Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Developing Models for the Prediction of Domain Name Renewal Rates

One of the key issues for the Domain industry is how to accurately predict year-on-year how many customers will renew their domain names. It's fairly common that a registry in the first year has around a 60% renewal rate, and following the first year, that increases to around 80 and 85 percent on the remaining domain names. But how can we understand better why this is so, how can this be more accurately predicted, and what can be done to help maximize these opportunities? more

Hyperties: “Travel Adaptors” for the Cloud?

I have spent the day here in Berlin attending my second advisory board meeting for the EU research project reTHINK. I'm chewing over what I learnt about the possible future of the telecoms and cloud industry. There has been a decades-long tussle between the communications and computing parts of the ICT industry. Both sides wish to exert power over the digital economy. Sometimes this tussle works for the common good, sometimes not. more

Coronavirus Online Threats Going Viral, Part 5: Social Media

For our final blog in this series, looking at the online risks associated with COVID-19, we focus on social media. The popularity of social media channels means that they are extremely susceptible to exploitation by cybercriminals and other infringers, particularly during the coronavirus crisis. In an earlier post in this series, we discussed the use of social media for the distribution of phishing-related content, but CSC has also noted marked activity relating to the creation of fake accounts. more

On the Road to WSIS+10: Open Frameworks for Successful Discussions

This year we must work together to open up Internet governance processes so that everyone can have their voices heard in the development of Internet policies. In 2015, the Internet governance landscape is peppered with events and meetings as a number of key Internet policy issues are debated. There are key global, regional and local discussions underway about how to strengthen the Internet governance model in ways that will be meaningful to users around the globe, and how to be more inclusive of new ideas and perspectives. more

Government Policies Beyond Broadband

The telecom infrastructure decisions we are now facing have very little to do with developments or the need for services in 2009 or 2010. They are more related to where the digital economy is taking us in the future. This is well beyond the time needed to kick-start sluggish economies. more

China Using Cybertechnologies to Expand Their Political Cloud

A few months ago, I mentioned that China’s social code would also be expanded to companies who want to deal with China. I have come across information that shows that China is indeed serious about this. China’s cyberspace regulator has proposed requiring companies pursuing share listings in Hong Kong to apply for cybersecurity inspections if they handle data that concerns national security. Large internet platforms planning to set up headquarters, operating or research centers abroad will have to submit a report to regulators. more

Meet My Friend Marlowe, She’s Dopamine for Authors

We all have a creative side, so consider meeting my friend Marlowe if you are an aspiring author. Authors.ai is a relatively new web property directly related to enhancing your novel's success or manuscript using Artificial Intelligence. Practically, Marlowe (the intelligent AI engine) reads and writes manuscripts in under an hour. Marlowe is labeled as a self-editing tool but's it is much more nuanced. more

We Need to Disconnect from Facebook Right Now

The smartphone has effectively transformed us into cyborgs, we have in our hands a highly efficient computing device equipped with a photo and video camera, microphone, GPS, accelerometer, gyroscope, magnetometer, light and proximity sensors, as well as other features that allow creation of increasingly useful, impressive and addictive applications. more

Progress in US Telecoms Transformation

The impact of the changes set in motion by President Obama back in late 2008 in relation to the direction the telecommunications are slowly becoming apparent and are taking many Americans by surprise, even many of the experts and analysts in this industry. This has created a lot of noise and confusion, as people are trying to understand what is happening and how it will affect them. more

WSIS+10 Consultations at the U.N. Next Week: The Negotiations Are Accelerating

Next Monday the WSIS+10 Second Informal Interactive Consultations will take place at the UN Headquarters in New York. Much of the discussions will focus on what is called the "zero draft", which is the draft outcome document of the overall ten-year Review of the World Summit on the Information Society (WSIS). As it stands, the text is an effort from the negotiators to collect multiple perspectives, reconcile differences and hopefully make progress towards consensus before the UN General Assembly High-Level Meeting in December. more

Major New Funding Opportunities for Internet Researchers and R&E Networks

Nationally Appropriate Mitigation Action (NAMA) is a new policy program that was developed at the Bali United Nations Climate Change Conference. As opposed to the much maligned programs like CDM and other initiatives NAMA refers to a set of policies and actions that developed and developing countries undertake as part of a commitment to reduce greenhouse gas emissions. Also unlike CDM, NAMA recipients are not restricted to developing countries. more

Call for Participation – ICANN DNSSEC and Security Workshop for ICANN74 Policy Forum

Do you have information about DNS security or routing security that you would like to share with the global community? Have you developed a new tool or system in this area? Do you have results from a research project that you want to share with a technical community? If so, please consider submitting a proposal to the DNSSEC and Security workshop to be held at ICANN 74 in June 2022. more

Defending Against the Hackers of 1995

Two factor authentication that uses an uncopyable physical device (such as a cellphone or a security token) as a second factor mitigates most of these threats very effectively. Weaker two factor authentication using digital certificates is a little easier to misuse (as the user can share the certificate with others, or have it copied without them noticing) but still a lot better than a password. Security problems solved, then? more

An Update on LEO Satellites

A lot of rural America continues to hope that low orbit satellite (LEO) service will provide a broadband alternative. It's been a while since I've covered the status of the companies proposing to deploy constellations of satellites for providing broadband. In March, OneWeb filed for Chapter 11 restructuring when it was clear that the company could not raise enough cash to continue the research and development of the satellite product. more

The Velocity of Change at SCTE

Engineering wise, how's the industry doing? With that question in mind, hundreds descended on Denver for this year's Society of Cable Telecommunications Engineers (SCTE) Cable-Tec Expo. That question begs to be answered. Really, can we still separate the engineering 'cool' stuff from the business chic? By that, I mean the business requirements from subscribers who demand communication and entertainment when they want it, where they want it, and on whatever device they want it delivered to. more

Topics

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days