Featured Blogs

Latest

Types of Attack

A lot of pixels have been spilled in the last few years about "advanced persistent threats" (APT); if nothing else, any high-end company that has been penetrated wants to blame the attack on an APT. But what is an APT, other than (as best I can tell) an apparent codename for China? Do they exist? After thinking about it for a while, I came up with the following representation... more

Will We See IPv6-Enabled Consumer Devices at CES This Week?

What kind of IPv6 support will we see in consumer devices at the massive Consumer Electronics Show (CES) happening in Las Vegas this week? The show is already underway and much of the tech media is already writing in breathless prose about the latest tablets, notebooks and zillions of other consumer devices making their debut at CES. While the bright-shiny-object-chasing side of me definitely notices those articles, my own interest is on a deeper and far more technical level. more

Secret Doors in Phones and Computers

An article appeared in Computer World that alleges: in exchange for the Indian market presence" mobile device manufacturers, including RIM, Nokia, and Apple (collectively defined in the document as RINOA) have agreed to provide backdoor access on their devices. Could it be true that Nokia, RIM and Apple opened up to Government interception? more

IPv6 Riding the LTE Coattails

In June 2009 we mused in these columns about Long Term Evolution standing for Short Term Evolution as wireless networks started to drown in a data deluge. It is January 2012 and we keep our heads above the mobile data deluge, even if barely, thanks to a gathering avalanche of LTE networks. Even the wildest prognoses proved conservative as the GSMA was betting on a more 'managed' progression... more

How to Make DNS Green

The Dutch Internet registry SIDN has launched a unique program in partnership with CleanBits to identify what proportion of .nl domain names were hosted on a green or CO2-neutral basis. The results show a strong trend towards the 'greening' of the .nl internet zone. Nearly 30 per cent of .nl names were found to have green hosts. more

Cloud Computing’s Concealed Complexity

James Urquhart claims Cloud is complex - deal with it, adding that "If you are looking to cloud computing to simplify your IT environment, I'm afraid I have bad news for you" and citing his earlier CNET post drawing analogies to a recent flash crash. Cloud computing systems are complex, in the same way that nuclear power stations are complex - they also have catastrophic failure modes... more

The Case of Mobile Users’ Bandwidth Consumption and Causality

It started with a report in the New York Times, citing a study from Arieso, saying that "Top 1% of Mobile Users Consume Half of World's Bandwidth". Arieso said that part of the reason for the increase in download volumes may be Apple's Siri voice feature on the iPhone 4S which allows consumers to dictate to the phone and enter more text and data... Other news outlets picked up the story and lost all perspective. more

ICANN’s Final Preparations for New gTLDs

I think it's fair to say that ICANN is in a state of near meltdown at the moment. With less than a week to go before the new gTLD program's first application window is opened, on Thursday January 12, 2012, the amount of work being done is mind-bending. The ICANN Board held a special meeting on January 5 to determine the program's state of readiness ahead of the launch. more

IBM Predicts the Future for 2016 and It Includes No Spam

IBM published a video where it predicts what the world will look like in 2016 (see bottom of this post for the link). It includes the following five predictions. I want to start with the last one -- that junk mail (i.e., spam) will disappear. You'll need to watch the video to get the nuances of the prediction, but IBM says that in five years, Junk Mail will become a thing of the past. more

2011 Domain Name Year In Review: Top 10 Biggest Domain Stories

Who would have ever believed that .XXX would finally be approved AND launched, total domains registrations would continue to grow at 10% year over year, ICANN would be in the process of preparing for the launch of new gTLDs in the face of harsh criticism, and that both Go Daddy and Group NBT would be acquired by private equity firms. As we look back over the past year, here are the top 10 biggest domain stories of 2011. more

The 5 Stages of gTLD Shock

PCWorld lists new gTLDs among the 5 major changes facing the Internet in 2012. No doubt the sudden introduction of hundreds of new gTLDs will have a significant impact on the Internet. I postulate that users will react to new gTLDs by going through the following stages... more

In an Internet Minute

Intel sent an interesting infographic: What Happens in an Internet Minute. Looking at the traffic data, Intel asks if there is sufficient attention being paid to investment in infrastructure. Imagine the state of the network in three years, when the number of connected devices is projected to be double the world's population. Can our networks scale to handle predicted traffic and meet consumer expectations for immediate access from multiple devices? more

Advantage of Commercial Clouds vs. HPC for Scientific Research

The Department of Energy (DoE) recently came out with an excellent report, called the Magellan report, on the advantages and disadvantages of using commercial clouds versus in house High Performance Computers (HPC) for leading edge scientific research. The DoE probably supports the largest concentration of HPC facilities in the world. I agree with the report that for traditional applications such as computational chemistry, astrophysics, etc. will still need large HPC facilities. more

CircleID’s Top Ten Posts of 2011

Here are the top ten most popular news, blogs, and industry updates featured on CircleID in 2011 based on the overall readership of the posts for the year. Congratulations to all the participants whose posts reached top readership and best wishes to the entire community for 2012. Happy New Year! more

DNS Policy is Hop by Hop; DNS Security is End to End

The debate continues as to whether ISP's can effectively filter DNS results in order to protect brand and copyright holders from online infringement. It's noteworthy that there is no argument as to whether these rights holders and their properties deserve protection - nobody is saying "content wants to be free" and there is general agreement that it is harder to protect rights in the Internet era where perfect copies of can be made and distributed instantaneously. What we're debating now is just whether controlling DNS at the ISP level would work at all and whether the attempt to insert such controls would damage Secure DNS (sometimes called DNSSEC). more

Topics

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days