Featured Blogs

Latest

Busting 3 Popular and Misleading Terms in Telecom

"Philosophy is a battle against the bewitchment of our intelligence by means of our language." (-Ludwig Wittgenstein) The words we use to describe telecoms networks often contain hidden metaphors and meanings that lead us into wrong thinking. Here are three examples... Why misleading? The word "best" implies both benevolent and optimal intentionality: the network is going to do the "right" thing for its users, and it will maximise the "rightness" in some way. more

IPv6 and DNSSEC Are Respectively 20 and 19 Years Old. Same Fight and Challenges?

A few weeks ago I came across an old interview of me by ITespresso.fr from 10 years back entitled "IPv6 frees human imagination". At the time, I was talking about the contributions IPv6 was expected to make and the challenges it had to face. After reading the article again, I realized that it has become a little dusty (plus a blurred photo of the interviewee :-)). But what caught my attention the most in the interview was my assertion: "If IPv6 does not prevail in 2006, it's a safe bet that it will happen in 2007". Wow! more

Addressing 2015 - Last One Standing!

Time for another annual roundup from the world of IP addresses. What happened in 2015 and what is likely to happen in 2016? This is an update to the reports prepared at the same time in previous years, so let's see what has changed in the past 12 months in addressing the Internet, and look at how IP address allocation information can inform us of the changing nature of the network itself. more

ITU-T - Still Living in 1924

Sometime later this year - at a venue still unknown - something short of a thousand people from around the world will gather together and engage in a now meaningless ritual almost exactly like they did in 1924. In the 1990s the name of the gathering was changed from the CCITT Plenary Assembly to a World Telecommunication Standardization Assembly (WTSA). more

Are Telcos Becoming Slum Landlords?

In the 1950s and 60s, large numbers of immigrants came to London from the Caribbean and other Commonwealth countries. They had few resources, yet needed somewhere to live. Many fell prey to exploitative landlords. These unscrupulous rentiers packed tenants into formerly swanky parts of town, which then became slums. This process even birthed a new word in British English - "Rachmanism" - to define the archetypal unethical treatment as practised by one notorious landlord. more

Blocking Shodan

The Internet is chock full of really helpful people and autonomous systems that silently probe, test, and evaluate your corporate defenses every second of every minute of every hour of every day. If those helpful souls and systems aren't probing your network, then they're diligently recording and cataloguing everything they've found so others can quickly enumerate your online business or list systems like yours that are similarly vulnerable to some kind of attack or other. more

IANA: Keeping the Ultimate Objective in Mind

Later this week, ICANN's Chartering Organizations will indicate whether they will support the third draft proposal of the CCWG-Accountability Work Stream 1 Recommendations. This is a significant moment in the IANA transition process. Support for the accountability proposal by the ICANN community will mean that we are very close to a point when the transition can move to its next phase. more

Who Will Secure the Internet of Things?

Over the past several months, CITP-affiliated Ph.D. student Sarthak Grover and fellow Roya Ensafi been investigating various security and privacy vulnerabilities of Internet of Things (IoT) devices in the home network, to get a better sense of the current state of smart devices that many consumers have begun to install in their homes. To explore this question, we purchased a collection of popular IoT devices, connected them to a laboratory network at CITP, and monitored the traffic that these devices exchanged with the public Internet. more

Federal Data Crisis: Unreliable Federal Databases are Destroying Opportunities for Small Businesses

Databases are the infrastructure of the modern administrative state and data is its lifeblood. When the data is contaminated with errors, federal agencies have difficulty performing even the most basic administrative functions such as managing its inventory of office space and protecting the personally identifiable information (PII) of social security number holders. The federal dissemination of unreliable data doesn't just waste money; it undermines public trust in government and leaves it unmanageable. more

The Promise of Connectivity at CES Means Nothing Without IPv6

For a few years now, we have been promised a bright future where connected devices all communicate with each other on the Internet of Things. If this year's CES was any indication, the consumer technology industry is just about ready to deliver on that promise with a flood of new devices and products that will transform the way we interact with technology on a fundamental level. more

Building a Strong, Sustainable Domain Name Industry - With Integrity

This week, I had the privilege of presenting at NamesCon on behalf of the Domain Name Association (DNA) -- in my position as Chair of the Board -- to provide an update on our activities and an assessment of our progress as an industry in light of the goals of the DNA. In summary, there is still a long way to go with many challenges to address. Despite this, there is much to be excited about and incredible opportunity for our combined success. Included here is a transcript of my speech. I welcome feedback and comments. more

The Real Facts & Stats About ICANN and Its gTLDs: One BIG.FAIL ... So Far?

The crème de la crème, the good, the bad, even the ugly of the Domain Name Industry are attending NamesCon in Vegas this week. 2016 will be a very challenging, absolutely critical year for those attendees and their corporate employers as the Domain Name System (DNS) faces a massive shakeup. In 2015, 287 global brands, worth $trillions headed by Google, Amazon, had their new TLD Registries delegated into the root zone of the Internet. more

People Should Drive Automation - Not Technology

Service providers have traditionally organised their operations around different technology domains. The responsible teams have been staffed with specialists looking after routing, network services, security and various other functional areas. Over time, organizations like this have had the tendency to transform into loosely tied silos with limited interaction between the different teams. more

Thought Leaders Create New Trends & Solutions, Followers Just Follow - Which Are You?

Last week I asked on a post elsewhere, why we, at the MLi Group, chose to consider speakers, panelists, supporters and sponsors at our Global Summit Series (GSS) as "Thought Leaders" and "Trend Setters? Many wrote me directly offering their answers and then it dawned on me that my answer may (or may not) get appreciated by many at the ICANN community. So here is why we do. more

CircleID’s Top 10 Posts of 2015

Once again it is time for CircleID's annual roundup of top ten most popular posts featured during the past year (based on overall readership). Congratulations to all the 2015 participants and best wishes in the new year. more

Topics

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Threat Intelligence

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days