Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

ITU’s Landmark Decisions

The ITU, through its Council acting as the executive body of the Member States, made a "landmark decision" to make available to the public "the main [WCIT] conference preparatory document" and to establish a publicly accessible page "where all stakeholders can express their opinions" on the preparatory document or other WCIT-related matters. more

The Addressing System for the Next (Wireless) Internet

I gave a talk yesterday at Northwestern called A DNS in the Air. My idea is that, in order to scale, the emerging wireless Internet needs something analogous to the domain name system (DNS) -- the infrastructure that allows you to reach sites across the Net. Billions of mobile phones, and even more billions of connected sensors and other wireless devices will completely overwhelm our current spectrum management regime. AT&T Wireless estimates we will need between 250 and 600 TIMES the current wireless capacity in 2018, less than a decade from now. more

Facebook Apps on Any Website: A Clever Move? Or a Security Nightmare?

Well, given the amount of malicious JavaScript, malware, and other possibilities to use Facebook (and other similar social networking platforms) for abuse, I certainly wouldn't categorize this news as a "clever move"... In fact, I foresee this as an extraordinarily short-sighted move with far-reaching security implications -- which will allow the levels of malicious abuse to reach new heights. more

From IPv6 Day to IPv6 Everyday

Quite a number of articles and blogs including one I contributed had IPv6 haruspices dissect the entrails and divine the future of the internet in the wake of the june 8th IPv6 World Day. It came and went with some trepidation, the internet did not go comatose and some marveled at and reported on traffic peaks they witnessed. Preparation of a keynote for the Gogonet Live conference in San Jose, provided me the opportunity to have a look at how some variables evolved since June... more

The Great Forking Bitcoins of China

Let's say I'm with the Chinese government and decide that I am tired of people evading currency controls and money laundering using Bitcoin. So we adjust the Great Firewall of China to block port 8333. We also add some proxies that allow some uncleared transactions from outside to flow into Chinese networks but not the other way and keep track of which ones we let through. Since a large fraction of the miners are inside China, and all of the hard currency exchanges are outside, this will cause a pretty serious fork. more

The Report on “Securing Cyberspace for the 44th Presidency”

A report "Securing Cyberspace for the 44th Presidency" has just been released. While I don't agree with everything it says (and in fact I strongly disagree with some parts of it), I regard it as required reading for anyone interested in cybersecurity and public policy. The analysis of the threat environment is, in my opinion, superb; I don't think I've seen it explicated better. Briefly, the US is facing threats at all levels, from individual cybercriminals to actions perpetrated by nation-states. The report pulls no punches... more

USC: Solving the Digital Divide?

Like many in the UK communications industry my colleagues and I at Entanet have been eagerly awaiting the Digital Britain report. Darren Farnden, Entanet's Head of Marketing, has posted an interesting assessment of key parts of the report at opinion.enta.net. Given the content of Darren's article I thought it would be useful to post it in full here for CircleID readers... more

What Will ICANN Do with the $135 Million It Just Got for .WEB?

ICANN has just made USD $135 million from an auction completed today (July 29, 2016) to determine who gets to operate .WEB. The auction was part of ICANN's last resort mechanism, when several parties applied for the same suffix but were unable to resolve this contention by themselves. ICANN has just more than doubled its auction proceeds in one go. more

Google Book Search Settlement: Another Digital Pandora’s Box

A very good friend of mine is an archivist with the Ontario government, and we share similar views on how technology is impacting modern life. He passed a really interesting item along that ran in yesterday's Washington Post. Some of you may be following this – Google's Book Search Settlement. I can definitely see how this has a direct bearing on the archive space, but also how it touches on a few tangents of my world – emerging communications technologies. more

Domain Registry/Registrar Cross Ownership: A Reality Check

Funny how marketplace reality can poke holes in claims and theories. A debate is raging between some existing registries (Afilias, PIR, Neustar) and registrars like ourselves over the issue of 'cross-ownership' in Top-Level Domains (TLDs). At question: should the same set of shareholders be allowed to own all or part of a registry as well as a registrar that sells names in the TLD owned by the registry? These registries are saying 'no', and one of their principal objections is they think current registrars have an unfair advantage in pursuing TLD deals. more

YouTube, the Government, and Privacy

It was just announced that every member of Congress will be able to create his or her own channel on YouTube. Viewers can go to the House or Senate home pages and navigate via a map to find the videos they're interested in. While it is good that citizens will have more insight into what their Senators and Representatives think, the way this is being done poses a serious privacy risk. more

Counter-eCrime Operations Summit (APWG) In Prague Next Week

The sixth annual Counter-eCrime Operations Summit (CeCOS VI) will engage questions of operational challenges and the development of common resources for the first responders and forensic professionals who protect consumers and enterprises from the ecrime threat every day. This year's meeting will focus on the shifting nature of cybercrime and the attendant challenges of managing that dynamic threatscape. more

Phish or Fair?

It shouldn't be a big surprise to hear that phishing is a big problem for banks. Criminals send email pretending to be a bank, and set up web sites that look a lot like a bank. One reason that phishing is possible is that e-mail has no built in security, so that if a mail message comes in purporting to be from, say, [email protected], there's no easy way to tell whether the message is really from bankofamerica.com, or from a crook. more

Fixing the Internet Might Break It Worse Than It’s Broken Now

Willis Alan Ramsey, who wrote "Muskrat Love," recorded one and only one studio album. The cognoscenti of country think it's a gem, an all time top ten. There's an apocryphal story that when Ramsey was pushed to make another record he allegedly retorted, "What's wrong with the first one?" We who use the Internet every day risk losing sight of what a miracle it is, and the openness that keeps it so miraculous... We also lose sight of the fact that even as the Internet's miracles occur, it's almost always broken or malfunctioning or threatening or worse in many places along the line. more

2016 New gTLD Year in Review (Infographic)

This post provides an overview of The 2016 New gTLD Year in Review infographic, reflecting on some of the intriguing highlights of the gTLD industry. The data analyzed within the infographic is based on the following: New Top Level Domains (TLDs) contained in the data set reflect open TLDs and exclude single registrants such as brands; For greater insight, TLDs have been separated into four quartiles or 'tiers' with tier 1 being the top 25% and tier 4 being the bottom 25%... more

Topics

DNS

Sponsored byDNIB.com

DNS Security

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days