/ Most Viewed

U.S. Navy Investigating Possibility of Cyberattack Behind Two Navy Destroyer Collisions

Deputy chief of naval operations for information warfare, Vice Adm. Jan Tigh, says the military is investigating the possibility of compromised computer systems behind two U.S. Navy destroyer collisions with merchant vessels that occurred in recent months. more

The IANA Stewardship Transition: All Eyes Turn Toward ICANN 55 in Marrakech

When in March 14, 2014, the NTIA announced its intention to step away from its historical oversight role over the IANA functions, something extraordinary happened. A global dialogue immediately ensued. The first part of this dialogue is expected to come to an end in the forthcoming ICANN annual meeting in Marrakech next week. After two years of vigorous discussions, the Internet community says it is now ready to move to the next part of the process - implementation. more

Looking Back at the Broadband Industry in 2020

I periodically take a look at broadband trends into the future. But as I was thinking about how unique 2020 was for everybody, I realized that there were some events during the year that we're going to look back on a decade from now as important to the broadband industry. Interestingly, most of these events were not on anybody's radar at the beginning of the year. more

3 Strategies for Keeping ICANN and IANA On-Mission and Out of Politics

Over the last year, the ICANN community has been raging on about two issues: the looming IANA transition away from the US government, and how to ensure the organization is accountable to all the Internet's stakeholders. While the issues have run on separate tracks, they both boil down to one question: can ICANN be trusted to be a good steward of the Internet's future? The answer to this question will go a long way in deciding ICANN's future. more

Critical Differences Of Public And Private Clouds

Private or public? Both cloud types offer benefits and both have enjoyed significant growth over the last few years. Yet, what's the best bet for your business: The virtually limitless resources of public cloud stacks, or the close-to-home control of private alternatives? Here's a look at some critical differences between public and private clouds... more

Fraudsters Using Bogus and Legitimate Recruitment Sites to Con Job-Hunters Into Laundering Money

Reported today on BBC: "Police chiefs are urging people looking for work during the recession to be alert to online scams that trick them into laundering money. The Serious Organised Crime Agency (Soca) says websites are currently being used to recruit 'money mules'. The 'mules are ordinary people who send and receive payments through their bank accounts to facilitate business." Neil Schwartzman has also informed us of a related report by RSA FraudAction Research Lab based on several months of tracking various reshipping scams engineered by online fraudsters. more

How to Tame Network Complexity

In a previous article, I discussed how telecoms is facing a growing complexity crisis. To resolve this crisis, a new approach is required. Here I explore how that complexity can be tamed... 'Invariants' are things that are meant to be 'true' and stay true over time. Some invariants are imposed upon us by the universe... Others are imposed by people. As engineers, we aim to establish these abstract 'truths' about the system. more

Broadband Consumption Continues Explosive Growth

OpenVault Just released its Broadband Industry Report for 4Q 2019 that tracks the way that the US consumes data. The results of the reports are as eye-opening as OpenVault reports for the last few years. OpenVault has been collecting broadband usage for more than ten years. As usual, the OpenVault statistics are a wake-up cry for the industry. more

U.S. Homeland Security Launches Website Crackdowns, A Dozen Sites Already Seized

TorrentFreak reports: "Following on the heels of this week's domain seizure of a large hiphop file-sharing links forum, it's clear today that the U.S. Government has been very busy. Without any need for COICA, ICE has just seized the domain of a BitTorrent meta-search engine along with those belonging to other music linking sites and several others which appear to be connected to physical counterfeit goods. more

DOTZON Study: Digital Company Brands 2024

DOTZON presents the seventh edition of the Digital Company Brands study. After having introduced the study in 2018, DOTZON continued to expand and enhance the underlying data to display how companies successfully use their Digital Company Brands. The Digital Company Brand is the digital dimension of a company brand and mirrors the "digitalness " of a company. For "Digital Company Brands 2024", all companies worldwide that have their own internet extension were once again analysed.  more

Paris Cyber Agreement Has Grown to More Than 450 Signatories

The "Paris Call for Trust and Security in Cyberspace," announced by French President at the Paris Peace Forum on November 13, has attracted more than 450 signatories. more

Thankful for a Domain That Gives Back

Thanksgiving is just around the corner in Canada. It's a time of year when the harvest is in, the weather grows colder and families gather to give thanks for all they have. It is in this moment of gratitude that I want to highlight one of the most valuable and unique offerings in our industry: the ways in which country code top-level domains (ccTLDs) give back. Canadians who choose to use a ccTLD, which for us is .CA, help contribute to investments in the internet community. more

8 Things to Look for in a Registrar Automation Platform

In today's world, domain name registrars play a very important role in the functioning of the domain name ecosystem. This is in stark contrast from the Registry-dominated industry most of us have been used to seeing over the past decade. After the introduction of New gTLDs, Registrars have been elevated to a strategic and important pedestal because they're the first contact point to end customers of domain names. more

Cybersecurity Continues to Be the US Securities and Exchange Commission’s Top Priority for 2019

For the fourth year, the U.S. Securities and Exchange Commission's Office continues to include cybersecurity as one of the top enforcement priorities for 2019. more

Why the Republican Policy Brief on Copyright Should Have Been Withdrawn

On November 16, the Republican Study Committee, a caucus of conservative Republican members of the U.S. House of Representatives, inadvertently released a policy brief entitled "Three Myths About Copyright Law" which was quickly withdrawn. Of course, as a work of the U.S. government, this document does not itself enjoy copyright protection, so it is widely available on the internet through groups like The Internet Archive project. more