I have come to the conclusion that "net neutrality" is an ethical issue at heart, one about the appropriate constraint of unfair ISP power. Some people are (I pray unintentionally) on the wrong side of a now-clear moral divide. They are claiming to prevent harmful abuse of power, when in reality their actions create fresh harm. A central issue is one of technical competence to comment. If your beliefs are disconnected from how the world works, you cannot evaluate whether you are espousing something sensible or silly. more
ARCchart is selling a new report entitled Mobile Broadband Performance of Carrier Networks. I can't personally justify the purchase, but I notice this wonderful graph in their sample. ARCchart gave mobile users free speed test applications... more
Last month, I announced our Open Data Hub to the CircleID community, inviting anyone interested in making the digital sector more transparent to join our efforts. Today, I am excited to share summaries of our three-part series describing our vision for a sustainable European cloud. It’s a key part of our Roadmap to Sustainable Digital Infrastructure by 2030, and one that is meant to not merely challenge the dominance of the big, non-European cloud providers, but offer an entirely different paradigm that is open-source, fair, sustainable, and creates economic opportunities for all. more
AWS is introducing Route 53 Accelerated Recovery to help organizations maintain DNS control during regional outages, offering a 60-minute recovery objective and sustained access to key API operations for critical updates and traffic management. more
I've already shared my thoughts following a session of the IPv4 Sunset Working Group at IETF 95 that considered whether to declare IPv4 an "Historic" specification. Of course, as one would expect for a meeting of a Standards Development Organization (SDO), that wasn't the only standards process discussion through the week. Another session, this time in the IPv6 Maintenance Working Group, considered the related topic of whether to make the IPv6 specification a full Internet Standard. Let's look at that proposal. more
Last week Czech researchers released information on a new worm which exploits CPE devices (broadband routers) by means such as default passwords, constructing a large DDoS botnet. Today this story hit international news... The spread of insecure broadband modems (DSL and Cable) is extremely wide-spread, with numerous ISPs, large and small, whose entire (read significant portions of) broadband population is vulnerable. more
In the first part of this trilogy, I discussed the importance of automatically provisioned second generation DNS in connection with Software Defined Networking (SDN) and Software Defined Data Centre (SDDC). In the second post, I talked about IP addressing, private enterprise networks, and how DHCP does not meet the requirements of multitenant Infrastructure-as-a-Service (IaaS) cloud environments. I will now wrap up this trilogy by putting these two thesis into real-life context. more
This year, 2013, I got 24 days of IPv6 and DNSSEC measurements. All in all it created 15GB logs with more than 62 million rows. On the 21st of December, early in the morning, the goat was "traditionally" burnt down, however this year with one exception. Via the Swedish newspaper Expressen the arsonists anonymously took the blame and also filmed their own act. more
The cloud computing paradigm has been making steady progress in 2016. With the DevOps model making its way from cloud to networking, the business upside of fully automated service architectures is finally beginning to materialize. The associated service agility is expected to unleash new business models that transform the ways in which applications and connectivity can be consumed. more
Pinning down the number of infected computers is really, really hard. I'd go as far as saying it's practically impossible to calculate, let alone observe. Still, that's not going to stop people from attempting to guess or extrapolate from their own observations. Over the years I've heard "reliable" numbers ranging from 10% through to 60% -- and I don't trust any of them. There's a whole gaggle of reasons why the numbers being thrown out to the public are inaccurate and should ideally be interpreted with a lot of skepticism by any right-minded folks. more
With all the focus on neutrality in the provider networks we must not lose sight of what is happening in our own homes. As with some of the efforts to make the networks work better (as measured in the providers' paternalistic) view, their attempt to retake the home is about serving us better by reducing the operators' costs. "Better" is of course in terms of the operator's own measures. It's not quite the same as in 1995 when providers opposed home networks and want to charge us for each machine... more
A recent malware attack on the control systems of an industrial plant has renewed concerns about the threat hacking poses to critical infrastructure. more
If there is one word in the telecommunications that has suffered from over-abuse for many years now, it's convergence. The term has been liberally applied to each successive generation of communications technology for their supposed ability to solve a myriad of service delivery problems within a single unifying converged carriage and service delivery solution. Unfortunately, the underlying reality has always been markedly different from these wondrous promises, and we continue to see an industry that deploys a plethora of service delivery platforms and an equally diverse collection of associated switching and service delivery technologies. One can't help but wonder at the collective gullibility of an industry that continues to herald the convergent attributes of each new generation of communications technology, while at the same time being forced to admit that previous convergent promises have never been realized. more
DNS tunneling -- the ability to encode the data of other programs or protocols in DNS queries and responses -- has been a concern since the late 1990s. If you don't follow DNS closely, however, DNS tunneling likely isn't an issue you would be familiar with. Originally, DNS tunneling was designed simply to bypass the captive portals of Wi-Fi providers, but as with many things on the Web it can be used for nefarious purposes. For many organizations, tunneling isn't even a known suspect and therefore a significant security risk. more
As digital transformation has been picking up momentum, leading analysts such as 451 Research have suggested that hybrid multi-clouds and automated DevOps will become key constituents powering enterprises in the new era. At the heart of these enabling technologies lies Lifecycle Service Orchestration (LSO) designed for near-autonomous application deployment across hybrid infrastructures consisting of traditional on-premise data centers and public clouds. more