Featured Blogs

Latest

2nd Round gTLDs: the Good, the Bad, and the Ugly

This post outlines the advantages (good) and threats (bad) that can make or break a gTLD, and the eternal fact that some applications will doom themselves to failure (ugly). The Good... Waiting until the second round to apply for a gTLD may end up being a virtue for the following reasons... more

Is it Time for a Registration Operations Industry Association? (Part 1)

Since 2001 there have been occasional conversations on technical mailing lists exploring the concept of creating an independent industry association or consortium of domain registration operators. My recent experiences with the evolution of extensions to the Extensible Provisioning Protocol (EPP) have convinced me to look at these suggestions more closely, and I'm now convinced that this is an idea worth exploring. "Registration Operations" refers to the technical tasks, such as the development, deployment, and ongoing systems administration of EPP, performed by registries and registrars to provide registration services. more

The Coding of Online Brand Protection

Moore's law postulates that the number of transistors in an integrated circuit will double every two years. That law has given us smartphones and other devices with astonishingly diverse capabilities at ever lower costs. However, while it does not encompass online brand infringement, many trademark managers feel that their task is likewise expanding at exponential speed and imposing escalating costs. Potential cybersquatting based in the more than one thousand new generic top level domains is only one new source of anxiety. While the jury is still out on the level of harmful cybersquatting and the efficacy of the new Rights Protection Mechanisms (RPMs) for new gTLDs, that ICANN program is hardly the only challenge. more

How Do We Define ‘SIP’ for Telecom In 2014?

"What is a minimum set of specifications that a vendor must implement to be able to say that it is SIP-compliant?" A friend asked me that question and my response was: "It depends." and even more unfortunately:
"I don't know." It turns out to be a challenging question to answer... and it led me to ask: "How do we define what "SIP" is for telecommunications in 2014? How do we help vendors move their products/services to be based on SIP? As we talk about "turning off the PSTN" and "moving all telecom to IP", how can we make it easier for companies to switch to using SIP? more

ICANN Board Appoints 2015 NomCom Chair

During its September 9, 2014 meeting, the ICANN Board selected the Chair of the 2015 Nominating Committee (NomCom). The 2015 NomCom will begin its work In Los Angeles, immediately after the close of ICANN's 51st International Meeting due to be held in mid-October. ICANN's Nominating Committee is charged with identifying, recruiting and selecting nominees of the highest possible quality for key leadership positions at ICANN. more

iPhone 6 VoLTE Will Disrupt the Mobile Industry

As far back as 2011 we predicted that Apple would eventually enter the voice market. We indicated at that time that it was just a matter of time -- in the end it took another three years... While it didn't happen at Christmas that year the company is now ready and will use the VoLTE service to enter this market, which will make it possible to replace Telstra with any other mobile operator around the world... he telcos are not ready for this. While they should be seen as the leaders in the voice call market they are too preoccupied with protecting their traditional business and it is companies like Apple and Samsung who are now leading the charge. more

Credit Card Breaches a Salutary Lesson for DNSSEC Adoption

Maintaining an 150 year old house requires two things, a lot of time and a lot of trips to the hardware store. Since the closest hardware store to my house is Home Depot, it is rare that a weekend passes without at least one trip to Home Depot. So now in the wake of the Home Depot data breach I am through no fault of my own in a situation where any or all of the bank cards I use regularly could be cancelled if the issuer decides they might be compromised. And this is not the first time this has happened to me this year. more

Critical Look at New gTLD Registries’ Tactics

This post outlines some faulty decisions by new gTLD registries. The purpose is to guide future expansions and, hopefully, adjust some of the decisions that current registries have adopted, including demand prediction, pricing, marketing, doing good versus not doing good, and launch date... GTLDs that have no competition do not need to race to launch. They have the luxury of waiting to better assess prices and postpone investments in capacity. more

Patents and Standards, or: How a Court Case Will Affect Our Everyday Lives

Industry standards are indispensable for today's technology driven economies. Every time we use a mobile phone to place a call, or connect a computer to the Internet at a café, we rely on standardized technology. Most standards are developed over years through the collaboration of numerous engineers from different companies -- the result is a technical document explaining how to make products that can 'interoperate' with one another. As EU Commissioner Neelie Kroes put it: 'Standards are the foundation of interoperability.' more

Watch ION Belfast / UKNOF Live Tuesday, Sept 9, for IPv6, DNSSEC, BGP Security and More

On Tuesday, September 9, 2014, you have a great opportunity to watch live a very packed agenda full of great sessions about IPv6, DNSSEC, routing/BGP security and other components of Internet infrastructure streaming out of the UKNOF / ION Belfast event in Belfast, UK. All of the sessions can be seen live. more

DNSSEC Adoption Part 1: A Status Report

Where is the domain industry with the adoption of DNSSEC? After a burst of well publicized activity from 2009-2011 -- .org, .com, .net, and .gov adopting DNSSEC, roots signed, other Top-Level Domains (TLDs) signed -- the pace of adoption appears to have slowed in recent years. As many CircleID readers know, DNSSEC requires multiple steps in the chain of trust to be in place to improve online security. more

Understanding the Long-Term Value of the IGF

This year's Internet Governance Forum (IGF) in Istanbul comes at a critical moment in the Internet's history and is the latest in a series of pivotal meetings that will have far-reaching consequences for its future. One of those central questions posed recently was how the IGF, founded nine years ago in Tunis as part of the two founding phases of the World Summit on the Information Society (WSIS), could be improved to increase its relevance and inclusiveness in meeting the new challenges facing our open Internet. more

Top Six IT Trends Impacting Business Networks

For decades, IT followed business. Even the development of the World Wide Web didn't move this development much beyond the four walls of corporate offices -- outside connections were essential but never informed the growth of business-critical technology. Now the growth of public clouds, enterprise-grade social networking and mobile device use in the workforce is creating a new paradigm, one where business networks are reactive to IT trends -- here are six that are set to impact companies this year. more

Success Factors for New gTLDs Program

The success of the new gTLDs program depends on the actions of the winning registries and on ICANN's allocation policies for the second round of applications. A successful landscape would be dominated by only a few registries but would be less confusing for users. The major players: businesses and Internet users who drive the demand for the gTLDs; the registries who own and run the gTLDs; and ICANN, which sets the rules for determining a winner for each new gTLD. more

ICANN’s Comment Period on Accountability Process Seeks Scope Limitations

Bowing to unprecedented community pressure in the form of a unanimous letter questioning its staff-developed Accountability Process, as well as a reconsideration request filed with the Board, on September 5th ICANN issued a notice titled "Public Comment Invited: Enhancing ICANN Accountability Process". The notice opens a 21-day public comment period on that staff proposal. However, ICANN staff apparently cannot resist asserting some form of top-down control even what that very conduct is at issue, and the notice and accompanying explanation contain attempts to restrict and unduly channel the scope of community comment. more

Topics

Threat Intelligence

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days