Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Domain Name Registration: Not a Technology Service Any More?

It didn't seem to make any headlines, but it is an interesting sign of the Internet times that, effective January 1, 2009 , the United State Patent and Trademark Office ("USPTO") changed the International Classification of "domain name registration services" to Class 45 (defined below). The reason that the move is interesting is that it is just one more indication that the world of the Internet is becoming less and less about technology and more and more about law and policy. more

ITU Becomes Trans-Sectoral

Very little was said about telecommunications during the official speeches and forums at ITU Telecom World 2009. The industry is even talking about changing its focus from telecommunications to ICT [United Nations Information and Communication Technologies Task Force], Discussions are now focusing on how ICT can be used to underpin the various socio-economic developments that are taking place. more

Not World War III - This Time the ICT Revolution

In the past it has been wars and revolutions that created major changes in society. It was only after these events that old ideas, structures and doctrines gave way. And in many countries wars and revolutions are still functioning as a tool for change -- the Arab Revolution and the collapse of the Soviet Empire are good examples of this. But wars and revolutions are disruptive in an economic sense, cost the lives of many people, and necessitate costly rebuilds after the even more

Broadband in China

For years I've been hearing how we are losing the broadband battle with China, so I decided to take a look at the current state of broadband in the country. The China Internet Network Information Center (CNNIC) publishes statistics about the state of broadband in the country, and I used the Statistical Report on Internet Development in China from August 2019 in writing this blog. more

Reshaping Cyberspace: Beyond the Emerging Online Mercenaries and the Aftermath of SolarWinds

Ahmed Mansoor is an internationally recognized human rights defender based in the Middle East and recipient of the Martin Ennals Award (sometimes referred to as a "Nobel Prize for human rights"), On August 10 and 11, 2016, Mansoor received an SMS text messages on his iPhone promising "new secrets" about detainees tortured if he clicked on an included link. Instead of clicking, Mansoor sent the messages to the Canadian Citizen Lab researchers. more

Mobile Broadband Penetration in Asia

The advent of mobile broadband triggered a huge change in broadband access across Asia. Following more than a decade of strong growth in almost all mobile markets in the region, an amazing transition to new generation mobile networks and services took place. By end 2014 there were a total of 1.2 billion mobile subscribers and with annual growth running at over 40% coming into 2015 the numbers were expected to hit 1.7 billion by end-2015. more

Don’t Blame Open Recursives For DDoS Attacks and Why You Should Implement BCP38

There has been plenty of buzz and chatter on the Internet recently concerning a very large DDoS attack against CloudFlare, with coverage on their blog, the New York Times, and the BBC, among many others. While attacks of this nature are certainly nothing new, the scale of this attack was surprising, reported to hit 120Gbps. For a sense of scale, your average cable modem is only about 20Mbps, or about 0.016% of that bandwidth. more

DNSSEC Activities at ICANN 57 in Hyderabad on 4-7 November 2016

Friday marks the beginning of the ICANN 57 meeting in Hyderabad, India. As per usual there will be a range of activities related to DNSSEC or DANE. Two of the sessions will be streamed live and will be recorded for later viewing. Here is what is happening. All times below are India Standard Time (IST), which is UTC+05:30. Please do join us for a great set of sessions about how we can work together to make the DNS more secure and trusted! more

Business Logic Vulnerabilities Are the Hidden Menace in Modern Software

The first things that usually come to mind when talking about software development risks are bugs and security issues that have not been detected or those that have been discovered but left unaddressed. Some may also point out poor code quality reviews and the use of third-party components and dependencies laced with malicious code. more

Celebrating the 25Th Anniversary of the World Wide Web

Today the full original name of the World Wide Web is being seen everywhere as people all around the world join together to celebrate the 25th anniversary of the proposal that Tim Berners-Lee submitted at CERN that led to the creation of the "Web" we have today. While many of our articles here on CircleID focus more on the underlying Internet infrastructure that makes the Web possible, it's good to take a moment to reflect on - and celebrate - the amazing evolution of the Web from those very early days!  more

Bridging California’s Rural Digital Divide

A shift has occurred in agriculture: farmers are not only relying on clouds but increasingly, on the cloud. With the click of a mouse, farmers can find out which fields need water and chemical inputs in real time. The use of this technology, called precision agriculture, is helping farming become more productive, environmentally friendly and is revolutionizing how our food is cultivated. more

Electricity Utilities and IoT

More and more connected devices will require more and better electricity solutions. In many developing economies more people have ready access to a smartphone and the internet than they have access to electricity. For that reason we have seen mobile telecoms operators starting to include power solutions (mainly through distributed energy systems, using solar panels) in order to sell more phones and telecom services. This shows how important access to electricity is. more

The IANA Transition’s Terrible, Horrible, No Good, Very Bad Day

Thursday, September 8, 2016 was a terrible, horrible, no good, very bad day for the prospects of the IANA functions transition being completed by October 1, 2016. Indeed, that same date - but in 2017 - may be the earliest that the handoff from NTIA to ICANN can be completed, given what last Thursday. The day began with the announcement that Sen. Ted Cruz would be making his first Senate floor remarks since exiting the Republican Presidential race, and that the talk's focus would be a continuation and escalation of his long-standing opposition to "Obama's Internet giveaway". Shortly after 11 am, Sen. Cruz began speaking from his Senate desk... more

DNS Complexity Lessons

Recently, Bert Hubert wrote of a growing problem in the networking world: the complexity of DNS. We have two systems we all use in the Internet, DNS and BGP. Both of these systems appear to be able to handle anything we can throw at them and "keep on ticking." But how far can we drive the complexity of these systems before they ultimately fail? Bert posted a chart on the APNIC blog to illustrate the problem. more

The Threat from Within - US v. Fowler, SDFL 2010

The security vendor-phobe at the head of the conference bangs on the podium with his shoe declaring that "The greatest threat comes from within! (buy our product for your network's salvation)." Fear as a marketing strategy can never be underestimated. Particular when the fear is of the misunderstood. Media helps stoke the flames of fear-marketing with stories of fired or disgruntled IT staff who reportedly effectuate their revenge on former employers by bricking systems. more

Topics

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

DNS Security

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days