I gave a talk yesterday at Northwestern called A DNS in the Air. My idea is that, in order to scale, the emerging wireless Internet needs something analogous to the domain name system (DNS) -- the infrastructure that allows you to reach sites across the Net. Billions of mobile phones, and even more billions of connected sensors and other wireless devices will completely overwhelm our current spectrum management regime. AT&T Wireless estimates we will need between 250 and 600 TIMES the current wireless capacity in 2018, less than a decade from now. more
A very good friend of mine is an archivist with the Ontario government, and we share similar views on how technology is impacting modern life. He passed a really interesting item along that ran in yesterday's Washington Post. Some of you may be following this – Google's Book Search Settlement. I can definitely see how this has a direct bearing on the archive space, but also how it touches on a few tangents of my world – emerging communications technologies. more
China as a nation with a population of 1.3 billion people, represents over a fifth of the whole world and for this reason, if not for any other, we need to sit up and listen to anything that China says, though a lot of what China says may be disagreeable. China unambiguously stated its position during the Internet Governance Forum (IGF) Open Consultations at Geneva on May 13. On this instance, I consider the views expressed by China largely respectable, but needs to be bridged in some areas. more
During a presentation at the Interop Conference currently ongoing in Los Vegas, Mike Repass, Product Manager at Google, informed the audience that a new cloud storage service will be rolled out by Google within weeks. The role out is part of Google's expansion of its AppEngine platform which is said to offer similar security infrastructure as Gmail and Google Apps. "[T]he app partitioning and isolation are the same best of breed technology approaches that Google is developing for the rest of its customer base," Repass said. more
The RIPE NCC today announced the launch of the IPv6 Act Now! website. RIPE NCC, a Regional Internet Registry (RIR) for Europe, the Middle East and parts of Central Asia, calls the website a one-stop destination on IPv6 where everyone can understand and provide a variety of useful information aimed at promoting the global adoption of IPv6. "The site is for anyone with an interest in IPv6, including network engineers, company directors, law enforcement agencies, government representatives and civil society." more
As someone closely involved with the Australian National Broadband Network (NBN) and many other fibre plans around the globe, I would like to provide an inside picture of the revolutionary developments that are taking place in the Australian broadband market. Australia's national broadband network will be an FttH-based open wholesale network -- a network that will connect (not pass) 90% of all Australians to fibre, with the remaining 10% of the population being linked to that network through technologies that are capable of delivering equivalent services. more
A recent paper released by by Urs Hölzle and Luiz André Barroso of Google's infrastructure design and operations team provides an introduction into today's high scale computing along with factors influencing their design, operation, and cost structure. From the abstract: "As computation continues to move into the cloud, the computing platform of interest no longer resembles a pizza box or a refrigerator, but a warehouse full of computers. These new large datacenters are quite different from traditional hosting facilities of earlier times and cannot be viewed simply as a collection of co-located servers..." more
One of the WIPO decisions published today relates to gillette.ro. The registrant (respondent) didn't make any submissions in their defence, so the decision could have been quite banal. However some of the panelist's comments under the "Registered and Used in Bad Faith" section are quite interesting... more
Across the Internet, yesterday, Google users twittered, blogged and emailed that Google search and mail were not usable. And, yesterday afternoon, on Google’s official blog, Urs Hoelzle reported that Google “direct[ed] some […] web traffic through Asia”... Even though Google is very well-connected to a diverse set of other networks, two of these relationships predominate. It is through these relationships that much of the Internet reaches Google... more
Picture this: the still state-owned (51% of shares) Belgian incumbent telecom and Internet operator, Belgacom, is not a dominant player on the ISP market, according to the Brussels appeals court... It is obvious to every inhabitant of Belgium that the incumbent is everywhere. It owns all the copper pairs to homes and a good deal of the fibre. No single Internet or telephony operator can get into the business without transiting through the Belgacom network at some stage. more
A US District Judge in Maine largely granted a motion to dismiss brought by Hannaford in a big data breach case... According to the court, around March 2008, third parties stole up to 4.2 million debit and credit card numbers, expiration dates, security codes, PIN numbers, and other information relating to cardholders "who had used debit cards and credit cards to transact purchases at supermarkets owned or operated by Hannaford." more
George Reese (author of the new book Cloud Application Architectures: Building Applications and Infrastructure in the Cloud) is talking at Gluecon about securing cloud infrastructures. Two recent surveys found "security" was the number one concern of companies considering a move to the cloud. George says the key to making customers comfortable with cloud security is transparency... more
As you may know, there are two laws currently being discussed in Canadian legislative assemblies: Senate Bill S-220, a private member’s bill with private right of action and criminal remedies; Parliamentary Bill C-27, tabled by the government, with private right of action, coordination between various enforcement agencies... more
The term "reputation hijacking" continues to spread through the anti-spam community and the press. It's intended to describe when a spammer or other bad actor uses someone else's system -- usually one of the large webmail providers -- to send their spam. The idea is that in doing so, they're hijacking the reputation of the webmail provider's IPs instead of risking the reputation of IPs under their own control. But I really have to laugh (though mostly out of sadness) whenever this technique is described as something new... more
FttH networks had begun to arrive well before the financial crisis hit, but surprisingly it is the crisis itself that is now driving fibre beyond its first stage. This first stage was basically a continuation of the 100-year-old vertically-integrated telephone business model. This saw more of the same delivered at higher speeds and higher costs, and there was only a limited market that was willing to pay a premium for such a FttH service... more