<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
  xmlns:dc="http://purl.org/dc/elements/1.1/"
  xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
  xmlns:admin="http://webns.net/mvcb/"
  xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
  xmlns:content="http://purl.org/rss/1.0/modules/content/">

Third segment: artificial-intelligence
  
  <channel>

  <title><![CDATA[CircleID]]></title>
  <link>https://circleid.com/topics/artificial-intelligence</link>
  <description>CircleID - Artificial Intelligence</description>
  <dc:language>en</dc:language>
  <dc:rights>Copyright 2026, unless where otherwise noted.</dc:rights>
  <dc:date>2026-04-30T19:14:00+00:00</dc:date>

  
    <item>
      <title><![CDATA[IP Reputation for AI Teams: The Infrastructure Concept Nobody Explains]]></title>
      <link>https://circleid.com/posts/ip&#45;reputation&#45;for&#45;ai&#45;teams&#45;the&#45;infrastructure&#45;concept&#45;nobody&#45;explains</link>
      <guid isPermaLink="true">https://circleid.com/posts/ip&#45;reputation&#45;for&#45;ai&#45;teams&#45;the&#45;infrastructure&#45;concept&#45;nobody&#45;explains</guid>

      <description><![CDATA[As AI agents scale, IP reputation emerges as a hidden constraint, shaping access to external systems and degrading performance. Managing network identity, not just models, is becoming essential for reliable data collection.]]></description>
      <dc:date>2026-04-28T11:14:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[The Internet Has a New User - It&#8217;s Not You]]></title>
      <link>https://circleid.com/posts/the&#45;internet&#45;has&#45;a&#45;new&#45;user&#45;its&#45;not&#45;you</link>
      <guid isPermaLink="true">https://circleid.com/posts/the&#45;internet&#45;has&#45;a&#45;new&#45;user&#45;its&#45;not&#45;you</guid>

      <description><![CDATA[AI agents are rapidly becoming primary internet users, with inference-driven traffic reshaping network demands and exposing infrastructure blind spots as latency-sensitive, machine-to-machine activity begins to outpace and outcompete human web behavior.]]></description>
      <dc:date>2026-04-21T11:21:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[The Domain Universe in 2026: AI, Security, Market Maturity, and the New gTLD Frontier]]></title>
      <link>https://circleid.com/posts/the&#45;domain&#45;universe&#45;in&#45;2026&#45;ai&#45;security&#45;market&#45;maturity&#45;and&#45;the&#45;new&#45;gtld&#45;frontier</link>
      <guid isPermaLink="true">https://circleid.com/posts/the&#45;domain&#45;universe&#45;in&#45;2026&#45;ai&#45;security&#45;market&#45;maturity&#45;and&#45;the&#45;new&#45;gtld&#45;frontier</guid>

      <description><![CDATA[Domains enter a mature phase as AI reshapes discovery, security sharpens, and new gTLDs expand. Once simple addresses, they are becoming critical infrastructure for identity, trust, and automated commerce in the evolving web.]]></description>
      <dc:date>2026-04-20T12:32:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Domains: The Overlooked Frontline in IP Protection]]></title>
      <link>https://circleid.com/posts/domains&#45;the&#45;overlooked&#45;frontline&#45;in&#45;ip&#45;protection</link>
      <guid isPermaLink="true">https://circleid.com/posts/domains&#45;the&#45;overlooked&#45;frontline&#45;in&#45;ip&#45;protection</guid>

      <description><![CDATA[Domains have quietly become the primary entry point for online IP infringement, yet most firms lack visibility over portfolios, leaving brands exposed and prompting a shift toward integrated, proactive domain governance and security.]]></description>
      <dc:date>2026-04-15T13:22:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[The Kinetic Frontier: Lessons From Geopolitical Violence and the Bunkerization of AI Infrastructure]]></title>
      <link>https://circleid.com/posts/the&#45;kinetic&#45;frontier&#45;lessons&#45;from&#45;geopolitical&#45;violence&#45;and&#45;the&#45;bunkerization&#45;of&#45;ai&#45;infrastructure</link>
      <guid isPermaLink="true">https://circleid.com/posts/the&#45;kinetic&#45;frontier&#45;lessons&#45;from&#45;geopolitical&#45;violence&#45;and&#45;the&#45;bunkerization&#45;of&#45;ai&#45;infrastructure</guid>

