Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

A New U.S. National Broadband Plan?

United States Senator Edward Markey (D-Mass) introduced a bill that would require that the FCC create a new National Broadband Plan by July 2021. This plan would lay out the national goals needed for broadband going forward and also provide an update on how the COVID-19 crisis has impacted Internet access. I am not a big fan of the concept of a national plan for many reasons. more

Noncommercial and Fair Use in Rebutting Claims for Abusive Registration of Domain Names

The UDRP lists three nonexclusive circumstances for rebutting lack of rights or legitimate interests in domain names, which if successful also concludes the issue of abusive registration in respondent's favor. The third circumstance is "you are making a legitimate noncommercial or fair use of the domain name without intent for commercial gain to misleadingly divert consumers or to tarnish the trademark or service mark at issue." more

Starlink Broadband Service – More on the Beta Plus Exciting Video

If you have last-generation satellite internet access, broadband from a wireless ISP (WISP), or even satellite television from DISH or DIRECTV, an installer came and carefully aimed a dish antenna for you. Starlink, a broadband access service from Elon Musk's SpaceX company, reimagines the install process and, in most cases, eliminates the need for an installer. The Starlink dish can sit on the ground or the peak of your roof; more importantly, it aims itself, as you see in the accompanying video. more

Some Observations on Reachability of Egyptian Networks and Providers

Different media are reporting that Internet and other forms of electronic communications are being disrupted in Egypt. Presumably after a government order in response to the protests. Looking at BGP data we can confirm that according to our analysis 88% of the ‘Egyptian Internet’ has fallen of the Internet. In this post I’ll share some observations I made with regards to the reachability of Egyptian networks and providers. more

AT&T Says Google Voice Not Neutral

AT&T has turned up the volume on Google Voice in a filing with the FCC. At issue is Google's decision to block calls that are routed to certain rural areas with higher than average termination costs. Google questions regulating its service - a web application - the same as traditional phone services, but AT&T's letter claims that at the end of the day, Google Voice is routing PSTN to PSTN calls. more

Threat Intelligence in Latter 2019: Overcoming the Same and New Challenges

Does threat intelligence (TI) work? I looked into that question last year, exploring the reasons why it actually doesn't and what can be done to remediate the situation. Since then, more companies have incorporated TI into their security processes, and many are still not getting the benefits they expect. What's causing the dissatisfaction? Interestingly, pretty much the same aspects... more

Turning the IT-Value Chain Upside Down

Cloud computing will turn the IT-value chain upside down. That will lead to dramatic changes in the way hardware and software is being marketed and managed. These changes will be most profound for IT departments and value added resellers (VARs), but computer manufacturers will feel the heat too. To illustrate this point we can take a high level view of where servers are being deployed. more

USA: Court Leaves FCC With Discretion to Regulate Special Access Circuits

On Friday, the decision to deregulate "special access" circuits was upheld. The case had been brought by the Ad Hoc Committee, a long standing body of large business users, one of the main categories of buyers of high capacity leased lines to interconnect business premises. more

Hello World

I've been threatening to blog for several years now. I can't recall for how many years I've left the threat open, but hopefully you'll understand given the title of this piece, that I'm prone to senior moments. For the past two years I've been immersed in Internet Governance, an area I knew precious little about before being tossed into the deep end of the pool... My current employer, PayPal (eBay), recognizes the importance of cat herding, and has formed a group that I am fortunate to be part of, that specializes in Internet Standards and Governance. more

Aircell vs. VoIP

Last week American Airlines launched their Aircell wireless Internet access on a limited number of flights. It didn't take long before a few folks tried to make voice and video calls (in violation of Aircell's terms-of-service according to their PR folks), and it didn't take long before someone figured a way around their voice/video blocking efforts. more

ICANN and the GAC - Lessons Learned Since Cartagena

Experience is the best teacher. In the interest of capturing lessons learned (and avoiding the repetition of hard experiences needlessly), it is worth highlighting what the interactions between the ICANN Board and the Governmental Advisory Committee (GAC) since Cartagena have taught. more

Registry Lock - or EPP With Two Factor Authentication

For the last couple of years, the most common attack vector against the DNS system is the attack against the registrar. Either the attack is on the software itself using weaknesses in the code that could inject DNS changes into the TLD registry, or social engineering the registrar support systems and the attacker receives credentials that in turn allows the attacker to perform malicious changes in DNS. DNSSEC is the common security mechanism that protects the DNS protocol, but by using the registrar attack, any changes will result in a proper working DNS delegation. more

Beyond WHOIS: CircleID and Edgemoor Research Institute Second Event on ‘Filling the Gaps’

Experts at a CircleID and Edgemoor Research Institute webinar debated the challenges of domain registration data access in a post-GDPR world. Panelists explored the tension between privacy laws and legitimate data requests, the role of automation in disclosure decisions, and the need for a scalable, trust-based framework to balance compliance, cybersecurity, and enforcement interests. more

Real-Time Email Recommendation Engine Part IV: Image Optimization

Before we dive into optimizing predictive analytics for images using #RealTimeML, at our neighborhood Email Service Provider, there are a few people we need to acknowledge. First, we would like to recognize the Stanford Digital Economy Lab and its managing director Christie Ko. Christie reached out to us to potentially write articles for them, and we talked about several topics in the world of Machine learning (ML). She found our blog here on CircleID and ... more

Can 5G Compete with Cable Broadband?

One of the recurring themes used to promote 5G is that wireless broadband is going to become a serious competitor to wireline broadband. There are two primary types of broadband competition - competition by price or performance. Cable companies have largely won the broadband battle in cities and suburbs, and I've been thinking about the competition that cable companies might see from 5G. more

Topics

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

DNS Security

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days