Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

An Example of Effective Government Support for New Communication Technology

The October Senate Commerce, Science, and Transportation Committee hearing on the commercial satellite industry provides a current example of effective government support of new communication technology. The hearing focused on broadband access, primarily from low-Earth orbit (LEO) satellites. Witnesses from four companies - Intelsat, OneWeb, ViaSat and SpaceX - testified and the tone of the hearing was set by the opening statements of Committee Chairman John Thune and Ranking Member Bill Nelson. more

Can ICANN Please Stop Shooting Itself in the Foot?

One would think with an annual budget in excess of 60 million dollars a year and a staff of upwards of 140 (including consultants), that someone would have figured out how to prevent the organization from repeatedly shooting itself in the foot. Unfortunately not even a year of star-fish management oversight by the likes of Rod Beckstrom seems to have done the trick. Exhibit One, earlier this week on CircleID we learned about the first Root Zone DNSSEC KSK Ceremony on Wednesday 2010-06-16 in Culpeper, VA, USA. Of course given the significance of this event one would reasonably assume that ICANN might mention this somewhere on the main page of their website? more

IPv6 Medics Without Borders

At its November 5th plenary, the Canadian ICT Standards Advisory Committee approved the recommendations of the Canadian IPv6 Task Group set up by isacc in april. The 50 members of the Task Group were invited to individually produce a list of seven recommendations. Received inputs were collated, debated, ranked and ultimately distilled down to a pair of quite straightforward recommendations for immediate action. more

Are Domain Names Contract of Services or Property Rights?

There are several perspectives from which one can give various answers to the question of 'what are domain names?'. Originally the domain name system started and continues to be a human-friendly way of addressing to a set of machines or specific machine connected to the Internet. Hence, from the technical perspective, a domain name is simply an address consisting of a combination of alphanumeric and symbols to communicate with a machine which also happens to be hosting certain services in form of data and information on it. more

Restricting Anti-Virus Won’t Work

In a blog post, Stewart Baker proposed restricting access to sophisticated anti-virus software as a way to limit the development of sophisticated malware. It won't work, for many different and independent reasons. To understand why, though, it's necessary to understand how AV programs work. The most important technology used today is the "signature" - a set of patterns of bytes - of each virus. Every commercial AV program on the market operates on a subscription model... more

China Passes 900 Million Cell Phone Users!

Fascinating stats out of an article at TheNextWeb this week: China has become the first country to reach the 900 million mobile phone user milestone after amassing about 11 million mobile phone users in April alone, according to a report by the country's Ministry of Industry and Information Technology. more

Will We See IPv6-Enabled Consumer Devices at CES This Week?

What kind of IPv6 support will we see in consumer devices at the massive Consumer Electronics Show (CES) happening in Las Vegas this week? The show is already underway and much of the tech media is already writing in breathless prose about the latest tablets, notebooks and zillions of other consumer devices making their debut at CES. While the bright-shiny-object-chasing side of me definitely notices those articles, my own interest is on a deeper and far more technical level. more

Mobiles Moving Into Fixed Networks

There are often confused reports in the media about mobile and fixed broadband, with arguments that one could replace the other. Yet the reality is that they coexist and complement each other - perhaps even more so since one cannot manage without the other. Increasingly, devices such as smartphones, tablets and smart TVs are at the end of fixed lines, with a wireless (WiFi) connection between the fixed line and the device. more

Bandwidth is Bust - Managing True Fundamental Network Resources, Not Fantasy Ones

I recently shared the idea that there is a new category of network architecture, the Network of Probabilities. This differs from classical circuits (Network of Promises) or best-effort packet data (Network of Possibilities). I personally believe it's the next revolution in telecoms. What's new is that it provides a trading space for allocating contention between flows, and does this with some novel applied mathematics. more

Google Is NOT Moving Into the Mobile Phone Business

It might appear paradoxical for Google to buy a company for $12 billion and to then not move into that business, but I believe this is the strategy supporting that company's purchase of Motorola Mobility. As many have already pointed out, the value of Motorola resides in its patents. For more than a decade this company has been a fading star... more

A Sophisticated Online Counterfeit Ring

Online fakes can be a lucrative business and difficult to crack down on, due to the ease and low-cost of setting up multiple virtual storefronts and the ability to obfuscate an operation's identity. A federal lawsuit filed on March 1, 2010 by Polo Ralph Lauren and VF Corp. illustrates these points and highlights many of the intricacies of an online counterfeit ring. more

Google Engineer Ben McIlwain on Why HSTS Could Be a Perfect Fit for .Brands Security

The Google-run .app TLD was always destined to draw attention and scrutiny, from the moment it fetched a then-record ICANN auction price of $25 million. Since it reached General Availability in May it has gained more than 250,000 registrations making it one of the world's most successful TLDs. However perhaps more interesting was Google's choice to add the .app TLD and its widely used .google extension to the HTTP Strict Transport Security (HSTS) Top-Level Domain preload list, offering an unprecedented level of security for all domains under .google and .app. more

The Bandwidth Bank

This is a topic that we have discussed on several occasions over the last decade, but it now seems as though things are slowly moving forward. A new company, Intabank, has set up a service whereby its enterprise customers can pool bandwidth that the intermediate company can then use to sell to other customers; enabling organisations to monetise their network connectivity assets. more

Facebook and PGP

Facebook just announced support for PGP, an encrypted email standard, for email from them to you. It's an interesting move on many levels, albeit one that raises some interesting questions. The answers, and Facebook's possible follow-on moves, are even more interesting. The first question, of course, is why Facebook has done this. It will only appeal to a very small minority of users. Using encrypted email is not easy. more

A Financial Back-Up to Win .WINE?

Still want to protect wine Geographical Indications (GIs)? A hot potato! Where the bucket ends is still to be found and the launching of both .WINE and .VIN new gTLDs is still an issue. At least some of the three applicants are following the ICANN new gTLD applicant guidebook, working with parties interested in bringing better protection mechanism to protect wine GIs. There seems to have been an attempt which has not worked... more

Topics

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

Threat Intelligence

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days