Since the launch of the New gTLD Program in 2012, it has become evident that new gTLD registries overestimated the demand for new Top-Level Domain name extensions. Furthermore, new gTLD registries did not anticipate the hurdles in raising awareness, not to mention creating adoption for new domains. Even the most pessimistic New gTLD Program critic did not expect such uninspiring results. It was a wake up call for many in the domain industry. The New gTLD Program currently lacks credibility. No new gTLD has yet to go mainstream and capture the world's imagination. more
There is an intrinsic value proposition to new gTLDs. They mean to give users fresh naming possibilities and provide more meaningful Internet addresses. And to do so at much reduced prices. Reduced prices? Really? This is where eyebrows start being raised. How so? Well before the advent of new gTLDs, few suffixes offered any real ability to differentiate. Users thus looked to the second level, not the top level, for a way to get their web addresses to stand out from the crowd. So began a vicious circle of value going to the limited number of meaningful second level names since at TLD level, the only string with any real equity was .COM. more
Global IPv6 deployment just passed a major milestone over the past few days when Google's IPv6 adoption statistics showed over 10% of users connecting to Google's sites coming in over IPv6. Considering that only two years ago I wrote here on CircleID about IPv6 passing the 3% adoption mark, this is a great amount of growth to see! If you look on the "per-country" tab of Google's stats you will see that in some countries deployment is much higher. For example, around 25% in the USA, Portugal and Germany, 31% in Switzerland and 44% in Belgium. more
For the WSIS community to be effective in meeting its ambitious goals adopted in December 2015, it will have to become more evidence-based and innovative. At the beginning of the new millennium -- before the arrival of Facebook and Twitter -- Kofi Annan, then Secretary General of the United Nations, called for the creation of an inclusive "information society" -- "one in which human capacity is expanded, built up, nourished and liberated, by giving people access to the tools and technologies they need, with the education and training to use them effectively." more
The 2015 infographic reflects some of the intriguing highlights of the new gTLD industry... Revenues are based on the average retail price over four registrars (101domain, eNom, GoDaddy and United Domains) at the end of December 2015. In the case where a TLD was unavailable at all four registrars, one or more alternative registrars were used for the average price. Top five TLDs launched in 2015 are based on TLDs entering into General Availability after January 1st and based on volume, not revenues. more
In the debate over government "exceptional access" to encrypted communications, opponents with a technical bent (and that includes me) have said that it won't work: that such a scheme would inevitably lead to security problems. The response -- from the policy side, not from technical folk - has been to assert that perhaps more effort would suffice. FBI Director James Comey has said, "But my reaction to that is: I'm not sure they've really tried." Hillary Clinton wants a "Manhattan-like project, something that would bring the government and the tech communities together". More effort won't solve the problem - but the misunderstanding lies at the heart of why exceptional access is so hard. more
The Domain Name System is now over 25 years old. Since the publication of RFCs 1034 and 1035 in 1987, there have been over 100 RFC documents published that extend and clarify the original DNS specs. Although the basic design of the DNS hasn't changed, its definition is now extremely complex, enough so that it's a challenging task to tell whether a DNS package correctly implements the specs. more
The threat level has never been higher for organizations charged with protecting valuable data. In fact, as recent headlines will attest, no company or agency is completely immune to targeted attacks by persistent, skilled adversaries. The unprecedented success of these attacks against large and well-equipped organizations around the world has led many security executives to question the efficacy of traditional layered defenses as their primary protection against targeted attacks. more
When I last year failed to take a picture of the Christmas goat before it was taken down, I decided this year to take a pic every minute, just to be on the safe side. A shortened movie based on these pics of the 2015 Christmas Goat can be find on YouTube. The clip on YouTube also shows that in the early morning of December the 27th the goat was set on fire and burned down in minutes. more
I believe in the Internet As an ideal. As a web of human minds. As a wonder of the world, not built through totalitarian control but rather through fierce coopetition. As a technological pillar held up by a newer, better, governance structure. As the facilitator of knowledge sharing and communication on a level so advanced that it would appear supernatural to folks living just a century ago, or less. I worry for the Internet While it has been a major disruptive force, it is also susceptible to the existing paradigm. more
Recently, BII-Global SDN Certified Testing Center (SDNCTC EN | CH) issued the Performance Test White Paper for SDN Controller (hereinafter Whitepaper) at China Future Network and Development Innovation Forum, which truly fills the vacuum in SDN controller performance testing at home. It, by means of elaborate results from the open-source controller tests, provides reliable analysis report to all corners within the industry, which has been highly thought of and widely supported by experts both at home and broad. more
After two and a half years of technical analysis and discussions, six months of deliberations among all stakeholders, and intense negotiations at the United Nations, at three o'clock in the morning on December 12, 2015, the talented co-facilitators from the United Arab Emirates and Latvia dropped the gavel on the outcome document for the ten-year review of the World Summit on the Information Society (WSIS). That consensus document presents international principles that will guide the UN's work on Information and Communications Technology (ICT)-related issues. more
In the debate about "exceptional access" to encrypted conversations, law enforcement says they need such access to prevent and solve crimes; cryptographers, on the other hand, keep saying it's too complicated to do safely. That claim is sometimes met with skepticism: what's so hard about encryption? After all, you learn someone's key and just start encrypting, right? I wish it were that simple - but it's not. more
Last week I published a blog looking back on the year that was 2015 and reflecting on some of the challenges and achievements for new TLDs. Turning our gaze forward, I think 2016 is shaping up to be the biggest and best year that we've enjoyed to date and will surpass many expectations as we continue the push towards mainstream adoption of these wonderful, innovative digital assets. more
What's the difference between .local and .here? Or between .onion and .apple? All four of these labels are capable of being represented in the Internet's Domain Name System as a generic Top Level Domains (gTLDs), but only two of these are in fact delegated names. The other two, .local and .onion not only don't exist in the delegated name space, but by virtue of a registration in the IANA's Special Use Domain Name registry, these names cannot exist in the conventional delegated domain name space. more
Sponsored byIPv4.Global
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byVerisign
Sponsored byCSC
Sponsored byRadix
Sponsored byDNIB.com