Featured Blogs

Latest

Addressing 2010

It's January again, and being the start of another year, it's as good a time as any to look at the last 12 months and see what the Internet was up to in 2010. This is an update to the report prepared 12 months ago when looking at 2009, so lets see what has changed in the past 12 months in addressing the Internet, and look at how address allocation information can inform us of the changing nature of the network itself. more

New gTLDs and the Power of “Because”

Despite numerous false starts over the last decade it appears that 2011 will be the year ICANN finally implements a new generic Top-Level Domain (gTLD) process that will lead to the responsible expansion of the domain name space. One of the important remaining steps in this process will be the upcoming meeting between the ICANN Board and the Government Advisory Committee (GAC) intended to resolve a number of outstanding differences. more

New, Old and Forgotten Frames in the Network Neutrality Debate

One key reason for confusion about Network Neutrality lies in the many different and inconsistent frames used to shape the debate. The Tea Party has entered the fray by characterizing the matter primarily in terms of freedom. Republicans decry the "job killing" impact of the FCC's rules. Network Neutrality advocates appear ambivalent whether the FCC has capitulated to special interests, or shaped a pragmatic compromise. more

ICANN Board - GAC Geneva Meeting: Open to Observers?

The ICANN Board and GAC will be having a meeting in Geneva next month to resolve outstanding issues in connection with the new gTLD implementation process. Unfortunately to date details of whether this meeting will be open or closed to observers has not yet been publicly addressed. As a strong advocate toward openness and transparency I have drafted the following text which calls for the meeting to be open to observers. more

US Government Releases Two IPv6 Papers

During the last week of December, two US Government agencies released papers on IPv6. NIST released Special Publication 800-119, Guidelines for the Secure Deployment of IPv6. This comprehensive 188 page paper provides guidelines for federal agencies (and anyone else who might want to take advantage of it) to securely deploy IPv6. more

New gTLDs Will Create Tens of Thousands of New Jobs

Anyone paying attention to ICANN's public meetings in Cartagena last month would have quickly become aware of a powerful recurring theme -- fear. Despite all the substantial progress that was made on the new generic top-level domains program, and despite the generally optimistic, up-beat tone of the debate, it was ultimately fear that ruled. Specifically, the fear of governments, and their lobbyists in the intellectual property community, that the program may have an overall adverse economic impact. more

Where Every Phisher Knows Your Name

Spear phishing is the unholy love child of email spam and social engineering. It refers to when a message is specifically crafted, using either public or previously stolen information, to fool the recipient into believing that it's legitimate. This personalization is usually fairly general, like mentioning the recipient's employer (easily gleaned from their domain name.) Sometimes they address you by name. Much scarier is when they use more deeply personal information stolen from one of your contacts... more

Uptake of IPv6 in All Regions

Our recent cooperation with the OECD on IPv6 deployment inspired us to provide more IPv6 deployment statistics to a wider audience - from network operators to national governments. The result is an infographic that shows the percentage of networks or Autonomous Systems that announce one or more IPv6 prefixes in the global routing table. This metric shows how many networks have actually deployed IPv6 in a country or group of countries. more

America’s Telecoms Market in Dire Straits

In late 2008 it was my good fortune to be asked to write a number of reports on broadband and trans-sector development for the Obama Transition Team. President Obama had just won office and this team was crucial in setting the policies for the future. I gathered together a team of international experts to assist in writing these reports. I was able to do this because the revolutionary plans of the Australian government in relation to the NBN very much appealed to the Obama Team. more

Spam Volumes In 2010

I started hearing various people comment about lower spam volumes sometime in mid December. This isn't that unusual, spam volumes are highly variable and someone is always noticing that their spam load is going up or going down. The problem is extrapolating larger trends from a small selection of email addresses. more

CircleID’s Top 10 Posts for 2010

Looking back at 2010, here is the list of top ten most popular news, blogs, and industry news on CircleID in 2010 based on the overall readership of the posts (total views as of Jan 1, 2011). Congratulations to all the participants whose posts reached top readership and best wishes to the entire community for 2011. Happy New Year! more

Has the FCC Created a Stone Too Heavy for It to Lift?

After five years of bickering, the FCC passed an Open Internet Report & Order on a partisan 3-2 vote this week. The order is meant to guarantee that the Internet of the future will be just as free and open as the Internet of the past. Its success depends on how fast the Commission can transform itself from an old school telecom regulator wired to resist change into an innovation stimulator embracing opportunity. One thing we can be sure about is that the order hasn't tamped down the hyperbole that's fueled the fight to control the Internet's constituent parts for all these years. more

Email Getting a Makeover!

The New York Times recently posted an article about how email is getting a makeover and how the communication medium is being shunned by the younger crowd as they move more and more towards other platforms. If you like using email, that means you're an old fogey. When the Internet exploded in growth in 1995, email was a pretty cool commodity. Now, it's not that big a deal anymore, according to the New York Times. more

Email and Law in the News

A couple things related to the intersection of email and law happened recently. The 6th circuit court ruled that the government must have a search warrant before accessing email. The published opinion is interesting reading, not just because of the courts ruling on the law but also because of the defendant. more

How Accurate is the Routing Registry?

The Internet Routing Registry (IRR) is a globally distributed routing information database that consists of several databases run by various organisations. Network operators use the IRR to publish their routing policies and routing announcements in a way that allows other network operators to make use of the data. In addition to making Internet topology visible, the IRR is used by network operators to look up peering agreements, determine optimal policies and to configure their routers. more

Topics

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

Threat Intelligence

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days