We are experiencing a time of global challenges. How to mitigate global warming, fight a global pandemic, and prevent the spread of totalitarianism and war, are just some of the most urgent questions. Digital technologies offer us the tools to unite and face these challenges, instead, we have experienced the deterioration of the Internet into a Splinternet. Is Multistakeholderism, the currently dominant guiding principle of Internet Governance, still up to the task? more
On March 1, I wrote that a small number of SpaceX Starlink terminals had arrived in Ukraine, and they would be an important asset for distribution to selected government and resistance leaders and journalists. I didn't know who would get the terminals or how many there were, but it was a single truckload. A week or so later, we learned that two more shipments of terminals had arrived and fifty of them went to DTEK, a company struggling to repair Ukrainian electrical infrastructure. more
For companies with global aspirations, Russian has long been considered a "must support" language. These days, that is no longer the case. But even before Putin decided to invade Ukraine, the Russian language had been slipping, ever so slightly, in global website support. While support for Ukrainian has been steadily rising. I’ve been tracking the languages supported by the leading global brands for nearly 20 years and... more
Domain Name System (DNS) Operators (Registries and Registrars) receive notices asking them to take action on a wide range of alleged technical and content-related abuses. However, there is a fundamental question of when it is appropriate to act at the DNS level and the evaluation of whether the alleged abuse meets a sufficient threshold for action at the DNS level. Additionally, given the volume of abuses occurring on the internet, existing resources, mechanisms, and protocols available in-house to Operators are in many cases insufficient to address abuses in a timely fashion. more
Domain security is a critical component to help mitigate cyberattacks in the early stages - your first line of defense in your organization's Zero Trust model. According to the Cybersecurity and Infrastructure Security Agency (CISA), most cyberattacks - including ransomware and business email compromise (BEC) - begin with phishing. Although losses due to ransomware now exceed billions annually, most ransomware protection and response measures don't adequately address phishing risks in the early stages of an attack because they don't include domain security measures to protect against the most common phishing attacks. more
Leichtman Research recently released the U.S. broadband customer statistics for the end of the fourth quarter of 2021. The numbers show that broadband growth has slowed significantly for the sixteen largest ISPs tracked by the company. LRG compiles these statistics from customer counts provided to stockholders, except for Cox, which is privately owned. Net customer additions sank each quarter during the year. more
According to a report just released by McKinsey & Company, we are on the verge of seeing a major shift to health care from home. The report says that as much as $265 billion in annual fees to Medicare and Medicare Advantage could shift to homes by 2025. We've already seen the start of the trend towards telemedicine. The spending on telemedicine was 38 times higher in 2021 compared to 2020. Most of that shift is obviously due to the pandemic. more
The Domain Name System has provided the fundamental service of mapping internet names to addresses from almost the earliest days of the internet’s history. Billions of internet-connected devices use DNS continuously to look up Internet Protocol addresses of the named resources they want to connect to - for instance, a website such as blog.verisign.com. Once a device has the resource’s address, it can then communicate with the resource using the internet’s routing system. more
Price was the story of the 2021 IPv4 market. Large and small organizations alike continue to invest in their IPv4 infrastructure causing demand for IPv4 address space to intensify. Meanwhile, supply remains constrained. These market factors drove prices up at a historic rate in 2021. more
Last week I wrote about the arrival of a truckload of SpaceX Starlink terminals in Ukraine and their potential value to government and resistance leaders. A lot has happened in the ensuing week - this is an update. Last week, using Mike Puchol's Starlink tracking service, I found that users in Kyiv would have 100 percent uptime with connections through as many as nine satellites to ground stations in Turkey, Poland, and Lithuania. more
Until the pandemic hit, I rarely thought about upload bandwidth. I mostly used upload bandwidth to send files to people, and I rarely cared if they received the files immediately -- I was happy as long as files got sent. But the pandemic changed everything for millions of people. All of a sudden, homes were unable to function well due to problems with uploading. more
In response to Russia's horrific invasion and war against the Ukrainian nation ordered by Dictator Putin that will live in infamy, an array of nations, organizations, and companies have responded to shun and shut off Russia in every possible manner. The actions include no-fly zones, removal from ICT network services, and essentially universal declarations of condemnation. For the first time ever, all Russian proposals to the International Telecommunication Union (ITU) quadrennial standards body plenary known as the WTSA have been "bracketed"... more
In a previous article, I reported on the problems that Facebook (Meta) is facing – currently betting the house on its Meta service, based on a software platform that will create a virtual reality (VR) networked environment. I mentioned that I was critical about this business model and that I don’t see, at least for the foreseeable future, a platform (based on VR) that would turn the internet or mobile networks into VR environments. I also mention that I do see interesting markets for VR in certain sectors. more
Decentralization is a big trend in IT, and everyone has their own definition of what "decentralization" really means. With more organizations fully embracing a work-from-anywhere culture, decentralization has moved past being a fad and turned into a necessity. Decentralized cybersecurity is nothing new. Many of us have been doing it since before the pandemic. more
Ask ten people what privacy is, and you'll likely get twelve different answers. The reason for the disparity is that your feelings about privacy depend on context and your experience. Privacy is not a purely technical issue but a human one. Long before computers existed, people cared about and debated privacy. Future U.S. Supreme Court Justice Louis Brandeis defined it as "the right to be left alone" in 1890. Before the Web became a ubiquitous phenomenon, people primarily thought of privacy in terms of government intrusion. more