From software to network architecture, the internet is shifting from ownership to on-demand access. Subscription models now underpin the digital economy, offering scalability and agility while raising fresh questions about control, cost and compliance. more
Congestion. Traffic. Two words that draw a visceral response, whether you are commuting to work or managing a network. Managing data traffic used to be easy. Everything was housed in centralized data centers, and all traffic was routed through big, dedicated, effective but expensive "pipes" -- Multiprotocol Label Switching (MPLS) links. When all the applications are at the data center, it makes sense to build private access for all traffic. more
This year Black Friday online sales reached $1 billion for the first time. Of course, Cyber Monday is the busiest e-commerce day of them all. Sales for Cyber Monday reached $1.5 billion this year, a 30 percent increase from 2011... Website providers have been moving to cloud computing so they can instantly scale to meet increased traffic. But what happens when everyone needs to scale at the same time? more
Software-defined networking (SDN) itself represents a deconstructed view of current switching and routing architectures providing the abstractions of control from dataplane. With this newfound control, the industry is leveraging multiple virtualization strategies to build out public, private, and hybrid cloud architectures, delivering multiple new application services to the market. more
Cloud computing is on the rise. International Data Corp. predicts a $195 billion future for public cloud services in just four years. That total is for worldwide spending in 2020 - more than twice the projection for 2016 spending ($96.5 billion). As a result, companies are flocking to both large-scale and niche providers to empower cloud adoption and increase IT efficacy. The problem? Without proper management and oversight, cloud solutions can end up underperforming, hampering IT growth or limiting ROI. more
Over the past decade, cloud computing has experienced explosive growth, evolving from its nascent stage to widespread adoption and fundamentally changing how businesses and individuals use information technology. At the same time, traditional on-premise computing, while still having its use cases, has been progressively integrated with, and often even controlled by, Cloud Service Providers (CSPs) in many aspects. more
Iran's near-total internet blackout during airstrikes reveals how cyberattacks, sanctions and platform power can isolate a nation. The conflict shows digital infrastructure, satellites and cloud services becoming decisive weapons in modern geopolitical competition worldwide today. more
Thanks to wide adoption of the Infrastructure as Code (IaC) approach, programmatic provisioning of cloud resources is slowly transforming almost every aspect of computing, with administration of web apps having emerged as a key use case. With IaC, it's possible to streamline resource management tasks, shorten time-to-market, control costs, and scale at will. The adoption of continuous integration and continuous delivery (CICD) pipelines is already making a huge difference in web app deployment and cloud resource management. more
At NANOG 96, the AI boom dominated discussions as firms race to build gigawatt-scale data centres packed with advanced GPUs, liquid cooling, and lossless networks, raising fears of overinvestment, neglected security priorities, and a looming infrastructure bubble. more
Regional Internet registries, built for coordination, now sit atop scarce IPv4 assets while bearing little liability, suppressing capitalization and imposing "double extraction" that weakens operators, distorts markets and threatens the stability of global internet uniqueness. more
AWS has quietly acquired nine million more IPv4 addresses, turning internet scarcity into strategic leverage. As hyperscalers consolidate dwindling supply worldwide, IPv4 is evolving from legacy protocol into a profitable infrastructure moat for cloud giants. more
Internet number resources, once clerical entries, now underpin real economic value, exposing a mismatch between registry power and accountability, while misplaced political narratives obscure the case for decentralised, operator-led control. more
Kinetic attacks on Gulf data centres expose the cloud's physical fragility, recasting AI infrastructure as strategic targets and accelerating bunkerisation, while outdated data laws leave firms choosing between legal compliance and digital survival. more
Africa's looming AI rules expose a deeper problem: foreign-controlled infrastructure, weak enforcement capacity and externally governed data flows are eroding digital sovereignty, leaving states unable to regulate, protect citizens or meet global obligations. more
Unicorn firms lead in DNS-based security adoption, signaling technical maturity, while Global 2000 rely on enterprise registrars. Gaps in redundancy and brand protection expose supply chain risks as cyberattacks intensify across industries globally today. more