Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

“Africa & Latin America, It’s All Huawei” – End-To-End Manufacturing Drives the Cost Down

A rival tells me how hard it is to compete with Huawei because they manufacture so many products. “We had a good opportunity at one customer. Our software is just right for them. “They wanted to buy a complete system. We bundled our software with $4 million of equipment and bid aggressively at $7 million. Huawei came in with a bid of $4 million for hardware and software combined. They manufacture their own servers at a much lower cost than he could buy servers. more

The Countdown Has Started – Here Come One-Year Digital Certificate Life Cycles

Apple announced its decision to trust only one-year digital certificates on its Safari browser in February 2020. This decision created a domino effect, with Mozilla and Google following suit; certificate providers announced they would not issue two-year certificates after Aug. 19, 2020. We wrote an article in March to help brands to prepare for this change. more

Most of the Time Common Sense Eventually Prevails

I have learned that lesson many times over. In many of the issues that we are facing, as a society or in our industry, I am reasonably confident that common sense will eventually prevail. Sometimes the road twists and turns, but in the end water flows around rocks. In our industry I can refer to developments we have been advocating for (structural separation, utilities-based telecoms infrastructure, broadband for social and economic benefits, ICT-based industry and sector transformation, FttH, internet as a tool for more direct democracies, etc). more

INET New York: Open Forum of the Copyright Alert System - Thursday 11/15

The Copyright Alert System, the result of a deal between big content and big ISPs, is a graduated response program - popularly known as the six strikes - that escalates from nastygrams, to copyright school, to Internet throttling. Just like SOPA/PIPA, enforcement targets will be arbitrarily selected by the content owners, but unlike SOPA/PIPA there will be no appeal via the courts - only to an arbitration firm hired by the program. more

High-Performing Cloud Networks Are Critical to M2M Success

Machine to machine (M2M) communications may not be new, but with the rapid deployment of embedded wireless technology in vehicles, appliances and electronics, it is becoming a force for service providers to reckon with as droves of businesses and consumers seek to reap its benefits. By 2020, the GSM Association (GSMA) predicts that there will be 24 billion connected devices worldwide, while Forrester predicts that mobile machine interactions will exceed the number of mobile human interactions more than 30 times. more

I’m Impressed by Fadi

I could have ignored yesterday's ICANN New gTLD Applicant Update Webinar and just read summaries from the usual respected news and industry sources. However, with three hours slotted and likely questions regarding ICANN CEO Fadi Chehadé's somewhat eyebrow-raising comments at the regional ICANN Registry-Registrar meeting in Amsterdam last week -- led me wanting to hear it all myself. more

IP Address Space Covered by Certificates

Since the RIPE NCC launched its Resource Certification service, there is a steady increase in the number of prefixes covered by certificates. The Resource Certification (RPKI) service was launched at the beginning of 2011. The system enables network operators to perform Border Gateway Protocol (BGP) origin validation, which means that they can securely verify if a BGP route announcement has been authorised by the legitimate holder of the address block. more

Why Integrating IPAM Matters and How to Achieve It

IPAM solutions are the source of truth for IP resources on the network, but when performing IPAM functions such as assignments, reconciliations, DNS updates, network plans, or Regional Internet Registry (RIR) requests, IPAM is often limited by its integration with an OSS. Operational teams can find it challenging to complete routine tasks without an integrated IPAM solution due to siloed data pools and swivel-chair environments. more

Privacy and the Future: Are We Good Trustees of the Internet?

Recently I was reminded of the words, "responsibilities and service to the community." To individuals involved in internet governance, these words should be well known. But have we lived by the code exemplified by these words? Have we lived up to the high standards that they represent? I have always been a student of history because it never fails to show me that humanity, on many occasions, tends to repeat the same mistakes. more

8 Domains, $9.65M: Second Applicant Auction a Success

We at Innovative Auctions were happy to see the successful completion of the second Applicant Auction earlier today. Winners will pay a total of $9,651,000 to resolve contention for eight new generic top-level domains (gTLDs). The winners for the eight contention sets included in this week's auction were... more

DNSSEC Maintenance - Just Like Mowing the Lawn

DNSSEC is a hot topic. It's a technology newly unleashed on popular networking, which has led to countless articles and posts on the subject, including right here on CircleID. The way a lot of articles try to get your attention is to talk about a technology, like DNSSEC, in a way that makes the technology either seem really significant or really complicated. That is why a lot of articles about DNSSEC make it sound like something huge, complicated, and scary. But it's not. more

Starlink’s zoomready Rating Is Going Down

zoomready is open-source shareware I wrote to measure the suitability of an internet connection for teleconferencing. As you can see above, Starlink had an average zoomready rating of 2.66 out of a possible 3.0 over the four measured days. The problem is NOT bandwidth, which has fluctuated but stayed above the minimums needed for good teleconferencing. The problems are failures (most of them short), latency, and jitter. more

More Denial of Service Attacks

There are quite a lot of NTP-amplified denial of service attacks going around at the moment targeting tech and ecommerce companies, including some in the email space. What does NTP-amplifed mean? NTP is "Network Time Protocol" - it allows computers to set their clocks based on an accurate source, and keep them accurate. It's very widely used - OS X and Windows desktops typically use it by default, and most servers should have it running. more

Nuking Silicon Valley

The new head of the U.S. Executive Branch took several actions this week that have profound collateral consequences for Silicon Valley as well as its scientific and technical communities. Presumably, he thought it was payback time for not supporting him. Perhaps he thought that producing automobiles domestically for non-Muslim U.S. citizens to drive around a walled nation is the way to future economic success. No matter, the effects of actions taken this week are the equivalent of nuking Silicon Valley. more

Here is the DNSSEC Activity at ICANN 58 in Copenhagen March 12-15, 2017

Want to learn more about the current state of DNSSEC? Want to see demos of new software to secure email? Curious about the potential impact of the Root Key Rollover happening this year? Next week in Copenhagen, Denmark, ICANN 58 will include some great technical info about DNSSEC and DANE happening in several sessions. Here is the plan... more

Topics

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

DNS Security

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days