Networks

Networks / Featured Blogs

RIP Network Neutrality

It's been an interesting couple of months in the ongoing tensions between Internet carriage and content service providers, particularly in the United States. The previous confident assertion was that the network neutrality regulatory measures in that country had capably addressed these tensions. While the demands of the content industry continue to escalate as the Internet rapidly expands into video content streaming models, we are seeing a certain level of reluctance from the carriage providers to continually accommodate these expanding demands...

Overcoming Cloud Storage Security Concerns: 7 Key Steps

According to a 2013 TwinStrata survey, 46 percent of organizations use cloud storage services and 38 percent plan to adopt this technology in the near future. Cloud storage capacity demands are increasing 40 to 60 percent year-over-year, while storage density lags behind at 20 percent. The result? More data, growing demands for space and increasing security concerns. How do enterprises overcome cloud storage security challenges?

The Importance of IP Resource Planning in Government ICT Strategic Plans

It seems everywhere I turn, there's someone throwing around statistics for how the Internet and broadband will drive economic growth, create jobs, end world hunger and bring world peace (ok, maybe not the later). Sure enough, government officials are buying into that rhetoric and extending it in initiatives like national broadband strategies, cybercrime and cybersecurity plans as well as e-governance strategies.

Heartbleed: Don’t Panic

There's been a lot of ink and pixels spilled of late over the Heartbleed bug. Yes, it's serious. Yes, it potentially affects almost everyone. Yes, there are some precautions you should take. But there's good news, too: for many people, it's a non-event. Heartbleed allows an attacker to recover a random memory area from a web or email server running certain versions of OpenSSL. The question is what's in that memory. It may be nothing, or it may contain user passwords (this has reportedly been seen on Yahoo's mail service), cryptographic keys, etc.

Cisco: Africa in 2017 to Have More Internet Users Than U.S.

Carlos Slim of Telmex tells me the world is about to change. "Two billion more people will connect to the Internet when smartphones cost $50. The phone makers are promising me a $50 phone in 2014." If Spreadtrum and Firefox deliver a $25 smartphone, as promised, that could accelerate takeover. ~310,000,000 Africans will be connected to the Internet in 2017, Arielle Sumits of Cisco predicts... It's inevitable that the U.S. will be dwarfed by the rest of the world.

The Rise and Rise of Broadband in China

While there are plenty of articles continuously updating us on the incredible social and economic developments that are taking place in China it is still sometimes good to stand still and have a look at some of these developments. It was 15 years ago that the Chinese Government - in its 5-year plan - stated that it wanted to connect all of its half million villages to the telecommunications network. At that point the plan simply called for narrowband telephone connections.

IANA: The World Loses if the Technical Industry Checks Out

On Friday, 14 March 2014, the U.S. Department of Commerce National Telecommunications and Information Administration (NTIA) announced its intention to transition the IANA functions to the global multistakeholder community. As expected, the announcement has sent adrenaline coursing through the veins of Internet governance experts and government policy people the world over. I'd argue, however, that it is an important point for the Internet's technical experts to sit up and take notice, as well: the fact that you are probably saying "what problem does this solve?" is a testimony to how much works well today, and we want to make sure it continues to work well in any future arrangements.

Proceedings of Name Collisions Workshop Available

Keynote speaker, and noted security industry commentator, Bruce Schneier (Co3 Systems ) set the tone for the two days with a discussion on how humans name things and the shortcomings of computers in doing the same. Names require context, he observed, and "computers are really bad at this" because "everything defaults to global." Referring to the potential that new gTLDs could conflict with internal names in installed systems, he commented, "It would be great if we could go back 20 years and say 'Don't do that'," but concluded that policymakers have to work with DNS the way it is today.

Making Sure March Madness Doesn’t Live Up to Its Name

Last month, I talked about keeping the Winter Olympics from clogging up your networks as employees raced to stream live events during the workday. Well, in the U.S., we are in the middle of NCAA Men's Basketball Tournament, the annual "madness" repeats itself all over again. And let's be honest, most of us want to sneak a peek at the scores and witness some of the thrilling upsets that happen every year.

Netflix Has Buyer’s Remorse Over Its Paid Peering Deal With Comcast

Soon after capitulating to Comcast's surcharge demand for improved treatment of its traffic, Netflix got better downstream delivery speeds. Apparently Comcast did not have to undertake a major bandwidth expansion program. Much to the immediate relief of Netflix, Comcast merely needed to allocate more ports for Netflix traffic. So with a reallocation of available bandwidth, Comcast solved Netflix's quality of service dilemma apparently without degrading service to anyone else, upstream or downstream.