Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Belize to Host Caribbean Peering and Interconnection Forum

Belize will host the fourth Caribbean Peering and Interconnection Forum, known as CarPIF, on June 13 and 14. Since its inception in 2015, CarPIF has brought together regional and international technology experts and telecommunications industry execs to discuss a range of topics related to Internet peering and interconnection trends, and their relevance to the Caribbean region. more

Achieving a Cyber-Reliant Infrastructure

Don't worry about the bad guys turning out the lights. Worry about everything they're stealing while the lights are still on. The theft of intellectual property ranging from Hollywood films to defense secrets is underway by cyber-criminals of various stripes. Maintaining control over intellectual property may be the single most important challenge to American economic security. Implementing a cyber-reliant infrastructure is a national challenge which crosses the traditional boundaries between economic sectors and between public and private domains. more

Debugging Legislation: PROTECT IP

There's more than a hint of theatrics in the draft PROTECT IP bill that has emerged as son-of-COICA, starting with the ungainly acronym of a name. Given its roots in the entertainment industry, that low drama comes as no surprise. Each section name is worse than the last: "Eliminating the Financial Incentive to Steal Intellectual Property Online" (Sec. 4) gives way to "Voluntary action for Taking Action Against Websites Stealing American Intellectual Property". more

Putin’s Iron Firewall Is Porous

In 1946 Winston Churchill declared that Russia had lowered an iron curtain across Europe, and in 2022 Vladimir Putin created an iron firewall between the Russian Internet and media and the rest of the world, but, like its precursor, it is porous. Information wants to be free. more

IPv6 Medics Without Borders

At its November 5th plenary, the Canadian ICT Standards Advisory Committee approved the recommendations of the Canadian IPv6 Task Group set up by isacc in april. The 50 members of the Task Group were invited to individually produce a list of seven recommendations. Received inputs were collated, debated, ranked and ultimately distilled down to a pair of quite straightforward recommendations for immediate action. more

Navigating the “Pentest” World

The demand for penetration testing and security assessment services worldwide has been growing year-on-year. Driven largely by Governance, Risk, and Compliance (GRC) concerns, plus an evolving pressure to be observed taking information security and customer privacy seriously, most CIO/CSO/CISO's can expect to conduct regular "pentests" as a means of validating their organizations or product's security. more

Update on AS Path Lengths Over Time - How Interconnected is the Internet?

With the number of ASes connected to the Internet constantly increasing, one could expect that the length of the AS paths would also increase as the network as a whole gets wider. However, this doesn't seem to be the case. Also, with IPv6 being more widely deployed, how does the interconnectedness of the IPv6 portion of the Internet compare to IPv4? more

Ignore The Chicken Littles: Let’s Give New Web Domains a Try

Before the experiment has gotten off the ground, some critics have expressed concern about applications to operate domains referring to a "generic" product or service, like .car, .book, or .app. News reports indicate that Microsoft and other Google competitors have filed complaints about Google's applications, while authors' organizations have raised questions about some of Amazon's applications. These complaints assert that giving these applicants the right to operate these new domains would provide an unfair competitive advantage. more

Telecom Policy Review Panel Calls For Net Neutrality Legal Safeguards

The Telecommunications Policy Review Panel report [Canada] was released yesterday and while the immediate reaction will no doubt focus on the recommendations for a market-oriented approach with significant changes to the CRTC, I would call attention to three other recommendations gleaned from reading the executive summary (the full document is nearly 400 pages). more

Net Neutrality Reflection

So this afternoon my charge is to lay out all the Net Neutrality (NN) issues to a bar association that doesn't have a telecom subcommittee... Cringely says that "In the end the ISPs [network providers] are going to win this [network neutrality] battle, you know. The only thing that will keep them from doing that is competition, something it is difficult to see coming along anytime soon..." more

Why the Pandemic Makes Domain Names More Valuable Than Ever

In the United States, at least 25,000 brick and mortar businesses will close in 2020 due to the Coronavirus (source: Coresight). I believe this will only be the tip of the iceberg. The businesses that fight to stay alive will become 100% dependent on the Internet to generate their revenue. No longer able to rely on foot traffic to their old brick and mortars, the popularity and brand-ability of their websites will solely dictate their ability to survive in the coming years. more

Apple’s Naked Self Interest

Any vendor in the platform business knows that their primary product is programming interfaces -- the so-called APIs that developers depend upon in order to deliver applications. The API exposes features of the platform, and differentiate applications running on that platform from all others. Lose control of the API, and you will lose control of the developer. Developers are the leading indicator for platform success. Ergo, lose the developer, lose the platform. more

How Does the Internet Industry Compare?

In an earlier CircleID post (The ISP Industry: Concentrated or Diverse?) we discussed if the ISP industry is concentrated and concluded the industry is amazingly open and varied. This time we try to identify criteria that make other economic sectors comparable to our own industry, using the global automotive manufacturing sector as an example to test our assumptions. Comparing the Internet industry with other industries is interesting, because it is quite special in a number of ways: it is transparent, keeps detailed records and values a high level of industry self-regulation. It also enables organisations to serve a global market. more

Remembering the Good Times

The most effective early email-borne viruses didn't need botnets. They didn't change your computer settings, or steal your login credentials. And they somehow convinced regular users to help them spread. The first warnings about the Good Times virus began to appear in November of 1994, and by December the warnings were seen all over as people did what the warning said, and forwarded it to all their friends. There was another outbreak the following March... more

WSJ on Wireless Network Neutrality

Today's Wall Street Journal had an interesting article (subscription required) on the current state of the wireless walled garden. It cites several recent clashes between handset vendors and cellcos over the extent to which consumers can use their phones to access non cellco content. From the article: "At stake for consumers are what services will be available on their mobile phones and whether they're free or cost a monthly fee. The wireless Web is taking off more slowly in America than overseas, and one reason is that U.S. carriers tightly control what applications are available on mobile devices..." more

Topics

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

DNS Security

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days