It has been observed that the most profound technologies are those that disappear (Mark Weiser, 1991). They weave themselves into the fabric of everyday life until they are indistinguishable from it, and are notable only by their absence. The feat of reticulating clean potable water into every house, so that it is constantly accessible at the turn of a tap, is a great example of the outcome of large scale civil engineering projects, combining with metallurgy, hydrology, chemistry and physics. But we never notice it until it is no longer there. more
Here we are, half-way through this list of the top 10 IPv6 security myths! Welcome to myth #6. Since IPv6 is just now being deployed at any real scale on true production networks, some may think that the attackers have yet to catch up. As we learned in Myth #2, IPv6 was actually designed starting 15-20 years ago. While it didn't see widespread commercial adoption until the last several years, there has been plenty of time to develop at least a couple suites of test/attack tools. more
Policies such as network neutrality and minimum speeds for broadband seek to limit the ability of carriers to favor some applications over others. Well-intended though these initiatives are, they still leave users negotiating for passage while confined to the carriers' "pipes". In this scenario, end users remain limited by how the incumbents choose to build their broadband content delivery networks. more
Yes, that was the theme of this year's Caribbean Cable and Telecommunications Association (CCTA) conference. This annual event was held in sunny Montego Bay, Jamaica, over the first week of February... For that, one has to applaud the fine work that CCTA puts into the event, drawing together operators, vendors, programmers, solution providers, marketers, and technologists alike -- and this year, over 270 attendees and 80-some exhibitors. more
The following is a selected summary of the recent NANOG 63 meeting, held in early February, with some personal views and opinions thrown in! ...One view of the IETF's positioning is that as a technology standardisation venue, the immediate circle of engagement in IETF activities is the producers of equipment and applications, and the common objective is interoperability. more
As Internet connection continues on a steady path of becoming a ubiquitous commodity in mature markets, we saw an eruption of big data tracking and analysis software in 2014. But what are operators going to do with all this new information? And how can they turn data into revenue? To start with, providers need more than just a data measurement tool. They need a solution that can analyze real-time data and then automate processes to optimize their networks and improve their subscribers' experiences. more
Here we are, all the way up to Myth #4! That makes this the 4th installment of our 10 part series on the top IPv6 Security Myths. This myth is one of my favorite myths to bust when speaking with folks around the world. The reason for that is how many otherwise well-informed and highly experienced engineers, and others, hold this myth as truth. It's understandable, really. more
Every time Google becomes involved in telecommunications it gets international media coverage; and every single time the same question is raised -- why does Google become involved in telecoms infrastructure, plus the underlying issue of it becoming a telecoms operator. This time the question is -- why does Google want to become involved in mobile telecoms and how is it going to compete with the other operators? more
As we have previously observed, the efforts undertaken by ICANN, the World Economic Forum (WEF), and CGI.BR to launch a NETmundial Initiative (NMI) to follow up on last spring's NETmundial meeting in Sao Paulo has encountered heavy skepticism and substantial resistance from the major civil society and technical groups from which endorsement and participation was sought. more
The Internet Society has released an announcement setting out its views on the development of policy to address the balance between security and privacy. From an Internet perspective and in the context of the growing threat vector from hacking, targeted cyber attacks on networks and individuals, and surveillance, the Internet Society's approach to the development of cyber security policy initiatives is based on the following key considerations. more
Now that IPv6 is being actively deployed around the world, security is more and more a growing concern. Unfortunately, there are still a large number of myths that plague the IPv6 security world. These are things that people state as fact but simply aren't true. While traveling the world, talking to the people who've already deployed IPv6, I've identified what I believe are the ten most common IPv6 security myths. more
When a business gets hacked and its corporate information is dumped on the Internet for all and sundry to see (albeit illegally), the effects of that breach are obviously devastating for all concerned. In many ways it's like the day after a fierce storm has driven a super-cargo container ship aground and beachcombers from far and wide have descended upon the ruptured carcass of metal to cart away anything they think has value or can be sold by the side of road. more
There are many voices calling for increased initiatives by municipalities to build and operate broadband internet infrastructure as a public utility, but until this week, very little in the way of economic analysis to fully examine whether the benefits justify the costs. A paper released this week finds that local efforts produce small economic benefits, but cause a notable increase in the size of local government. more
As 2014 winds down, cloud spending is up. That's the word from research firm IDC -- as reported by IT Jungle, cloud spending will reach over $56 billion this year and won't stop anytime soon. By 2018, predictions peg the cloud as worth $127 billion, and that's just counting "core" cloud services such as SaaS, PaaS and IaaS. Cloud-based peripherals, the Internet of Things and other cloud initiatives are also on track to make an impact; here's a quick look at top cloud considerations for the coming year. more
The Internet's Domain Name System is a modern day miracle. It may not represent the largest database that has ever been built, but nevertheless it's truly massive. And even if it's not the largest database that's ever been built, it's perhaps one of the more intensively used... Given the fragmentation of the IPv4 address space with the widespread use of various forms of address sharing, then it increasingly looks as if the DNS is the only remaining common glue that binds the Internet together as a single network. more