Data Center

Data Center / Most Commented

Live Long and (Do Not) Prosper: Lessons and Reminders from Yesterday’s Wikipedia Outage

Yesterday's Wikipedia outage, which resulted from invalid DNS zone information, provides some good reminders about the best and worst attributes of active DNS management. The best part of the DNS is that it provides knowledgeable operators with a great tool to use to manage traffic around trouble spots on a network. In this case, Wikipedia was attempting to route around its European data center because... more

Malware and Botnet Operators Setting Up Their Own Data Centers

Dennis Fisher of Thread Post reports: "The malware writers and criminals who run botnets for years have been using shared hosting platforms and so-called bulletproof hosting providers as bases of operations for their online crimes. But, as law enforcement agencies and security experts have moved to take these providers offline, the criminals have taken the next step and begun setting up their own virtual data centers." more

Email Snooping Can Be Intrusion Upon Seclusion

Analysis could also affect liability of enterprises using cloud computing technologies... Local elected official Steinbach had an email account that was issued by the municipality. Third party Hostway provided the technology for the account. Steinbach logged in to her Hostway webmail account and noticed eleven messages from constituents had been forwarded by someone else to her political rival. more

Internet Vigilantism

Atrivo (aka Intercage), a Concord, California-based Internet hosting service, disappeared from the Internet for around two days recently. They didn't go bankrupt or suffer a physical catastrophe. Their providers simply shut them down by refusing their traffic. This might very well be the first time in history that the Internet community, a cooperative association of networks with no governing body, has collectively put someone out of business, if only briefly. more

Cloud Computing and Privacy

There has been a good deal of talk of late on the important topic of security and privacy in relation to cloud computing. Indeed there are some legitimate concerns and some work that needs to be done in this area in general, but I'm going to focus today on the latter term (indeed they are distinct -- as a CISSP security is my forte but I will talk more on this separately). more

We’re Drowning in Data - A New Kind of Memory Could Change That

As AI devours ever more information, the world faces a costly data-storage crisis. Researchers are betting etched silica glass could preserve vast archives for centuries while consuming far less energy than today's hard drives and magnetic tapes. more

The Illusion of Digital Sovereignty (Part III) - Collision, Geopolitical, Compute Concentration, Future Governance

Geopolitical fragmentation is colliding with the internet's distributed architecture, exposing how sovereign cloud concentration and AI infrastructure can weaken resilience, amplify strategic vulnerabilities, and challenge whether governance can preserve interoperability while managing dependency under stress. more

The Illusion of Digital Sovereignty (Part II) - Emergence, Sovereign AI Ecosystem, the RIR System, Number Resources

As states chase digital sovereignty through clouds, AI and localized infrastructure, the internet's globally coordinated foundations reveal a harder truth: operational continuity depends less on control than on interoperable systems built on trust and governance. more

The Illusion of Digital Sovereignty (Part I) - Cloud Infrastructure, Survivability, and the Territorialization of the Internet

Missile strikes on Gulf data centres exposed a deeper contradiction at the heart of digital sovereignty: governments seek territorial control over internet infrastructure whose resilience still depends upon globally distributed coordination and interdependence across borders. more

The Internet Has a New User - It’s Not You

AI agents are rapidly becoming primary internet users, with inference-driven traffic reshaping network demands and exposing infrastructure blind spots as latency-sensitive, machine-to-machine activity begins to outpace and outcompete human web behavior. more

The Kinetic Frontier: Lessons From Geopolitical Violence and the Bunkerization of AI Infrastructure

Kinetic attacks on Gulf data centres expose the cloud's physical fragility, recasting AI infrastructure as strategic targets and accelerating bunkerisation, while outdated data laws leave firms choosing between legal compliance and digital survival. more

Africa’s AI Governance Crisis Is Not a Regulatory Gap, It Is a Sovereignty Emergency

Africa's looming AI rules expose a deeper problem: foreign-controlled infrastructure, weak enforcement capacity and externally governed data flows are eroding digital sovereignty, leaving states unable to regulate, protect citizens or meet global obligations. more

The Rapid Evolution of Transport Lasers

Exploding internet traffic and AI demand are driving a rapid upgrade in fibre transport lasers, from early one gigabit systems to 400, 800 and even 1.6 terabit links reshaping backbone capacity worldwide as networks scale. more

NANOG 96: Gigawatt AI Data Centres and the Risk of a Bubble

At NANOG 96, the AI boom dominated discussions as firms race to build gigawatt-scale data centres packed with advanced GPUs, liquid cooling, and lossless networks, raising fears of overinvestment, neglected security priorities, and a looming infrastructure bubble. more

Using AI to Develop the Informal Sector in Africa

Artificial intelligence is transforming Africa's informal economy by improving access to finance, optimizing business operations, and helping small-scale entrepreneurs transition into the formal sector, despite challenges such as digital illiteracy and infrastructure gaps. more