NORDUnet, the R&E network connecting the Nordic countries has recently undertaken a brilliant Internet peering strategy that will have global significant ramifications for supporting research and education around the world. NORDUnet is now emerging as one of the world's first "GREN"s -- Global Research and Education Network. NORDUnet is extending their network infrastructure to multiple points of presence throughout the USA and Europe to interconnect to major Internet Exchange Points (IXPs). more
Federal prosecutors in Virginia have shut down one of the world's largest Internet file-sharing sites, Megaupload.com, charging its founder and others with violating piracy laws, the Associated Press reports today. "The indictment was unsealed Thursday, one day after websites shut down in protest of two congressional proposals [SOPA & PIPA] intended to thwart the online piracy of copyrighted movies and TV programs." more
In June 2009 we mused in these columns about Long Term Evolution standing for Short Term Evolution as wireless networks started to drown in a data deluge. It is January 2012 and we keep our heads above the mobile data deluge, even if barely, thanks to a gathering avalanche of LTE networks. Even the wildest prognoses proved conservative as the GSMA was betting on a more 'managed' progression... more
The Department of Energy (DoE) recently came out with an excellent report, called the Magellan report, on the advantages and disadvantages of using commercial clouds versus in house High Performance Computers (HPC) for leading edge scientific research. The DoE probably supports the largest concentration of HPC facilities in the world. I agree with the report that for traditional applications such as computational chemistry, astrophysics, etc. will still need large HPC facilities. more
There's often a lot of discussion about whether a piece of malware is advanced or not. To a large extent these discussions can be categorized as academic nitpicking because, at the end of the day, the malware's sophistication only needs to be at the level for which it is required to perform -- no more, no less. Perhaps the "advanced" malware label should more precisely be reattributed as "feature rich" instead. more
Cloud computing, from a business and management perspective, has a great deal in common with mainframe computing. Mainframes are powerful, expensive and centralized pieces of computing equipment. This is in line with their role as infrastructure for mission-critical applications. For these types of applications, mainframes can be fairly efficient, even though they tend to need large teams of support specialists... Cloud computing is a new style of computing... more
Telecoms engineers from all of the major telecoms services and equipment companies around the world agree that FttH is the only future-proof telecommunications technology. So who should we trust - the technology experts or politicians with different agendas? If there had been a division of opinion among these experts it would have been necessary to investigate it; but if they are all in agreement it is safe to follow their advice. more
While reading Reuters I came across a news article indicating that a number of high profile agencies - from the United Nations to the Canadian Government to government of Taiwan - were broken into over a period of the past five years. ... I'll say it right now, even though I haven't been briefed on it. It was China. more
The Associated Press published an article today that the Pentagon revealed that earlier this year, they suffered one of its largest ever loss of sensitive data to a foreign government by a cyberattack. ... It's hard to say what's right and what's wrong. On the one hand, the Secretary of Defense says that the cyberwar is very real. On the other hand, the cyberczar Howard Schmidt said that there is no cyberwar and instead government needs to focus its efforts to fight online crime and espionage... more
In our last post on CircleID, Measuring World IPv6 Day - First Impressions, we showed exactly when World IPv6 Day participants switched on IPv6 on their networks (by way of announcing DNS AAAA records). Now, a few weeks after World IPv6 Day, it's interesting to see what the longer-term effects have been. more
Feb. 3, 2011, came and went without much fanfare, but it was a milestone for Internet stakeholders, whether they knew it or not. On that Thursday, the last available IPv4 addresses were allocated by the Internet Assigned Numbers Authority (IANA). Though some Regional Internet Registries (RIRs) have a reasonable inventory of IP addresses that could last another year or two, the days of "new" IPv4 address allocations are largely over. more
The number of web-based devices is expanding at an exponential clip, virtualization is making a very static environment dynamic, and now with the exhaustion of IPv4 and the oncoming complexities of IPv6 network operators must reevaluate what IP Address Management (IPAM) really is. The goal of this post is to define the various functions that make up IP Address Management. more
RIPE Atlas, the new active measurements network maintained by the RIPE NCC, gives you a way to easily measure the quality of your Internet services. RIPE Atlas is designed in such a way that it can collect data for analysis from a great number of locations on the Internet. The actual measurement devices, or "probes", are so small that they can be easily deployed in a home environment. more
Scientists led by a team at Karlsruhe Institute of Technology (KIT) have broken a record for data transmission, sending data at 26Tb/s on a single laser beam over 50km. To put this into context, the researchers suggest that this is the equivalent of transferring the contents of 700 DVDs per second, or the entire collection of the Library of Congress in ten seconds.
more
The breadth of cyber threats that an organization must engage with and combat seemingly change on a daily basis. Each new technology, vulnerability or exploit vector results in a new threat that must be protected against. Meanwhile some forms of attack never appear to age -- they remain a threat to business continuity despite years of advances in defensive strategy. One particularly insidious and never-ending threat is that of the Distributed Denial of Service (DDoS) attack. more