Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

ICANN’s Picture of Itself

ICANN has released its draft new budget. The document gives us a good look at how ICANN sees itself. It's arguably an internally inconsistent view. ...This budget calls for ICANN to have almost 60 staff members by the end of the next fiscal year. Expenses under this budget are predicted to be twice those of last year ($16 million v. $8 million). more

Canada: Smart Regulation, Not De-regulation

Canada's CRTC isn't as dumb as U.S. regulators who are considering ruling that the law doesn't apply where the telcos oppose it. (Title II deregulation) Canada just decided wireless needs to follow the rules. In turn, the CRTC intends to make sure the rules are reasonable. Rather than saying "never any rules," they instead try to write sensible ones. more

Can We Get More Eyes on Britain’s Largest Scam “Watch List”?

The FCA has been naming and shaming financial scam domains for decades. Its "warning list" is probably one the most extensive databases of its kind. But does it do a good enough job of actually warning people? Let us begin with the FCA website, which would not exactly get full points for user-friendliness: locating the "watch list" is a task in and of itself, to say nothing of consulting and scrutinising it. more

Nom-Com Appoints Independent and Diverse Candidates to ICANN Leadership Positions

When 72 candidates vie for 8 positions, making tough choices are inevitable. ICANN's 2005 Nominating Committee (Nom-Com) on Friday announced the selection of a diverse and independent set of nominees for important roles in ICANN, including the Board of Directors, the Generic Names Supporting Organization (GNSO), the At-Large Advisory Council (ALAC) and the Country Code Names Supporting Organization (ccNSO). more

A Quick Primer on Internet Peering and Settlements

The business world today features many complex global service activities which involve multiple interconnected service providers. Customers normally expect to execute a single paid transaction with one service provider, but many service providers may assist in the delivery of the service. These contributory service providers seek compensation for their efforts from the initial provider. However, within a system of interdependent providers a service provider may undertake both roles of primary and contributory provider, depending on the context of each individual customer transaction. more

CMO Offers Fresh View on New gTLDs: “They’re a Channel, Not Just a Label”

Several years ago, I had a very interesting conversation with a talented marketing executive from Portland, Oregon who joined the DotGreen Community, Inc. Board of Directors. When I told him about the new gTLD program, which was then under development at ICANN, Dave Maddocks immediately understood the value of what new gTLDs would mean to all businesses that have an online location. more

Comcast’s Network Management Practices: A Brief Analysis

Late last week, Comcast officially disclosed to the FCC details of its network management practices which have been a subject of considerable discussion here on CircleID. (My thanks to Threat Level from Wired.com for providing a convenient copy of Comcast's "Attachment A" in which this disclosure is made.) There's not a lot of startling disclosure in this document, but it does provide some useful concrete facts and figures. I'll quote the more interesting parts of the document here, and offer comment on it. more

Is ICANN Running a Racket?

On March 13, 2019, I published an article on CircleID, Portrait of a Single-Character Domain Name, that explored the proposed release and auction of o.com, a single-character .com domain name that was registered in 1993 and assigned to the Internet Assigned Numbers Authority (IANA) by Dr. Jon Postel. Although the National Telecommunications and Information Administration (NTIA) has since raised serious objections... more

Court Finds Anti-Malware Provider Immune Under CDA for Calling Competitor’s Product Security Threat

Plaintiff anti-malware software provider sued defendant -- who also provides software that protects internet users from malware, adware etc. -- bringing claims for false advertising under the Section 43(a) of Lanham Act, as well as other business torts. Plaintiff claimed that defendant wrongfully revised its software's criteria to identify plaintiff's software as a security threat when, according to plaintiff, its software is "legitimate" and posed no threat to users' computers. more

Increased Attacks Against ISP Networks

Netscout recently released its latest Threat Intelligence Report that documents DDoS attacks in the second half of 2024. As has been the trend for many years, the largest target of DDoS attacks has been ISP networks. There were over 8.9 million DDoS attacks documented in the second half of last year, up 12.75% over the first half of the year. more

Net Neutrality: A Net-Head View

Net neutrality is a complex issue with some strongly opposed views that at times sound more like religion than sensible argument, so this article is an attempt to provide some sense for those still not completely sure what it is all about. Be warned though, that this article is not an unbiased appraisal of the arguments, it is written from the perspective of a confirmed net-head. more

Rage Against the ICANN Machine

I'm going to do what no professional journalist should ever do: take a story at face value. So full disclosure: I have not checked the facts behind the story that sparked this little rant I'm about to embark on. But I've known the author for a number of years as being a consummate professional when it comes to reporting facts. And I've known ICANN, the organisation, for even longer. I have therefore seen first hand the organisation's ability to be at times borderline duplicitous in its attempts to reach a desired result.
 more

Verisign Will Help Strengthen Security With DNSSEC Algorithm Update

As part of Verisign's ongoing effort to make global internet infrastructure more secure, stable, and resilient, we will soon make an important technology update to how we protect the top-level domains (TLDs) we operate. The vast majority of internet users won't notice any difference, but the update will support enhanced security for several Verisign-operated TLDs and pave the way for broader adoption and the next era of Domain Name System (DNS) security measures. more

The Pros and Cons of Vectoring

Vectoring is an extension of DSL technology that employs the coordination of line signals to reduce crosstalk levels to improve performance. It is based on the concept of noise cancellation: the technology analyses noise conditions on copper lines and creates a cancelling anti-noise signal. While data rates of up to 100Mb/s are achievable, as with all DSL-based services this is distance related: the maximum available bit rate is possible at a range of about 300-400 meters. more

The Verisign Shared Registration System: A 25-Year Retrospective

Every day, there are tens of thousands of domain names registered across the globe -- often as a key first step in creating a unique online presence. Making that experience possible for Verisign-operated top-level domains (TLDs) like .com and .net is a powerful and flexible technology platform first introduced 25 years ago. more

Topics

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

DNS Security

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days