      <description><![CDATA[Kinetic attacks on Gulf data centres expose the cloud's physical fragility, recasting AI infrastructure as strategic targets and accelerating bunkerisation, while outdated data laws leave firms choosing between legal compliance and digital survival.]]></description>
      <dc:date>2026-04-08T12:45:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Africa&#8217;s AI Governance Crisis Is Not a Regulatory Gap, It Is a Sovereignty Emergency]]></title>
      <link>https://circleid.com/posts/africas&#45;ai&#45;governance&#45;crisis&#45;is&#45;not&#45;a&#45;regulatory&#45;gap&#45;it&#45;is&#45;a&#45;sovereignty&#45;emergency</link>
      <guid isPermaLink="true">https://circleid.com/posts/africas&#45;ai&#45;governance&#45;crisis&#45;is&#45;not&#45;a&#45;regulatory&#45;gap&#45;it&#45;is&#45;a&#45;sovereignty&#45;emergency</guid>

      <description><![CDATA[Africa's looming AI rules expose a deeper problem: foreign-controlled infrastructure, weak enforcement capacity and externally governed data flows are eroding digital sovereignty, leaving states unable to regulate, protect citizens or meet global obligations.]]></description>
      <dc:date>2026-04-08T09:28:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Five Things the UN Permanent Mechanism on Cybersecurity Must Actually Deliver]]></title>
      <link>https://circleid.com/posts/five&#45;things&#45;the&#45;un&#45;permanent&#45;mechanism&#45;on&#45;cybersecurity&#45;must&#45;actually&#45;deliver</link>
      <guid isPermaLink="true">https://circleid.com/posts/five&#45;things&#45;the&#45;un&#45;permanent&#45;mechanism&#45;on&#45;cybersecurity&#45;must&#45;actually&#45;deliver</guid>

      <description><![CDATA[The UN's new permanent cybersecurity mechanism promises continuity after decades of fleeting forums, yet risks irrelevance unless states enforce existing law, bridge cybercrime divides, address AI threats, build practical capacity, and include non-state expertise meaningfully.]]></description>
      <dc:date>2026-03-30T08:48:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[The Vibe-Coding Revolution: How AI is Reshaping Domain Registration]]></title>
      <link>https://circleid.com/posts/the&#45;vibe&#45;coding&#45;revolution&#45;how&#45;ai&#45;is&#45;reshaping&#45;domain&#45;registration</link>
      <guid isPermaLink="true">https://circleid.com/posts/the&#45;vibe&#45;coding&#45;revolution&#45;how&#45;ai&#45;is&#45;reshaping&#45;domain&#45;registration</guid>

      <description><![CDATA[AI-powered "vibe-coding" is transforming domain registration from manual search into automated, conversational infrastructure, embedding domains directly into software workflows while elevating them into machine-verified trust anchors in an increasingly AI-mediated internet.]]></description>
      <dc:date>2026-03-24T13:27:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[The AI Naming Gap - and Why the Legacy Namespace Won&#8217;t Wait for ICANN to Fill It]]></title>
      <link>https://circleid.com/posts/the&#45;ai&#45;naming&#45;gap&#45;a&#45;and&#45;why&#45;the&#45;legacy&#45;namespace&#45;wont&#45;wait&#45;for&#45;icann&#45;to&#45;fill&#45;it</link>
      <guid isPermaLink="true">https://circleid.com/posts/the&#45;ai&#45;naming&#45;gap&#45;a&#45;and&#45;why&#45;the&#45;legacy&#45;namespace&#45;wont&#45;wait&#45;for&#45;icann&#45;to&#45;fill&#45;it</guid>

      <description><![CDATA[A surge in AI startups has exposed a domain-name shortage as premium .ai addresses vanish. With ICANN's next round years away, legacy TLDs and repurposed namespaces are racing to capture unmet demand.]]></description>
      <dc:date>2026-03-23T12:02:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Greater Cyber Resilience Through AI: eco - Association Publishes 5-Step Plan for Companies]]></title>
      <link>https://circleid.com/posts/greater&#45;cyber&#45;resilience&#45;through&#45;ai&#45;eco&#45;association&#45;publishes&#45;5&#45;step&#45;plan&#45;for&#45;companies</link>
      <guid isPermaLink="true">https://circleid.com/posts/greater&#45;cyber&#45;resilience&#45;through&#45;ai&#45;eco&#45;association&#45;publishes&#45;5&#45;step&#45;plan&#45;for&#45;companies</guid>

