/ Featured Blogs

From Loon to Taara: Google’s Moonshot Delivering Wireless Backhaul

You may recall a number of years ago when Google experimented with delivering broadband from balloons in an effort labeled Project Loon. The project was eventually dropped, but a remnant of the project has now resurfaced as Taara - broadband delivered terrestrially by lasers. more

A Digital Protocol From Kyoto and a Cyber Message From Hamburg: IGF and ICANN Are Well Prepared for the Future

On October 12, 2023, the 18th Internet Governance Forum (IGF) ended in Kyoto. It was, with more than 9000 registered participants, the largest IGF since its inception in 2006. UN Secretary-General Antonio Guterres and Japan Prime Minister Fumio Kishida opened the five-day meeting. The tangible output included 89 "IGF Messages from Kyoto," four substantial reports with recommendations from IGF Policy Networks (PN) for Artificial Intelligence... more

Challenges in Measuring DNS Abuse

From the creation of DNSAI Compass ("Compass"), we knew that measuring DNS Abuse1 would be difficult and that it would be beneficial to anticipate the challenges we would encounter. With more than a year of published reports, we are sharing insights into one of the obstacles we have faced. One of our core principles is transparency and we've worked hard to provide this with our methodology. more

Space-Ground Optical (Laser) Communication

SpaceX is equipping its new satellites with inter-satellite laser links (ISLLs). They now have over 8,000 optical terminals in orbit (3 per satellite) and they communicate at up to 100 Gbps. The other low-Earth orbit Internet service providers will follow SpaceX's lead. more

The IoT Cyber Seal Fog

For four days in Southern France, cybersecurity experts from a broad array of different countries and sectors gathered for the annual ETSI Security Conference. The event undertaken by one of the world's major industry information-communication (ICT) standards organisations was intended to take stock of the state of cybersecurity and trends. more

Mitigating DNS Abuse and Safeguarding the Internet

The internet is a beacon of global connectivity and information, but it has also become a battleground where malicious actors exploit vulnerabilities for various immoral purposes. Domain Name System (DNS) abuse stands has proven a constant in the internet threat landscape, posing risk to the overall digital trust. more

.COM - a Return to Balance at Mid-2023

Here are the mid-year trends of the the .COM Top Level Domain. Our analysis is based on data transmitted by Verisign, the company tasked with the management of .COM, to ICANN, as of 30/06/23. To conduct our study, we will be using two performance indicators taken from the reports sent by Verisign to ICANN and published in its 'Registry transactions Reports'1: stocks at 30/06 and 31/12 of each year and monthly creations consolidated over a 12-month period. more

The Future of the Internet From the Perspective of a NextGen@ICANN 78

This year, the 25th anniversary of the creation of ICANN was celebrated. The date carries a commemorative meaning, highlighting the trajectory of this institution that has been fundamental in the coordination and administration of Internet resources. However, this milestone also highlights the growing challenges facing Internet Governance in the current global landscape. more

The New Privacy Law in California

The State of California often leads the country in addressing regulatory issues. This makes sense since the State has a population of nearly 40 million and an economy that would be the fifth largest in the world if California were a separate country. A new law was enacted on the last day of the California Legislature that was signed by Governor Gavin Newson this month. more

Notes from NANOG 89: Trust and Network Infrastructure

Trust is such a difficult concept in any context, and certainly, computer networks are no exception. How can you be assured that your network infrastructure is running on authentic platforms, both hardware and software and its operation has not been compromised in any way? more