/ Most Viewed

The Growing Rate of Standalone Broadband Adoption

Parks Associates recently announced its Home Services Dashboard release, a for-pay service that tracks consumer adoption of telecom services like Internet, pay-TV, and cellphones. As part of the announcement, the company released a blog that shows that at the end of the first quarter of 2021 that 41% of US homes are buying standalone broadband - meaning broadband that's not bundled with cable TV or a home telephone. more

How Should I Present .Brand Domains in Advertising? (Part 1)

Do consumers still get confused when they see a URL without a .com (or other traditional extension)? Probably -- but I don't think anyone really knows the answer to that from a global perspective. What I do know, however, is that it's important for those of us in the new TLD industry to help our brand customers ensure that we're providing audiences with the best possible chance to identify new domains as legitimate web addresses. more

A Report on Cyber Espionage Activities of Pawn Storm Over the Past Two Years

Pawn Storm, also known as Sednit, Fancy Bear, APT28, Sofacy, and STRONTIUM, is a cyber espionage organization operating for over a decade which has been particularly aggressive in the past few years. more

PIR Reaches 11 Million .ORG Domains, Citing Growth and Online Safety Efforts

Public Interest Registry (PIR), the nonprofit managing the .ORG domain, recently announced it now oversees 11 million registrations. Jon Nevett, PIR's CEO, attributes this growth to what he describes as a "responsible" expansion, emphasizing a focus on security and community support. more

New Standard for Reverse Domain Name Hijacking

Uniform Domain-Name Dispute-Resolution Policy (UDRP) Rule 1 defines Reverse Domain Name Hijacking (RDNH) as "using the Policy in bad faith to attempt to deprive a registered domain name holder of a domain name"... There has been a mixed history in granting and denying this remedy for overreaching rights. Some Panels consider RDNH regardless whether it has been requested (even if respondent defaults in responding to the complaint); others will only consider the issue if requested. more

We NEED More Young Women to Consider Careers in Information and Communications Technologies (ICTs)

Science, technology, engineering and mathematics (STEM) careers are some of the most challenging, dynamic, and lucrative in the world. STEM fields are crucial to driving innovation and sustained economic prosperity, yet finding the right talent to make businesses sustainable appears to be harder than ever before as 2.4 million STEM jobs will be unfilled by 2018. more

Global M2M Connections Reached 195 Million in 2013, Expected to Reach 250 Million In 2014

Between 2010 and 2013, 120 million Machine to Machine (M2M) connections have been added globally reaching a total of 195 million in Q4 2013, according to a recent study by the GSMA. Globally, M2M connections account for 2.8% of total mobile connections in 2013, up from 1.4% in 2010. Global M2M connections will reach a quarter of a billion (250 million) in 2014, said the GSMA. more

Google Objects to Hostile Organized Campaign Against Android; Accusing Microsoft, Apple, and Others

Google has accused Microsoft, Oracle, Apple and other companies for waging an organized campaign against Android through "bogus patents". Google's Senior Vice President and Chief Legal Officer, David Drummond, in a blog post yesterday wrote: "I have worked in the tech sector for over two decades. Microsoft and Apple have always been at each other's throats, so when they get into bed together you have to start wondering what's going on. Here is what's happening..." more

Blocking and Filtering in Collaborative Security Context - A Reflection on RFC 7754

The other day, I planned to take my 15-year-old son to the movie theatre to see "Hateful Eight" in 70mm film format. The theatre would not allow him in. Under article 240a of the Dutch penal code, it is a felony to show a movie to a minor when that movie is rated 16 or above. Even though I think I am responsible for what my son gets to see, I understand that the rating agency put a 16-year stamp on this politically-incorrect-gun-slinging-gore-and-curse-intense-comedy feature. more

Protection Is Only One Side of the Security Coin

"Security is all about protecting the user." That's the comment that came up the other week in the twittersphere that kicked off a not-unexpected trail of pro and con tweets. Being limited to 140 characters makes it rather difficult to have a deep and meaningful discussion on the topic and the micro-blogging apparatus isn't particularly conducive to the communicating the nuances of a more detailed thought. So I thought I'd address the topic here in blog format instead. more

Apple Satellites?

Word has leaked out that Apple is working on a satellite project. The company is at the beginning of the research project, so there is no way to know exactly what they have in mind. For example, is the company considering launching satellites, or would they lease capacity from one of the other planned satellite networks? The fact that Apple is working on the concept is a good segue to discuss the many ways that satellite connectivity could be useful to Apple or other companies. more

Afghanistan Enacts Law Targeting Online Crime and Militancy

Afghanistan's President Ashraf Ghani has signed into law a cybercrime bill this week targeting online crime and militancy by groups such as the Taliban and Islamic State despite concerns it could limit free speech. more

Data Quality in the RIPE NCC Service Region

In an earlier article on CircleID, Registry Data Quality Assessment, we discussed the importance of high quality and accurate IP registry data. At that time, we focused mainly on the accuracy of legacy address space: IP addresses that were given out prior to the existence of the RIPE NCC and that are not part of the current registry system. In this article, we want to present the efforts to keep the address space that is the responsibility of the RIPE NCC up to date and well maintained. more

Bangladesh Faces Total Internet Shutdown Amid Violent Student Protests

Bangladesh is experiencing a complete internet shutdown and severe mobile service disruptions due to escalating student protests that began earlier this week. more

New TLDs: Disruptive Marketing 21st Century Style

Traditionally, top-level domains (TLDs) have been almost exclusively marketed by registries through their registrar channel. In a never-ending cycle of driving and sustaining sales, registries often resort to discounting and "promotional pricing." The competition for prime shelf space for a TLD is fierce, with sales and distribution largely controlled by the channel... In this chaotic and cluttered channel, it's not surprising that TLDs have traditionally been less than successful in defining their brand and delivering a unique value story for their product. more