In Tony Li's article on path MTU discovery we see this text: "The next attempt to solve the MTU problem has been Packetization Layer Path MTU Discovery (PLPMTUD). Rather than depending on ICMP messaging, in this approach, the transport layer depends on packet loss to determine that the packet was too big for the network. Heuristics are used to differentiate between MTU problems and congestion. Obviously, this technique is only practical for protocols where the source can determine that there has been packet loss. Unidirectional, unacknowledged transfers, typically using UDP, would not be able to use this mechanism. To date, PLPMTUD hasn't demonstrated a significant improvement in the situation." Tony's article is (as usual) quite readable and useful, but my specific concern here is DNS... more
Many administrators misconfigure cloud storage, such Amazon Simple Storage Service (S3) buckets, resulting in the contents being publicly-accessible. more
The Internet Engineering Task Force (IETF) is the standards body for the Internet. It is the organization that publishes and maintains the standards describing the Internet Protocol (IP -- versions 4 and 6), and all directly related and supporting protocols, such as TCP, UDP, DNS (and DNSSEC), BGP, DHCP, NDP, the list goes on, and on... But how do they do that? How does the IETF produce documents, and ensure that they are high quality, relevant, and influential? more
Microsoft has placed an experimental data center the size of a shipping container on the seafloor near Scotland's Orkney Islands to test the feasibility of saving energy by naturally cooling it in the sea. more
Researchers from Lancaster University's School of Computing and Communications have warned that the rapid growth of remote digital sensors and devices connected to the internet -- Internet of Things -- has the potential to bring unprecedented and, in principle, almost unlimited rises in energy consumed by smart technologies. more
Anyone who works in privacy is familiar with the term "data shadow": the digital record created by our transactions, our travels, our online activities. But where did the phrase come from? Who used it first? A number of authors have attributed it to Alan Westin, whose seminal book Privacy and Freedom (largely a report on the work of the Committee on Science and Law of the Association of the Bar of the City of New York) set the stage for most modern discussions of privacy. more
2016 has seen a steady flow of announcements on successful Network Functions Virtualization (NFV) Proof-of-Concept deployments, mostly focused on virtualizing Customer Premise Equipment (vCPE). This has been a relatively straight forward starting point because unlike many other NFV applications, the vCPE use case does not involve complex activities like having to scale in or out individual services. more
Google built its first Southeast Asia data center in Singapore back in 2011 and quickly expanded to a second building in 2015. more
The promise of "big data" -- real-time insights, predictive analytics and a better understanding of customer behaviors -- has many companies jumping into this near-bottomless information pool with both feet. But the sheer volume of data can cause serious stress for IT professionals trying to balance C-suite expectations, legacy tech limitations and corporate workloads. What's more, the data market is rapidly evolving. more
Last week at RSA, Bruce Schneier gave a talk on the top 3 emerging threats on the Internet. Whereas we in the security field usually talk about spam, malware and cyber crime, he talked about three meta-trends that all have the potential to be more dangerous than the cybercriminals. Here are my notes. more
The US Department of Defense is seeking private sector's help to "vault DOD" into the world of elastic computing, data management and analytics, cybersecurity, and machine learning. more
A US District Judge in Maine largely granted a motion to dismiss brought by Hannaford in a big data breach case... According to the court, around March 2008, third parties stole up to 4.2 million debit and credit card numbers, expiration dates, security codes, PIN numbers, and other information relating to cardholders "who had used debit cards and credit cards to transact purchases at supermarkets owned or operated by Hannaford." more
Experts fear European Union court case attempting to keep personal data private could backfire and prove damaging to Europe. more
Analysis could also affect liability of enterprises using cloud computing technologies... Local elected official Steinbach had an email account that was issued by the municipality. Third party Hostway provided the technology for the account. Steinbach logged in to her Hostway webmail account and noticed eleven messages from constituents had been forwarded by someone else to her political rival. more
Virgia governor Terry McAuliffe today announced Facebook will spend $750 million to establish a 970,000-square-foot data center in the White Oak Technology Park in Henrico County. more