Featured Blogs

Latest

How Can Managers Support Their Engineers Deploy IPv6?

After interacting with over 1000 network engineers during training sessions about what they think could help drive IPv6 deployment in Africa, I have come to the realisation that a three prong approach is required... Many training courses focus on the first issue, and quite logically, that's where the real work lies. I've developed such a course that has been delivered in over 45 countries, and there are lots of other great training available, both free and paid. more

Jeff Schmidt to Present Name Collision Management Framework at Research Workshop

I'm delighted to announce that the name collisions workshop this weekend will include Jeff Schmidt, CEO of JAS Global Advisors, presenting the Name Collision Occurrence Management Framework that his firm just released for public review. Jeff's presentation is one of several on the program announced by the program committee for the Workshop and Prize on Root Causes and Mitigations of Name Collisions (WPNC). more

7 Major Current Trends in Cloud Computing

Cloud computing has experienced exponential growth over the last few years. As of December 2013, almost 60 percent of current small-to-medium businesses (SMB) use cloud services, and 72 percent of these businesses virtualize substantial portions of their servers. The growth is only expected to increase over the next few years. Here are just a few of the major current trends in the industry today. more

Best Practices in the Global Internet

In an increasingly global environment, the Internet infrastructure industry faces a diverse set of serious issues that we as an industry need to address together. To look at these concerns, an area of focus for the Internet Infrastructure Coalition (i2Coalition) has been best practices for our industry. Our approach to developing best practices encapsulates three areas, always with the goal of striking the right balance between security, safety and privacy: working with experts and industry professionals; identifying like-minded partners; and fostering the growth of the Internet economy. more

Et Tu, ICANN? ICANN Board’s Recent Decision on the .Islam and .Halal TLD Applications Is Wrong

On Feb. 7, 2014 Dr. Stephen Crocker, the Chair of the ICANN Board of Directors, wrote to Asia Green IT System (AGIT), a Turkish company which applied for .Islam and .Halal, conveying ICANN's latest position on these two applications. The letter is deeply flawed, and shows how ICANN's handling of the .Islam and .Halal applications is at once an egregious assault on the new gTLD program rules, and a betrayal of whatever trust Muslims around the world might have had in ICANN. more

“Bitcoin and Internet Payment Systems” - IETF 89 Technical Plenary (Live Video Stream Available)

Are you interested in learning more about Bitcoin, cybercurrencies and Internet payment systems? On Monday, March 3, 2014, at 5:50pm UTC (London, UK) the Technical Plenary of the 89th meeting of the Internet Engineering Task Force (IETF) will be streamed live. The presentations during the "technical topic" part of the plenary will include... more

ICANN’s Uniform Rapid Suspension: The Good, the Bad and the Ugly

With so many new gTLDs moving into their respective general availability periods, and incidents of cybersquatting beginning to appear, many companies are now looking towards the URS (Uniform Rapid Suspension) as a possible solution for quickly remediating abuse. As a reminder, domains that are the subject of a successful URS ruling are suspended for the remainder of the registration term, or can be renewed for an additional year at the current registrar. more

More Denial of Service Attacks

There are quite a lot of NTP-amplified denial of service attacks going around at the moment targeting tech and ecommerce companies, including some in the email space. What does NTP-amplifed mean? NTP is "Network Time Protocol" - it allows computers to set their clocks based on an accurate source, and keep them accurate. It's very widely used - OS X and Windows desktops typically use it by default, and most servers should have it running. more

Touching Enhanced Cooperation

A concrete plinth was lain at the foundation of durable Enhanced Cooperation this week when ISOC unveiled its IXP toolkit and portal. In simple English (which no doubt will be expanded to other languages) the soft launch modestly seeks feedback, corrections, and further input to the already pithy and instructive content. More to the point, this resource responds to one of the principle demands of those who do not recognize themselves in the multistakeholder model: how do we get our own IXP? more

Fifth Applicant Auction Concluded, 28 Contention Sets Resolved

After the successful conclusion of our fifth auction last week, the Applicant Auction has now resolved contention for a total of 28 strings. More than 20 gTLD applicants have participated in our auctions, ranging from many smaller companies with only one gTLD application in contention to large, publicly traded portfolio applicants like TLDH and Demand Media. more

Papers Now Available Publicly for W3C/IAB “Strengthening the Internet” Workshop

Want to read a wide range of views on how to strengthen the security and privacy of the Internet? Interested to hear how some of the leaders of the open standards world think we can make the Internet more secure? As I wrote about previously here on CircleID, the W3C and the Internet Architecture Board (IAB) are jointly sponsoring a workshop on "Strengthening The Internet" (STRINT) on February 28 and March 1 in London just prior to the IETF 89 meeting happening all next week. more

Uncontrolled Interruption? Dozens of “Blocked” Domains in New gTLDs Actually Delegated

The Mitigating the Risk of DNS Namespace Collisions report, just published by JAS Global Advisors, under contract to ICANN, centers on the technique of "controlled interruption," initially described in a public preview shared by Jeff Schmidt last month. With that technique, domain names that are currently on one of ICANN's second-level domain (SLD) block lists can be registered and delegated for regular use, provided that they first go through a trial period where they're mapped to a designated "test" address. more

Who Are the Major New gTLD Applicants and… (Part Four: Donuts)

Donuts is an applicant that threw the entire domain name industry into uproar due to the number of applications it submitted: 307 in total. It is hardly surprising that whenever new gTLDs are mentioned in the media that Donuts are mentioned alongside due to shear number of applications that they have submitted. There are dozens of articles in the media mixing information and opinions about Donuts. Often, they address the benefits to those registrants who are excited about the possibility of acquiring a new domain name and the threats to those who have an existing .COM domain name portfolio. more

Would It Be Selfish to Register Calzone.Pizza?

I was told recently that I should register the domain "calzone.pizza" as soon as it becomes available, even though our start-up has nothing to do with food. This is a question that a lot of businesses may be facing as they become aware of the new dots that are becoming available, like .club, .nyc and .guru. Should businesses spend money and grab their brand in all of the new domain extensions to prevent potential customer confusion, or worse - cybersquatting or phishing of their brand on the internet? What if your brand can have multiple meanings?  more

Internet Governance: Why Africa Should Take the Lead

Recently during an afternoon meeting with a friend of mine, Bob Ochieng, who happens to work for ICANN (Internet Corporation for Assigned Names and Numbers) Africa Operations, he lamented that at online Internet Governance discussions fora such as CircleID, and 1net.org, there is no serious frequent engagements from African Voices. This got me thinking and I realized that most African Internet Stakeholders would rather use a "wait and see approach" in matters as critical as Internet Governance. more

Topics

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days