/ Recently Commented

AI in Telecom

NVIDIA recently issued its third annual State of AI in Telecommunications report. The company manufactures many of the cards used in AI data centers, so the company is clearly focused on AI adoption. NVIDIA issues similar reports for other industries. The 2025 report is the result of a survey that NVIDIA administered to 450 telecom professionals across the globe. more

Beyond WHOIS: Filling the Gaps

Amid evolving privacy laws and rising cybersecurity threats, domain registration data disclosure remains a contentious issue. Beyond WHOIS: Filling the Gaps brings together experts to examine Project Jake's policy framework, aiming to balance privacy with legitimate access. Join industry leaders for insights on policy clarity, operational efficiency, and the future of domain name governance. more

Meta’s Undersea Ambitions: A Cable to Power the AI Future

Meta has unveiled plans for an ambitious undersea cable project that, at 50,000 kilometers (31,000 miles), would be the longest in the world—surpassing the Earth’s circumference. Dubbed Project Waterworth, the infrastructure aims to link the United States with India, Brazil, South Africa, and other regions, bolstering global connectivity and supporting artificial intelligence (AI) development. more

Constraints on Satellite Broadband: Starlink Alone Unable to Meet Rural Broadband Demand

In a 2024 end-of-year memo, Gary Bolton of the Fiber Broadband Association said that FBA had partnered with the consulting firm Cartesian to look at the pros and cons of Starlink in the U.S. FBA says that report shows that Starlink currently has 1.4 million customers in the U.S., and with the current satellite constellation has the capacity to serve 1.7 million customers. more

Beyond WHOIS: CircleID and Edgemoor Research Institute Inaugural Event on Balancing Privacy and Legitimate Data Needs

The global debate over Internet privacy and security took center stage in a webinar hosted by CircleID in partnership with the Edgemoor Research Institute. The event marked the first in a series exploring the delicate balance between safeguarding personal data and ensuring legitimate access to domain name registration details. As governments, cybersecurity experts, law enforcement, and intellectual property holders grapple with the evolving regulatory landscape, Project Jake seeks to establish a framework that prioritizes policy clarity, efficiency, and adaptability. more

12-Year-Old’s Lost Video Has Resurfaced, Discussing Bitcoin at $8 and the Power of Peer-to-Peer Transactions

In 2011, a 12-year-old unknowingly predicted Bitcoin's rise in a forgotten YouTube video. Now, crypto enthusiasts have rediscovered it, launching $TPU, a Solana-based memecoin named after his old channel. The internet is hailing him as an accidental visionary, proving once again that the digital world never forgets -- and that early tech predictions can age like fine wine. more

New VPN Protocol Outsmarts VPN Blockers

NordVPN has introduced NordWhisper, a new protocol designed to bypass VPN restrictions in countries such as Russia and India. The protocol mimics regular internet traffic, making it difficult for internet service providers (ISPs) and websites to detect and block VPN usage. more

A Perfect Storm Brewing for European ccTLDs?

The European country code top-level domain (ccTLD) market is at a crossroads, facing a confluence of challenges that could reshape its trajectory in the coming years. From slowing growth and rising renewal prices to shifting user behaviour driven by AI, the market is undergoing profound changes. These trends suggest a potential decline in domain volumes and a shift in how domains are valued and used. Here's a closer look at the factors contributing to this "perfect storm" and what it means for the future of European ccTLDs. more

RDAP Replaces WHOIS: A New Era in Domain Name Data Management

Today marks a significant shift in how internet registries manage domain name data as the Registration Data Access Protocol (RDAP) officially replaces the legacy WHOIS system. Designed to address privacy and data access challenges, RDAP modernizes how information about domain registrations is queried and provided. more

Baltic Sea Infrastructure Targeted Amid Rising Geopolitical Tensions

An underwater data cable linking Sweden and Latvia was damaged early Sunday, marking the fourth such incident in the Baltic Sea, fueling concerns within NATO regarding the security of critical infrastructure. more

Starlink vs. Kuiper: The Satellite Broadband Race for Space and Subscribers

Strand Consult published an article on its website that makes numerous predictions for broadband and related industries in 2025 and compares them to the company's 2024 predictions. It's fascinating and well worth reading. There is one prediction in particular that got me thinking. In its 2024 predictions, Strand Consult compared Elon Musk's Starlink to Jeff Bezos' Kuiper and said that Bezos had opened a burger bar while Musk runs an interstellar McDonald's. The 2025 observation agrees with that assessment. more

Internet Governance Outlook 2025: Unbordered Spaces vs. Bordered Places

At the end of the 20th century, Manuel Castells gave an outlook into the "Network Society" of the 21st century. One of his forecasts was that the world would move from "bordered places" (sovereign nation-states) to "unbordered spaces" (global networks). A quarter of a century later, we see that he was right and wrong. We do now have "unbordered spaces." We can communicate around the globe anytime with anybody, regardless of frontiers. But the "bordered places" did not disappear. More and more states are insisting on their "digital sovereignty." more

Unregistered Gems Part 6: Phonemizing Strings to Find Brandable Domains

The UnregisteredGems.com series of articles explores a range of techniques to filter and search through the universe of unregistered domain names, in order to find examples which may be compelling candidates for entities looking to select a new brand name (and its associated domain). The previous instalment of the series looked at the categorisation of candidate names according to the phonetic characteristics of its constituent consonants, using a simple one-to-one mapping between each consonant and a corresponding phonetic group. more

How Decades-Old Decisions Left U.S. Networks Vulnerable to Chinese Cyberintrusion

It seems like there is more disturbing news every day about Chinese infiltration of our telecommunications networks. A recent headline said that nine large ISPs have now been infiltrated. Tom Wheeler, a previous Chairman of the FCC, recently wrote an article for the Brookings Institute that speculates that the ability of the Chinese to infiltrate our networks stems back to decisions made decades ago that have never been updated for the modern world of sophisticated hacking. more

Nominations Open for 2025 Public Interest Registry (PIR) Board of Directors

Are you interested in helping guide the future of the Public Interest Registry (PIR), the non-profit operator of a number of domains that serve the public interest, including .ORG, .NGO and .ONG? Or do you know of someone who would be a good candidate? If so, the Internet Society is seeking nominations for three positions on the PIR Board of Directors. The nomination deadline is 14 February 2025. more