Net Neutrality

Net Neutrality / Featured Blogs

Obama’s Missed Opportunity

According to National Journal, Susan Crawford is joining the Obama administration in a significant new role... This does not make me happy. Crawford is not a technologist, and the job that's been created for her needs to be filled by a person with deep knowledge of technology, the technology business, and the dynamics in research and business that promote innovation... more

Exploring the Roots of Wireless Spectrum Controversy (eComm Panel)

Earlier this month, I had the opportunity to attend the The Emerging Communications (eComm) 2009 conference in San Francisco which was packed with 3 days of fascinating conversations about the future of communications. I absolutely enjoyed talking to various speakers and attendees giving me a deep level of appreciation and perspective on technical, commercial and political issues at hand -- and what is likely to come in the next few years. And speaking of politics, Lee Dryburgh, who founded eComm in early 2008, has generously allowed us to share with you a fascinating panel discussion which took place on day 3 of the conference called "Spectrum 2.0 - What's really happening?" more

DPI is Not a Four-Letter Word!

As founder and CTO of Ellacoya Networks, a pioneer in Deep Packet Inspection (DPI), and now having spent the last year at Arbor Networks, a pioneer in network-based security, I have witnessed first hand the evolution of DPI. It has evolved from a niche traffic management technology to an integrated service delivery platform. Once relegated to the dark corners of the central office, DPI has become the network element that enables subscriber opt-in for new services, transparency of traffic usage and quotas, fairness during peak busy hours and protection from denial of service attacks, all the while protecting and maintaining the privacy of broadband users. Yet, DPI still gets a bad rap... more

Why You Needed to Be at eComm 2009

I've been posting photos and snippets during eComm 2009 this week, but composing my overall impressions has been another matter. Sitting through 3 days mostly filled with continuous 15 minute presentations is a surefire recipe to fry your brain, and most people I talked to were topped out well before things wrapped up Thursday night. It's information overload of the highest -- and best -- order... Here's my top-line takeaway, and reading the rest of this post is really just detail. But it's detail you'll probably love if you really want to know what you missed... more

Cloud Computing Types: Public Cloud, Hybrid Cloud, Private Cloud

It's no secret that I don't very much like this whole private cloud or internal cloud concept... on the basis that while advanced virtualisation technologies are valuable to businesses they are a severe short sell of what cloud computing is ultimately capable of. The electricity grid took over from the on-site generators very quickly and I expect cloud computing to do the same with respect to private servers, racks and datacenters... more

Achieving Connectivity vs. More “Broadband”

Our problem isn't the lack of capacity -- it's our inability to achieve simple connectivity. We have abundant capacity but can’t use it because we have gatekeepers who set a price on our ability to communicate and innovate. If we were able to take advantage of what we already have we would find ourselves with a wealth of opportunities rather than having to pay billions to "stimulate" the gatekeepers into letting us create new value. more

Designing Secure Networks with Cisco Technology, Part 3

In this multipart series I will be presenting some of the leading industry-standard best practices for enterprise network security using Cisco technologies. Each article in the series will cover a different aspect of security technologies and designs and how each can be deployed in the enterprise to provide the best security posture at the lowest possible budgetary and administrative cost. In Part 2 of this series I discussed security risks and vulnerability. In this article we begin to focus on the role Cisco network and security technologies play in ensuring the safety and security of network data. more

Dumb When They Want To Be…

David Akin pointed me to this article in the Ottawa Citizen which describes CRTC initiatives aimed at getting the cablecos to pay into a fund that would support, "the creation of high-quality, high-cost, scripted Canadian broadcasting content in the new media." In it, Ken Engelhart, senior vice-president of regulatory [affairs?] for Rogers Corp. is quoted saying... more

Fixing the Internet Might Break It Worse Than It’s Broken Now

Willis Alan Ramsey, who wrote "Muskrat Love," recorded one and only one studio album. The cognoscenti of country think it's a gem, an all time top ten. There's an apocryphal story that when Ramsey was pushed to make another record he allegedly retorted, "What's wrong with the first one?" We who use the Internet every day risk losing sight of what a miracle it is, and the openness that keeps it so miraculous... We also lose sight of the fact that even as the Internet's miracles occur, it's almost always broken or malfunctioning or threatening or worse in many places along the line. more

An Economic Outlook on Information Security

As enterprise information security spending is scrutinized in unprecedented fashion in 2009 Information Technology management will seek to get more for their security dollar. While budgets tighten and risks grow due to the global economic downturn IT departments will be looking for point solutions, not suites of security tools. more