global base of domain names grew by more than 3 million in the second quarter of 2010, according to the latest Domain Name Industry Brief, published by VeriSign, Inc. According to the report, the domain name industry ended the second quarter of 2010 with a base of more than 196.3 million domain name registrations across all of the Top-Level Domain Names (TLDs). The combined base of .com and .net domain names surpassed 100 million, finishing the quarter with an adjusted zone size of 101.5 million. New .com and .net registrations totaled 7.9 million during the second quarter, an increase of 13 percent from a year ago. more

Google Bard Fails to Answer Satellite Internet Questions

In an earlier post, I asked whether electronically steered antennas (ESAs) would replace parabolic antennas in satellite ground stations. I did some research and concluded that it is likely that they will. Next, I discussed the same question with ChatGPT and, while it made several false statements, it made a relevant point that I had overlooked. The relevant addition was positive, but the errors were troublesome, so I decided to try ChatGPT's competitor Google Bard. more

ICANN’s Two Decades of Evolution

In the fall of 1998, I was present at the first meeting of the ICANN Board which was then made up of very senior, prominent parties from a broad spectrum of sources. Much to her credit, Esther Dyson accepted the position as the first Chair of the ICANN Board for the newly birthed organization. I was in attendance in support of the nomination of Michael Roberts as the first ICANN CEO. It was a time of uncertainty. more

Community New gTLD Applications: The Wrong Choice

Community new gTLD applications were one of the three options offered by version one of ICANN new gTLD applicant guidebook. It was also possible to submit a "generic" or a "geographic application." I dug the ICANN website and found out that, in the end - and according to me only - it was a bad choice to submit such application...
I went through the 52 delegated applications to investigate which ones have lots of domain name registrations and which ones don't. more

Speaking up for the Internet

For most of this year governments from outside the G8 have not wavered from their essential themes on the Internet: they regard it as a shared resource that works in part as a result of their own investment in infrastructure, they want to be included in its governance through a decision-making process that is transparent, accessible and, in broad character, multilateral, and they want to be able to trust it and know that as much as it is a tool of growth for others, it can also be for them. more

Mobile Malware Growing Exponentially, Limited Capability of Current Security Solutions Big Concern

Security analysis suggest troubling and escalating trends in the development of malware that exploits vulnerabilities on mobile devices. "From turning mobile devices into bots, to infiltration of mobile applications, driven by the use of personal devices in the workplace, cybercriminals are taking full advantage of this market," reports M86 Security Labs in its just released Threat Predictions Report. more

New Report on Performance Measurements of the DNS Root Service in China

Zhiwei Yan writes to report: "CNNIC recently lunched a monitoring to measure the performance of the DNS root service in China (mainland). The results reflect that the service diversity from different ISPs and different geographical locations is obvious for different root servers. Besides, the stability of the DNS root service is directly affected by the BGP routing system. CNNIC will continue this work and anticipate the wide participation from the community." more

Global Law Enforcement Strikes Major Blow Against LockBit Ransomware Operation

In a significant global operation, law enforcement agencies from 10 countries have severely disrupted the LockBit ransomware group, recognized as the most prolific and harmful cyber threat worldwide. more

Prime Real Estate in the Cloud

In the physical world of real estate, value is all about location, location, location. In the virtual world of enterprise business, value is all about performance. The catch is that enterprise performance today is often driven by... location, location, location. When it comes to your digital transformation, and the migration of services to the cloud, the location of your data is paramount. To reach a customer looking to complete an on-line purchase or enable a group of employees trying to collaborate on a shared document, data needs... more

Researchers Detail Faster Methods to Defeat Botnets Like Conficker and Kraken

Michael Cooney reporting in NetworkWorld: "Security researchers this week will detail a prototype system they say can better detect so-called Domain Name Generation- (DGA) based botnets such as Conficker and Kraken without the usual labor- and time-intensive reverse-engineering required to find and defeat such malware. The detection system, called Pleiades, monitors traffic below the local DNS server and analyzes streams of unsuccessful DNS resolutions..." more

The Hill: FCC Response to Sen. Cruz Reveals Hidden ICANN Agenda in Net Neutrality Order

Fred Campbell reporting in The Hill writes: "It's no secret that controversy has plagued the Obama Administration's plan to surrender U.S. oversight of the Internet domain naming and numbering systems from the current U.S.-based ICANN to the 'global multistakeholder community.' But the reason the Federal Communications Commission (FCC) declined to exercise its statutory jurisdiction over Internet numbering inside the United States was indeed secret until Senator Ted Cruz forced the FCC to explain itself." more

Software Has Already Eaten Telecoms (It Just Has Indigestion)

The unconscious and near-universal belief is that packet networks are a telecoms service, and one that constructs an 'additive' resource called 'bandwidth'. This is demonstrably technically false. They deliver distributed computing services, as they calculate how to divide up an underlying telecoms transmission resource. The ubiquitous error is a failure to recognise that the hardware platform has already been devoured by the software industry. more