Featured Blogs

Latest

ICANN’s Uniform Rapid Suspension: The Good, the Bad and the Ugly

With so many new gTLDs moving into their respective general availability periods, and incidents of cybersquatting beginning to appear, many companies are now looking towards the URS (Uniform Rapid Suspension) as a possible solution for quickly remediating abuse. As a reminder, domains that are the subject of a successful URS ruling are suspended for the remainder of the registration term, or can be renewed for an additional year at the current registrar. more

More Denial of Service Attacks

There are quite a lot of NTP-amplified denial of service attacks going around at the moment targeting tech and ecommerce companies, including some in the email space. What does NTP-amplifed mean? NTP is "Network Time Protocol" - it allows computers to set their clocks based on an accurate source, and keep them accurate. It's very widely used - OS X and Windows desktops typically use it by default, and most servers should have it running. more

Touching Enhanced Cooperation

A concrete plinth was lain at the foundation of durable Enhanced Cooperation this week when ISOC unveiled its IXP toolkit and portal. In simple English (which no doubt will be expanded to other languages) the soft launch modestly seeks feedback, corrections, and further input to the already pithy and instructive content. More to the point, this resource responds to one of the principle demands of those who do not recognize themselves in the multistakeholder model: how do we get our own IXP? more

Fifth Applicant Auction Concluded, 28 Contention Sets Resolved

After the successful conclusion of our fifth auction last week, the Applicant Auction has now resolved contention for a total of 28 strings. More than 20 gTLD applicants have participated in our auctions, ranging from many smaller companies with only one gTLD application in contention to large, publicly traded portfolio applicants like TLDH and Demand Media. more

Papers Now Available Publicly for W3C/IAB “Strengthening the Internet” Workshop

Want to read a wide range of views on how to strengthen the security and privacy of the Internet? Interested to hear how some of the leaders of the open standards world think we can make the Internet more secure? As I wrote about previously here on CircleID, the W3C and the Internet Architecture Board (IAB) are jointly sponsoring a workshop on "Strengthening The Internet" (STRINT) on February 28 and March 1 in London just prior to the IETF 89 meeting happening all next week. more

Uncontrolled Interruption? Dozens of “Blocked” Domains in New gTLDs Actually Delegated

The Mitigating the Risk of DNS Namespace Collisions report, just published by JAS Global Advisors, under contract to ICANN, centers on the technique of "controlled interruption," initially described in a public preview shared by Jeff Schmidt last month. With that technique, domain names that are currently on one of ICANN's second-level domain (SLD) block lists can be registered and delegated for regular use, provided that they first go through a trial period where they're mapped to a designated "test" address. more

Who Are the Major New gTLD Applicants and… (Part Four: Donuts)

Donuts is an applicant that threw the entire domain name industry into uproar due to the number of applications it submitted: 307 in total. It is hardly surprising that whenever new gTLDs are mentioned in the media that Donuts are mentioned alongside due to shear number of applications that they have submitted. There are dozens of articles in the media mixing information and opinions about Donuts. Often, they address the benefits to those registrants who are excited about the possibility of acquiring a new domain name and the threats to those who have an existing .COM domain name portfolio. more

Would It Be Selfish to Register Calzone.Pizza?

I was told recently that I should register the domain "calzone.pizza" as soon as it becomes available, even though our start-up has nothing to do with food. This is a question that a lot of businesses may be facing as they become aware of the new dots that are becoming available, like .club, .nyc and .guru. Should businesses spend money and grab their brand in all of the new domain extensions to prevent potential customer confusion, or worse - cybersquatting or phishing of their brand on the internet? What if your brand can have multiple meanings?  more

Internet Governance: Why Africa Should Take the Lead

Recently during an afternoon meeting with a friend of mine, Bob Ochieng, who happens to work for ICANN (Internet Corporation for Assigned Names and Numbers) Africa Operations, he lamented that at online Internet Governance discussions fora such as CircleID, and 1net.org, there is no serious frequent engagements from African Voices. This got me thinking and I realized that most African Internet Stakeholders would rather use a "wait and see approach" in matters as critical as Internet Governance. more

ICANN Board Approves ‘Thick’ Whois Requirement for .COM and .NET

The ICANN Board has approved the community recommendation that "the provision of Thick Whois services should become a requirement for all gTLD registries, both existing and future." We have long supported the migration from 'thin' to 'thick' Whois, which will improve both quality and ease of access to Whois data, thereby further facilitating intellectual property enforcement online. The ICANN community has debated the merits of migration from 'thin' to 'thick' Whois for years, as part of the larger Whois Review process. more

How the Cloud Has Changed Over the Past 3 Years

Cloud computing is not a new concept. Having gotten its start back in the 1960s, when computation was first envisioned as a public utility, it has been in development ever since. However, the past few years have seen more significant changes than we have seen in the entire history of the technology. In an age with ever increasing digitization of data and records, the cloud and cloud software have become unavoidable for virtually every business from small start-up initiatives to large multibillion-dollar corporations... During the past three years, we have seen the following significant developments relative to the cloud. more

1st Sealed Bid gTLD Contention Auction Completed for the String .One

The first sealed bid auction for a new gTLD contention set was completed last week for the string .One. To our knowledge this is 1st auction to be conducted by a third party other than Applicant Auction to settle a contention set and marks the first time a new gTLD contention set was settled through a "Single Sealed Bid Second Price" auction... The winning bidder for the new TLD extension was One.com of Dubai, AE, which will act as the worldwide registry for .One domains. more

ICANN’s Uncertain State: 2014

In a recent video interview conducted while he attended the World Economic Summit in Davos, Switzerland, ICANN CEO Fadi Chehade stated "legitimacy comes from accountability". That statement is correct. It is also troubling, in that many of ICANN's recent policies and activities raise serious questions regarding whether it is sufficiently accountable and therefore perceived as acting in a legitimate manner - as well as whether it is continuing to faithfully abide by the Affirmation of Commitments (AOC) it entered into when the US government terminated direct oversight of ICANN in 2009. more

NTAG Chair Blog: Odds and Endings

Imagine if the US Bureau of Labor Statistics delayed one of its reports for say, two months. No explanation. Just didn't release the employment numbers when it said it would. What if the Federal Reserve decided to say it was going to raise interest rates, but then just didn't? The global economy would be thrown into chaos. These organizations know that when you run critical infrastructure your word is part of that infrastructure. more

Keynote Speaker for Name Collisions Workshop: Bruce Schneier

There may still be a few security practitioners working in the field who didn't have a copy of Bruce Schneier's Applied Cryptography on their bookshelf the day they started their careers. Bruce's practical guide to cryptographic algorithms, key management techniques and security protocols, first published in 1993, was a landmark volume for the newly emerging field, and has been a reference to developers ever since. more

Topics

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days