      <description><![CDATA[eco Association of the Internet Industry releases a white paper outlining a five-step framework to help companies integrate AI securely, counter emerging threats like deepfakes and phishing, and strengthen cyber resilience.]]></description>
      <dc:date>2026-03-13T09:49:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Iran&#8217;s Digital Arsenal: When Invisible Fences Rise in the Conflict]]></title>
      <link>https://circleid.com/posts/irans&#45;digital&#45;arsenal&#45;when&#45;invisible&#45;fences&#45;rise&#45;in&#45;the&#45;conflict</link>
      <guid isPermaLink="true">https://circleid.com/posts/irans&#45;digital&#45;arsenal&#45;when&#45;invisible&#45;fences&#45;rise&#45;in&#45;the&#45;conflict</guid>

      <description><![CDATA[Iran's near-total internet blackout during airstrikes reveals how cyberattacks, sanctions and platform power can isolate a nation. The conflict shows digital infrastructure, satellites and cloud services becoming decisive weapons in modern geopolitical competition worldwide today.]]></description>
      <dc:date>2026-03-12T09:35:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[How Bad Actors Are Leveraging DNS: Looking at the Latest Trends]]></title>
      <link>https://circleid.com/posts/how&#45;bad&#45;actors&#45;are&#45;leveraging&#45;dns&#45;looking&#45;at&#45;the&#45;latest&#45;trends</link>
      <guid isPermaLink="true">https://circleid.com/posts/how&#45;bad&#45;actors&#45;are&#45;leveraging&#45;dns&#45;looking&#45;at&#45;the&#45;latest&#45;trends</guid>

      <description><![CDATA[Bad actors are exploiting DNS with growing sophistication. New domains dominate threat infrastructure, daily user exposures are rising, and AI is accelerating attack creation, making DNS intelligence an increasingly critical early-warning system for modern cyber defence.]]></description>
      <dc:date>2026-03-11T09:04:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[The Rapid Evolution of Transport Lasers]]></title>
      <link>https://circleid.com/posts/the&#45;rapid&#45;evolution&#45;of&#45;transport&#45;lasers</link>
      <guid isPermaLink="true">https://circleid.com/posts/the&#45;rapid&#45;evolution&#45;of&#45;transport&#45;lasers</guid>

      <description><![CDATA[Exploding internet traffic and AI demand are driving a rapid upgrade in fibre transport lasers, from early one gigabit systems to 400, 800 and even 1.6 terabit links reshaping backbone capacity worldwide as networks scale.]]></description>
      <dc:date>2026-03-09T10:26:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[The IRP Docket Speaks Louder Than Theory - A Response to Charles Mok on ICANN and AI Governance]]></title>
      <link>https://circleid.com/posts/the&#45;irp&#45;docket&#45;speaks&#45;louder&#45;than&#45;theory&#45;response&#45;to&#45;charles&#45;mok&#45;on&#45;icann&#45;and&#45;ai&#45;governance</link>
      <guid isPermaLink="true">https://circleid.com/posts/the&#45;irp&#45;docket&#45;speaks&#45;louder&#45;than&#45;theory&#45;response&#45;to&#45;charles&#45;mok&#45;on&#45;icann&#45;and&#45;ai&#45;governance</guid>

      <description><![CDATA[A critique of ICANN's multi-stakeholder model argues that its accountability record, revealed through more than a dozen IRP disputes, shows structural failures that should caution policymakers seeking institutional blueprints for governing artificial intelligence systems globally.]]></description>
      <dc:date>2026-03-06T09:23:00-08:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[The Ghost Asset on Telco Balance Sheets: Using IPv4 to Fund the AI Transition]]></title>
      <link>https://circleid.com/posts/the&#45;ghost&#45;asset&#45;on&#45;telco&#45;balance&#45;sheets&#45;using&#45;ipv4&#45;to&#45;fund&#45;the&#45;ai&#45;transition</link>
      <guid isPermaLink="true">https://circleid.com/posts/the&#45;ghost&#45;asset&#45;on&#45;telco&#45;balance&#45;sheets&#45;using&#45;ipv4&#45;to&#45;fund&#45;the&#45;ai&#45;transition</guid>

      <description><![CDATA[Hidden on telecom balance sheets, legacy IPv4 address space is emerging as a monetizable asset. Leasing underutilized blocks can generate recurring cash flow that helps fund AI infrastructure, modernization, and network investment without increasing debt.]]></description>
      <dc:date>2026-03-05T08:32:00-08:00</dc:date>
    </item>
  

  </channel>
  

</rss>