/ Recently Commented

The Role of FttH in the Development of 5G

As the roll out of FttH remains a slow process, it is no wonder that more and more people are looking towards mobile as a potential alternative. Obviously, mobile communication has improved over recent years in providing excellent access to broadband; and it has also become more affordable. At the same time, there is the fabulous hype about 5G, and the PR and media machines of the vendors involved make you believe that this will become a real competitor to the slow moving FttH developments. more

How Should I Present .Brand Domains in Advertising? (Part 2)

Part 2: How do I choose the right option for my brand? In my previous article, I discussed the question of how to represent .brand domains in advertising. As you can imagine, it's a balancing act -- stimulating awareness of the domain, creating the desired customer behavior of the future using .brands, whilst ensuring that we are considerate to the fact that .brands are yet to hit mainstream awareness. Sounds simple right? more

Call for Participation - DNSSEC Workshop at ICANN 59 in Johannesburg

Do you have ideas about DNSSEC or DANE that you would like to share with the wider community? Have you created a new tool or service? Have you found a way to use DNSSEC to secure some other service? Do you have new statistics about the growth or usage of DNSSEC, DANE or other related technology? If so, and if you will be in Johannesburg, South Africa, for ICANN 59 in June 2017 (or can get there), please consider submitting a proposal to speak at the ICANN 59 DNSSEC Workshop! more

Why Don’t We Have Peak and Off-Peak Pricing for Broadband?

I saw a poster on the London Underground yesterday, and as is often the case it got me thinking about the parallels with telecoms. The poster explains the peak and off-peak fare structure for tube travel. The purpose of this pricing system is to manage the relationship between supply and demand in a system that is capacity constrained. Over short and medium timescales the supply is essentially fixed, and demand can oversaturate that supply. more

Several New TLDs in Limbo as ICANN Conducts Investigation

A number of new gTLD applicants, including .gay and .music are criticizing ICANN for conducting an investigation into its own controversial practices. more

French Presidential Candidate Confirms Massive Hack, Emails Dumped Online Two Days Before Election

Leading French presidential candidate Emmanuel Macron's campaign confirmed on Friday a "massive" computer hack that dumped its campaign emails online less than two days before the election. more

First Two-Day School on Internet Governance in Afghanistan

On Wednesday April 26, 2017, Afghanistan had its first two-day long school on Internet Governance. The event was organized by a home grown civil society by the name of National IT Professionals Association of Afghanistan (NITPAA). Afghanistan School on Internet Governance (AfSIG) is a new initiative by a group of volunteers at NITPAA, who worked tirelessly for months to put up an event that comprised of speakers from multiple organizations and multiple stakeholders across the country. more

Seattle Restores ISP Privacy Rules. Could be First of Many Cities to Defeat FCC’s Privacy Roll Back

The city of Seattle this week will move forward with its own plan to restore broadband user privacy rules despite the recent law passed by U.S. Congress, signed by President Trump in April, which gave ISPs the green light to collect customer data. more

The Economist: Data, the Oil of the Digital Era

In its latest print edition, The Economist calls the world's most valuable resource to be no longer oil, but data. more

China Steps Up Media Pressure, Extends Restrictions to Blogs, Apps and Other Digital Media

China's latest restrictions on online news and commentary will extend to blogs, online forums, mobile apps, instant messaging tools and other forms of digital media under rules published May 2 by the Cyberspace Administration of China. more

Germany Investigating Legal Grounds to Destroy Servers Used to Carry Out Cyberattacks

Hans-Georg Maassen, Germany's head of the German Federal Office for the Protection of the Constitution says large amounts of data were seized during the May 20015 cyberattack on lower house of parliament (Bundestag). more

Brand Control: The Next Stage for Digital

Social and Digital Marketing are two of the fastest growing, and arguably the most important, pieces of branding today. According to eMarketer, 2017 digital marketing expenditures will account for 38.4% of total ad spending and are projected to be almost 45% by 2020. This is double what they were just a few years ago and growth doesn't seem to be slowing down. more

Internet Heavy Weights Staying Out of Net Neutrality Battle

Tech giants including Aamzon and Tiwtter are staring out of the contentious, public fight over the future of the Obama-era net neutrality rules. more

Oh, Those Wild and Crazy New TLDs

Among the many issues affecting ICANN's thousand new TLDs is collisions, that is, the same name already used elsewhere. The other uses are non-standard and unofficial, but some names turn out to have been used a lot. One approach to see how bad the collisions are is controlled interruption, in which the TLD publishes wildcard records with obvious impossible values, in the hope that systems that use colliding names see them and do something about it. more

NSA to Stop Collecting American Emails To and From Overseas

U.S. National Security Agency (NSA) will halt its controversial warrantless surveillance program which collects Americans' emails and texts sent to and from people overseas and that mention a foreigner under surveillance, according to a New York Times report today. more