Featured Blogs

Latest

Papers Now Available Publicly for W3C/IAB “Strengthening the Internet” Workshop

Want to read a wide range of views on how to strengthen the security and privacy of the Internet? Interested to hear how some of the leaders of the open standards world think we can make the Internet more secure? As I wrote about previously here on CircleID, the W3C and the Internet Architecture Board (IAB) are jointly sponsoring a workshop on "Strengthening The Internet" (STRINT) on February 28 and March 1 in London just prior to the IETF 89 meeting happening all next week. more

Uncontrolled Interruption? Dozens of “Blocked” Domains in New gTLDs Actually Delegated

The Mitigating the Risk of DNS Namespace Collisions report, just published by JAS Global Advisors, under contract to ICANN, centers on the technique of "controlled interruption," initially described in a public preview shared by Jeff Schmidt last month. With that technique, domain names that are currently on one of ICANN's second-level domain (SLD) block lists can be registered and delegated for regular use, provided that they first go through a trial period where they're mapped to a designated "test" address. more

Who Are the Major New gTLD Applicants and… (Part Four: Donuts)

Donuts is an applicant that threw the entire domain name industry into uproar due to the number of applications it submitted: 307 in total. It is hardly surprising that whenever new gTLDs are mentioned in the media that Donuts are mentioned alongside due to shear number of applications that they have submitted. There are dozens of articles in the media mixing information and opinions about Donuts. Often, they address the benefits to those registrants who are excited about the possibility of acquiring a new domain name and the threats to those who have an existing .COM domain name portfolio. more

Would It Be Selfish to Register Calzone.Pizza?

I was told recently that I should register the domain "calzone.pizza" as soon as it becomes available, even though our start-up has nothing to do with food. This is a question that a lot of businesses may be facing as they become aware of the new dots that are becoming available, like .club, .nyc and .guru. Should businesses spend money and grab their brand in all of the new domain extensions to prevent potential customer confusion, or worse - cybersquatting or phishing of their brand on the internet? What if your brand can have multiple meanings?  more

Internet Governance: Why Africa Should Take the Lead

Recently during an afternoon meeting with a friend of mine, Bob Ochieng, who happens to work for ICANN (Internet Corporation for Assigned Names and Numbers) Africa Operations, he lamented that at online Internet Governance discussions fora such as CircleID, and 1net.org, there is no serious frequent engagements from African Voices. This got me thinking and I realized that most African Internet Stakeholders would rather use a "wait and see approach" in matters as critical as Internet Governance. more

ICANN Board Approves ‘Thick’ Whois Requirement for .COM and .NET

The ICANN Board has approved the community recommendation that "the provision of Thick Whois services should become a requirement for all gTLD registries, both existing and future." We have long supported the migration from 'thin' to 'thick' Whois, which will improve both quality and ease of access to Whois data, thereby further facilitating intellectual property enforcement online. The ICANN community has debated the merits of migration from 'thin' to 'thick' Whois for years, as part of the larger Whois Review process. more

How the Cloud Has Changed Over the Past 3 Years

Cloud computing is not a new concept. Having gotten its start back in the 1960s, when computation was first envisioned as a public utility, it has been in development ever since. However, the past few years have seen more significant changes than we have seen in the entire history of the technology. In an age with ever increasing digitization of data and records, the cloud and cloud software have become unavoidable for virtually every business from small start-up initiatives to large multibillion-dollar corporations... During the past three years, we have seen the following significant developments relative to the cloud. more

1st Sealed Bid gTLD Contention Auction Completed for the String .One

The first sealed bid auction for a new gTLD contention set was completed last week for the string .One. To our knowledge this is 1st auction to be conducted by a third party other than Applicant Auction to settle a contention set and marks the first time a new gTLD contention set was settled through a "Single Sealed Bid Second Price" auction... The winning bidder for the new TLD extension was One.com of Dubai, AE, which will act as the worldwide registry for .One domains. more

ICANN’s Uncertain State: 2014

In a recent video interview conducted while he attended the World Economic Summit in Davos, Switzerland, ICANN CEO Fadi Chehade stated "legitimacy comes from accountability". That statement is correct. It is also troubling, in that many of ICANN's recent policies and activities raise serious questions regarding whether it is sufficiently accountable and therefore perceived as acting in a legitimate manner - as well as whether it is continuing to faithfully abide by the Affirmation of Commitments (AOC) it entered into when the US government terminated direct oversight of ICANN in 2009. more

NTAG Chair Blog: Odds and Endings

Imagine if the US Bureau of Labor Statistics delayed one of its reports for say, two months. No explanation. Just didn't release the employment numbers when it said it would. What if the Federal Reserve decided to say it was going to raise interest rates, but then just didn't? The global economy would be thrown into chaos. These organizations know that when you run critical infrastructure your word is part of that infrastructure. more

Keynote Speaker for Name Collisions Workshop: Bruce Schneier

There may still be a few security practitioners working in the field who didn't have a copy of Bruce Schneier's Applied Cryptography on their bookshelf the day they started their careers. Bruce's practical guide to cryptographic algorithms, key management techniques and security protocols, first published in 1993, was a landmark volume for the newly emerging field, and has been a reference to developers ever since. more

Lead With Privacy and Customers Will Follow

From high-profile data breaches to increasingly sophisticated tracking systems, the issue of consumer privacy is earning a lot of headlines these days. To better protect their personal privacy, many consumers are taking matters into their own hands. A Forrester Consulting survey revealed that one-third of consumers polled admitted to using do-not-track tools and ad blockers to protect their online privacy, while another 25 percent have cancelled at least one online transaction after reading the seller's privacy policy. more

It Is Payback Time! - Government of Sweden on Internet Governance

Today is a wonderful day for us working with Internet Governance that do believe in an Open Internet and multi stakeholder model for its governance. FTTH Council is having its annual meeting in Stockholm, Sweden, and the IT Minister, Anna-Karin Hatt, made an opening speech that was among the strongest I have heard from any country. Yes, any country. And I do not even know if any organization have said such strong things. more

Anyone Who Still Thinks IPv6 Won’t Happen Clearly Isn’t Watching the Measurements

Anyone who still is using the "I'll-just-wait-on-IPv6-because-it-will-never-happen" approach is clearly NOT watching the measurements. First, there was the news last week that Google's IPv6 measurement had crossed over 3% less than five months after crossing the 2% mark. Then today comes word from the World IPv6 Launch measurements program that the February 2014 measurements are up... more

Designing Effective Regulation for IPv6 Adoption

So you are the IT regulator for a country and you are convinced that the shortage of IPv4 address space represents a threat to the development of the Internet in your country and you want to do something about it. Being that as regulator you don't really run the countries IP networks, what can you really do? I've heard many regulators in over 30 countries grapple with this problem. The purpose of this article is to think through some ideas to guide action on using (or not) regulation to drive IPv6 adoption. more

Topics

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

Threat Intelligence

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days