Networks

Networks / Most Commented

Overcoming Cloud Storage Security Concerns: 7 Key Steps

According to a 2013 TwinStrata survey, 46 percent of organizations use cloud storage services and 38 percent plan to adopt this technology in the near future. Cloud storage capacity demands are increasing 40 to 60 percent year-over-year, while storage density lags behind at 20 percent. The result? More data, growing demands for space and increasing security concerns. How do enterprises overcome cloud storage security challenges? more

The Importance of IP Resource Planning in Government ICT Strategic Plans

It seems everywhere I turn, there's someone throwing around statistics for how the Internet and broadband will drive economic growth, create jobs, end world hunger and bring world peace (ok, maybe not the later). Sure enough, government officials are buying into that rhetoric and extending it in initiatives like national broadband strategies, cybercrime and cybersecurity plans as well as e-governance strategies. more

Heartbleed: Don’t Panic

There's been a lot of ink and pixels spilled of late over the Heartbleed bug. Yes, it's serious. Yes, it potentially affects almost everyone. Yes, there are some precautions you should take. But there's good news, too: for many people, it's a non-event. Heartbleed allows an attacker to recover a random memory area from a web or email server running certain versions of OpenSSL. The question is what's in that memory. It may be nothing, or it may contain user passwords (this has reportedly been seen on Yahoo's mail service), cryptographic keys, etc. more

Cisco: Africa in 2017 to Have More Internet Users Than U.S.

Carlos Slim of Telmex tells me the world is about to change. "Two billion more people will connect to the Internet when smartphones cost $50. The phone makers are promising me a $50 phone in 2014." If Spreadtrum and Firefox deliver a $25 smartphone, as promised, that could accelerate takeover. ~310,000,000 Africans will be connected to the Internet in 2017, Arielle Sumits of Cisco predicts... It's inevitable that the U.S. will be dwarfed by the rest of the world. more

Indonesia’s Largest Telecom Provider Leaks Large Portions of the Global Routing Table

Earl Zmijewski from Renesys reports: Yesterday, Indosat, one of Indonesia’s largest telecommunications providers, leaked large portions of the global routing table multiple times over a two-hour period. This means that, in effect, Indosat claimed that it “owned” many of the world’s networks. Once someone makes such an assertion, typically via an honest mistake in their routing policy, the only question remaining is how much of the world ends up believing them and hence, what will be the scale of the damage they inflict? more

The Rise and Rise of Broadband in China

While there are plenty of articles continuously updating us on the incredible social and economic developments that are taking place in China it is still sometimes good to stand still and have a look at some of these developments. It was 15 years ago that the Chinese Government - in its 5-year plan - stated that it wanted to connect all of its half million villages to the telecommunications network. At that point the plan simply called for narrowband telephone connections. more

IANA: The World Loses if the Technical Industry Checks Out

On Friday, 14 March 2014, the U.S. Department of Commerce National Telecommunications and Information Administration (NTIA) announced its intention to transition the IANA functions to the global multistakeholder community. As expected, the announcement has sent adrenaline coursing through the veins of Internet governance experts and government policy people the world over. I'd argue, however, that it is an important point for the Internet's technical experts to sit up and take notice, as well: the fact that you are probably saying "what problem does this solve?" is a testimony to how much works well today, and we want to make sure it continues to work well in any future arrangements. more

Making Sure March Madness Doesn’t Live Up to Its Name

Last month, I talked about keeping the Winter Olympics from clogging up your networks as employees raced to stream live events during the workday. Well, in the U.S., we are in the middle of NCAA Men's Basketball Tournament, the annual "madness" repeats itself all over again. And let's be honest, most of us want to sneak a peek at the scores and witness some of the thrilling upsets that happen every year. more

Aligning Broadband and Healthcare

For many years I have been saying that in order to generate business cases that will support the developments of national broadband networks it is necessary to take into account the social and economic benefits of such investments. The reality is that these benefits do not show up on the balance sheets of the traditional telecoms infrastructure companies and this is a key reason they are reluctant to make such investments. more

Best Practices in the Global Internet

In an increasingly global environment, the Internet infrastructure industry faces a diverse set of serious issues that we as an industry need to address together. To look at these concerns, an area of focus for the Internet Infrastructure Coalition (i2Coalition) has been best practices for our industry. Our approach to developing best practices encapsulates three areas, always with the goal of striking the right balance between security, safety and privacy: working with experts and industry professionals; identifying like-minded partners; and fostering the growth of the Internet economy. more

Mind the Step(-function): Are We Really Less Secure Than We Were a Year Ago?

In January 1995, the RFC Editor published RFC 1752: "The Recommendation for the IP Next Generation Protocol"... The Internet is a security officer's nightmare -- so much openness, so easy to capture packet traffic (and/or spoof it!) and send all manner of unwanted traffic. It was built as a research network, hosted by institutes that were 1/ professionally responsible and 2/ interested in working together collegially. So, in the 19 years since the publication of that statement, have we really failed to address the stated goal? more

Addressing 2013 - That Was the Year That Was

Time for another annual roundup from the world of IP addresses. What happened in 2013 and what is likely to happen in 2014? This is an update to the reports prepared at the same time in previous years, so let's see what has changed in the past 12 months in addressing the Internet, and look at how IP address allocation information can inform us of the changing nature of the network itself. more

Securing the Core

BGP. Border Gateway Protocol. The de-facto standard routing protocol of the Internet. The nervous system of the Internet. I don't think I can overstate the importance, the criticality of BGP to the operation of the modern Internet. BGP is the glue that holds the Internet together at its core. And like so many integral pieces of the Internet, it, too, is designed and built on the principle of trust... The folks who operate the individual networks that make up the Internet are generally interested in keeping the Internet operating, in keeping the packets flowing. And they do a great job, for the most part. more

Google’s Acquisition of Nest and Smart Homes

Google's $3.2 billion acquisition of high-tech thermostat and smoke-detector maker Nest Labs will allow the company to further infiltrate people's lives, not just via their smartphones but now also via a range of home appliances. It is a logical development for the digital media giant and based on their record of innovation we can expect a range of interesting products and services, also known as machine-to-machine (M2M) communication and the Internet of Things (IoT), to enter this market. more

W3C/IAB “Strengthening the Internet” Workshop: Deadline Monday to Submit Position Papers

How can the open standards organizations of the IETF and W3C "strengthen the Internet" against large-scale pervasive monitoring? That is the topic up for discussion at the "Strengthening the Internet Against Pervasive Monitoring (STRINT)" workshop planned for February 28 and March 1, 2014, and jointly sponsored by the Internet Architecture Board (IAB) and the W3C. The workshop is by invitation-only and has a deadline of Monday, January 20, 2014 (by 11:59 UTC) for submission of either position papers or Internet drafts. more