/ Featured Blogs

Starlink to Go - Stress Tested in Ukraine and Now Available to You

Russians have targeted Ukrainian electricity and communication infrastructure. In some areas, there may not be any utility poles left standing, and underground conduits may have been bombed to oblivion. Starlink has been an important tool for these brave people to coordinate their resistance to Putin's brutal invasion. Satellite communication doesn't require any middle-mile infrastructure. more

Securing Weak Links in Supply Chain Attacks

We've all heard the term, "you're only as strong as your weakest link." Whether talking about a tug of war on the playground, a sports team, or a business, this rings as true as ever. Every business relies on a series of suppliers and vendors -- be it the dairy farm supplying milk to the multinational food manufacturer or the payment systems that retailers use. These links form supply chains that every business, large and small, deals with. There is simply no way around it. more

Monumental Cybersecurity Blunders

Two recent celebrated cybersecurity standards history events brought together sets of people who were intimately involved with some of the most significant network security standards work ever undertaken. These included the X.509 digital certificate standards at ITU X.509 Day, and the Secure Digital Network System (SDNS) standards at the NSA Cryptologic History Symposium 2022. more

NIS2 Directive Article 23 Will Lead to Inconsistencies and Conflicts Within the Domain Name Industry

On May 12th, European legislators head into their final trilogue negotiations around the NIS2 Directive. This week, the Internet Infrastructure Coalition (i2Coalition) shared guidance found below with negotiators, focused on the Directive's Article 23. i2Coalition has been detailing our concerns about Article 23 before even their public consultation in March 2021. more

Building a More Inclusive Internet for All: A Radix Initiative

Universal Acceptance (UA) is a fundamental requirement for a truly multilingual and digitally inclusive Internet. UA is important because it ensures that all domain names, including new long top-level domains (TLDs) and Internationalized Domain Names (IDNs), and email addresses are treated equally and can be used by all Internet-enabled applications, devices, and systems. more

Breaking the Rules on Counterfeit Sales: The Use of Hidden Links

Counterfeiting is big business. A 2021 study by the Organisation for Economic Cooperation and Development (OECD) estimated that the international trade in counterfeit and pirated products was worth up to $464 billion in 2019, or around 2.5% of all world trade. A significant proportion of this trade occurs via digital channels, where global annual expenditure on eCommerce is more than $4 trillion. more

Home Broadband and the Cloud

I'm not sure that most people understand the extent to which our online experience has moved to the cloud -- and this movement to the cloud means we're using a lot more bandwidth than in the recent past. A huge number of online functions now reside in the cloud, when only a few years ago, a lot of processing was done on our computers. Take the example of Twitter, where I keep an account to upload a copy of my blog every day. more

How to Save the “Past” in the “Future of the Internet”: Principles, Procedures and Problems of the Washington Declaration

On April 28, 2022, a "Declaration on the Future of the Internet," initiated by the U.S. government, was signed by 60 governments at the White House in Washington, D.C. According to Jack Sullivan, National Security Advisor to U.S. President Joe Biden, the Declaration is intended to serve as a reference document for future international negotiations on Internet-related issues. Is there a reason why the U.S. government is launching an initiative on the "Future of the Internet" at this point in time? more

Designing for RealTimeML

The steepening trajectory towards event-driven and real-time API architecture is imminent. This means incorporating event-based APIs into a technology strategy and leveraging existing API legacy systems that may have incurred a fair amount of technical debt, especially for historically progressive organizations. more

Sanctions & The Regulation of IP Transfers

The early stages of internet development operated in a culture of independence from outside influence. In fact, as though to commemorate the spirit of the times, in 1996, John Perry Barlow wrote "A Declaration of the Independence of Cyberspace." In it, he told governments they "have no sovereignty where we gather." He went on to state, "Ours is a world that is both everywhere and nowhere, but it is not where bodies live." more