Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Mobile World Congress: 4G Technology Enters the Residential Market

We're just back from Mobile World Congress in Barcelona, Spain, where more than 85,000 attendees from over 200 countries gathered to discover what the 1,800 companies present had to showcase. As expected, some of the show's biggest themes focused on the Internet of Things, the mobile cloud, Big Data, 4G LTE and wearable devices... After speaking to a cross-section of service providers, it became clear that many operators are already starting to leverage their investment in existing 4G LTE infrastructure... more

The Cuban Home-Connectivity Trial Ends This Week, Rollout to Begin Next Week

The free home-connectivity trial in Old Havana will end this week. Two thousand homes were eligible for the trial and I was told, off the record, that 700 people have signed contracts to pay for the service. I am not certain, but my guess is that those two thousand homes are served by a single central office that has been upgraded to offer Digital Subscriber Line (DSL) connectivity. more

I’m Shocked, Shocked to Find There’s Cryptanalysis Going On Here (Your plaintext, sir.)

There's been a lot of media attention in the last few days to a wonderful research paper on the weakness of 1024-bit Diffie-Hellman and on how the NSA can (and possibly does) exploit this. People seem shocked about the problem and appalled that the NSA would actually exploit it. Neither reaction is right. In the first place, the limitations of 1024-bit Diffie-Hellman have been known for a long time. RFC 3766, published in 2004, noted that a 1228-bit modulus had less than 80 bits of strength. That's clearly too little. more

The Countdown Has Started – Here Come One-Year Digital Certificate Life Cycles

Apple announced its decision to trust only one-year digital certificates on its Safari browser in February 2020. This decision created a domino effect, with Mozilla and Google following suit; certificate providers announced they would not issue two-year certificates after Aug. 19, 2020. We wrote an article in March to help brands to prepare for this change. more

High-Performing Cloud Networks Are Critical to M2M Success

Machine to machine (M2M) communications may not be new, but with the rapid deployment of embedded wireless technology in vehicles, appliances and electronics, it is becoming a force for service providers to reckon with as droves of businesses and consumers seek to reap its benefits. By 2020, the GSM Association (GSMA) predicts that there will be 24 billion connected devices worldwide, while Forrester predicts that mobile machine interactions will exceed the number of mobile human interactions more than 30 times. more

DNSSEC Maintenance - Just Like Mowing the Lawn

DNSSEC is a hot topic. It's a technology newly unleashed on popular networking, which has led to countless articles and posts on the subject, including right here on CircleID. The way a lot of articles try to get your attention is to talk about a technology, like DNSSEC, in a way that makes the technology either seem really significant or really complicated. That is why a lot of articles about DNSSEC make it sound like something huge, complicated, and scary. But it's not. more

Most of the Time Common Sense Eventually Prevails

I have learned that lesson many times over. In many of the issues that we are facing, as a society or in our industry, I am reasonably confident that common sense will eventually prevail. Sometimes the road twists and turns, but in the end water flows around rocks. In our industry I can refer to developments we have been advocating for (structural separation, utilities-based telecoms infrastructure, broadband for social and economic benefits, ICT-based industry and sector transformation, FttH, internet as a tool for more direct democracies, etc). more

Why Integrating IPAM Matters and How to Achieve It

IPAM solutions are the source of truth for IP resources on the network, but when performing IPAM functions such as assignments, reconciliations, DNS updates, network plans, or Regional Internet Registry (RIR) requests, IPAM is often limited by its integration with an OSS. Operational teams can find it challenging to complete routine tasks without an integrated IPAM solution due to siloed data pools and swivel-chair environments. more

IP Address Space Covered by Certificates

Since the RIPE NCC launched its Resource Certification service, there is a steady increase in the number of prefixes covered by certificates. The Resource Certification (RPKI) service was launched at the beginning of 2011. The system enables network operators to perform Border Gateway Protocol (BGP) origin validation, which means that they can securely verify if a BGP route announcement has been authorised by the legitimate holder of the address block. more

Telco Stimulus Package: Australian Case Study

Most developed nations are now revisiting their telecoms policies with a view to using telecoms infrastructure as a tool to revive the economy. And when exploring this it quickly becomes clear that open networks are necessary if we are to achieve the economic benefits that the digital economy has to offer. The multiplier effect of open infrastructure is obvious. It stimulates developments in healthcare, education, energy, media and Internet -- this in stark contrast to the closed (vertically-integrated) networks that are currently operated by most incumbent telcos around the world. more

Cruz Is Back Now with a Countdown Clock To “Doomsday”

Senator Cruz' crusade against the IANA transition is back in full swing. With the deadline for the expiry of the IANA contract approaching both he and other anti-transition types have been working hard on their campaigns to block the transition. The latest addition to the Cruz website is a special lander page featuring a countdown clock... Yes, that's an image of President Obama shaking hands with China's Xi Jiping. more

The .BEST Acquisition: 3 Months After

The .BEST new gTLD Registry was acquired 3 months ago by Cyril Fremont, a French Entrepreneur from Paris, and a team of investors. I took the time to meet with Cyril in the latest ICANN63 meeting in Barcelona to ask him a few questions about his future new gTLD project, three months after it was acquired from the previous owner... .best has just released the MVP (Minimum Viable Product) of the social network. The ".best" social network will be officially present at the next Namescon... more

Correcting Federal Databases: A Procedural Guide

Federal databases, such as those being compiled by the Consumer Financial Protection Bureau and the Federal Trade Commission, contain data about many people and businesses. Although some of this data may be protected personal information (PPI), there is also extensive information in federal databases that is publicly disseminated via the internet. If the information is wrong, it has the potential to be a vector of tortious mischief. more

An Open Internet Is Critical for UN Sustainable Development Goals

In 2015, a significant focus of the United Nations will center on the future of global development, including negotiating a set of Sustainable Development Goals (SDGs) aimed at guiding policy in achieving dignity, well-being, and equality for all the world's people -- especially the poor and underserved. The currently proposed SDGs consist of an ambitious set of 17 goals and 169 specific targets. more

Apple (Not Surprisingly) is Not a Cybersquatter

It's highly unusual for a well-known trademark owner to be accused of cybersquatting, but that's what happened when a Mexican milk producer filed a complaint against Apple Inc. under the Uniform Domain Name Dispute Resolution Policy (UDRP) in an attempt to get the domain name lala.com. Not only did Apple win the case, but the panel issued a finding of "reverse domain name hijacking" (RDNH) against the company that filed the complaint. more

Topics

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

DNS Security

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days