Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Internet Governance: Why Africa Should Take the Lead

Recently during an afternoon meeting with a friend of mine, Bob Ochieng, who happens to work for ICANN (Internet Corporation for Assigned Names and Numbers) Africa Operations, he lamented that at online Internet Governance discussions fora such as CircleID, and 1net.org, there is no serious frequent engagements from African Voices. This got me thinking and I realized that most African Internet Stakeholders would rather use a "wait and see approach" in matters as critical as Internet Governance. more

Email in the World’s Languages - Part I

Back when the Internet was young end servers came with shovels (for the coal), everyone on the net spoke English, and all the e-mail was in English. To represent text in a computer, each character needs to have a numeric code. The most common code set was (and is) ASCII, which is basically the codes used by the cheap, reliable Teletype printing terminals everyone used as their computer consoles. ASCII is a seven bit character code, code values 0 through 127, and it includes upper and lower case letters and a reasonable selection of punctuation adequate for written English. more

Knowing Less

The announcement yesterday morning in the Times that New York State AG Andrew Cuomo had reached an agreement with three US network operators (Verizon, Sprint, and Time Warner) about blocking child pornography was both less and more important than it appeared. It's less important in that part of the agreement covers something ISPs already do... more

Amount of Unsolicited Internet Traffic Reflecting Situation in Libya

During the recent political unrest in the Middle East, researchers have observed significant changes in Internet traffic and connectivity. Typically people look at routing data, latencies when connecting to sites and search and query statistics. Here we show results from a previously unused source of data: unsolicited Internet traffic arriving from Libya. The traffic data we captured shows distinct changes in unsolicited traffic patterns since 17 February 2011. more

Mitigating Harm Caused by the ICANN “Draw”

The gTLD Prioritization "Draw" was a mistake. But its negative impact can still be mitigated. The best course of action follows directly from information that can be gleaned from available data. Let us start with the latest piece of intelligence: who "played" in the "Draw"? 1766 of 1917 applications had a lottery ticket. This is much worse than expected. Very few abstained. Even the purely defensive applicants saw no other choice but to "play". more

EFF Files Brief in Support of Email Privacy

The Electronic Frontier Foundation (EFF) has submitted a friend-of-the-court brief in a case that could have a profound effect on the privacy of Internet communications. The brief argues that the decision in US v. Councilman, soon to be reheard by the full First Circuit, should be overturned. more

ICANN’s At-Large Process: Exit, Without Voice

ICANN seems to be out to re-prove Hirschman's theories of exit, voice, and loyalty by driving all of its good people to exit rather than giving them meaningful voices. Thomas Roessler, a long-time advocate of individual users' interests on the interim ALAC now suggests it's Time to Reconsider the structure of ICANN's At-Large, as he feels compelled to promise himself not to get involved with ICANN again... more

Old New Telco Thinking

Ahh, so the telecom incumbents have come up with a "new" idea for the Internet -- usage-based pricing. That's right, more usage (for things like VOIP and video especially) means more costs to operate the network, so users should pay by the bit, or some similar metric. It's all so logical! But wait a minute. I thought what sparked the consumer Internet revolution was the fact that ISPs didn't charge by the minute, but offered flat-rate monthly fees. And what catalyzed the boom in cellular usage here in the US was the shift from heavily usage-based pricing to the largely flat rates we see today... more

Blockchain Domains and What They Could Mean for Online Scams and Brand Protection

Blockchain domain names, domains that are stored on blockchain or cryptocurrency exchanges, are part of a growing, unregulated, and decentralized internet. Right now, blockchain domains are used mostly by cryptocurrency users, but they are growing in popularity - the Ethereum name service reported over 2.2 million .eth domain name registrations in 2022. At the same time, crypto scams are also exploding, reaching a total of $3.5 billion in losses in 2022. more

7 Must Have Attributes of an IP Address Management System

Exponential growth of networks combined with the complexity introduced by IT initiatives e.g. VoIP, Cloud computing, server virtualization, desktop virtualization, IPv6 and service automation has required network teams to look for tools to automate IP address management (IPAM). Automated IPAM tools allow administrators to allocate subnets, allocate/track/reclaim IP addresses and provide visibility into the networks. Here are some examples of what a typical IPAM tool can do... more

New CIRA Whois Policy Strikes Balance Between Privacy and Access

My weekly technology law column focuses this week on the new CIRA whois policy that is scheduled to take effect on June 10, 2008. The whois issue has attracted little public attention, yet it has been the subject of heated debate within the domain name community for many years. It revolves around the whois database, a publicly accessible, searchable list of domain name registrant information (as in "who is" the registrant of a particular domain name). more

Internet Governance and the Universal Declaration of Human Rights, Part 8: Articles 22-25

This article is Part 8 of the series of articles discussing human rights in the digital age and published here on CircleID.2 When we commenced this analysis of the UDHR, and the relevance of its principles to our rights and duties within the Internet ecosystem, we committed ourselves to work through the UDHR one Article at a time. With this Part 8 we are four-fifths through that task. more

Deep Packet Inspection: When the Man-In-The-Middle Wants Money

Say you're walking down the sidewalk having a talk with your best friend about all kinds of things. What if you found out later that the sidewalk you were using wasn't really a sidewalk -- but instead a kind of false-front giant copying machine, unobstrusively vacuuming up what you were saying and adding to its database of information about you? Or, say you send a letter to a client of yours (to the extent you still do this), and it turns out later that your letter was intercepted, steamed open, and the contents were read... more

Why New TLDs Don’t Change a Thing

I have a heard a lot lately about ICANN unanimously voting in favor or relaxing top level domain rules and had a few people come to me and ask 'how does that affect what you do?' The short answer is, it won't; at least not for a long time and here is why... There might be some huge potential gain if all shoe companies got .shoes and branded it, but someone would have to manage it and each would have to spend money to brand .shoes to consumers. Adidas gets adidas.shoes but spends nothing to brand it and lets Nike pay to brand .shoes and Reebok to brand it as well and leech. So instead of cartel like behavior (which is hard to maintain), we fall back into .com more

The Demand and Supply Imbalance in Telecoms

You can't open a newspaper today, listen to the radio, or watch TV without hearing about the enormous explosion in the use of telecommunications technology - be it fixed or mobile broadband, the internet, social media, smartphones, tablets, wearables, IoT, cloud computing, the list is endless... Yet, at the same time, many telcos and ISPs are struggling to maintain their profitability. This defies economic logic. more

Topics

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Threat Intelligence

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days