Networks

Networks / Most Viewed

What COVID-19 Means for Network Security

The COVID-19 Pandemic is causing huge social and financial shifts, but so far, its impact on network security has gone under-reported. Yet with thousands of companies worldwide requiring millions of employees to work remotely, network administrators are seeing unprecedented changes in the ways that clients are using their networks and new threats that seek to leverage the current crisis. more

Why R&E Networks Should Be Aware of the CDN Interconnect Initiative (CDNI)

At the recent IETF meeting there has been considerable discussion about interconnection of Content Delivery Networks. A lot of this is being driven unfortunately by the incumbent telco/cableco's who never understood CDN in the first place, and now want to assert control over this critical new Internet architecture, much in the same way that they want to take control over open WiFi hot spots as part of an integration strategy with their 3G/4G networks. more

Ericsson Predicts 50 Billion Connections by 2020

At a recent shareholders' meeting in Stockholm, Ericsson's CEO has reaffirmed company's vision of having 50 billion internet-connected devices by 2020: "Today we already see laptops and advanced handsets connected, but in the future everything that will benefit from being connected will be connected." As an example of connected devices, a research engineer showed real life mobile health applications and how heart monitoring can be done remotely over mobile networks. more

Internet Service Quality Measured from Thousands of Locations

RIPE Atlas, the new active measurements network maintained by the RIPE NCC, gives you a way to easily measure the quality of your Internet services. RIPE Atlas is designed in such a way that it can collect data for analysis from a great number of locations on the Internet. The actual measurement devices, or "probes", are so small that they can be easily deployed in a home environment. more

Seattle Restores ISP Privacy Rules. Could be First of Many Cities to Defeat FCC’s Privacy Roll Back

The city of Seattle this week will move forward with its own plan to restore broadband user privacy rules despite the recent law passed by U.S. Congress, signed by President Trump in April, which gave ISPs the green light to collect customer data. more

DDoS Awareness Day - Oct 23, Register Today for Live Virtual Event

In support of National Cyber Security Awareness Month, DDoS Awareness Day is a virtual, global event focused on raising awareness and education around the threat of DDoS attacks. Hosted by Neustar with and exclusive media partner CSO, DDoS Awareness Day brings together top experts in global security to share their views, technical tips and from-the-trenches experience. Attendees will also be given access to a wealth of DDoS materials: white papers, surveys, presentations, best practices and more. more

Encryption, Our Last Line of Defense

Encryption is fundamental to our daily life. Practically everything we do online makes use of encryption is some form. Access to our financial transactions, health records, government services, and exchanged private messages are all protected by strong encryption. Encryption is the process of changing the information in such a way as to make it unreadable by anyone except for those possessing special knowledge (usually referred to as a "key"), which allows them to change the information back to its original, readable form. more

Community Networks Could Help Strengthen the Caribbean Internet

By some estimates, only half of the world's population has internet access, leaving the other half at a sizeable competitive disadvantage. This profound connectivity gap is especially significant in the unserved and underserved areas of developing and least-developed countries. For people who live in these places, Internet connectivity is not just about the Internet. It is a lifeline that gives access to electronic commerce and telehealth services, distance learning, social and political engagement, government services... more

Reducing the Risks of BYOD with DNS-Based Security Intelligence; Part 1: Understanding the Risks

Ah, BYOD. How I love thee. BYOD, or "Bring Your Own Device", gives me choices. I can use a device at work I actually like and am most effective with. (How did I ever get by without my iPad?) But BYOD comes with challenges. Personal devices can be infected with malware. Once they're connected to an enterprise's network, they can be controlled by a bot master to hijack enterprise resources and wreak havoc as part of a botnet. more

Critical Role for R&E Networks+Commercial Clouds in US Government “Big Data” Initiative

It is great to see US and European governments undertake initiatives to promote the development of research into Big Data utilizing commercial clouds. Many cloud providers are offering free resources to support these initiatives. R&E networks will play a critical role in linking researchers to the commercial clouds and developing collaboration platforms and portals. more

Google’s Acquisition of Nest and Smart Homes

Google's $3.2 billion acquisition of high-tech thermostat and smoke-detector maker Nest Labs will allow the company to further infiltrate people's lives, not just via their smartphones but now also via a range of home appliances. It is a logical development for the digital media giant and based on their record of innovation we can expect a range of interesting products and services, also known as machine-to-machine (M2M) communication and the Internet of Things (IoT), to enter this market. more

China Closing the Door to New Technologies

2013 may be a promising year for global trade in technology with the kick-off of the International Technology Agreement expansion discussions, the Trans-Atlantic Trade and Investment Partnership, and as the Trade in Services Agreement gets going. But China calls its own tune, and is now threatening to restrict its market for Internet-enabled technologies through a clever device that could cost its trading partners billions. more

A Closer Look at the AIP Internet Draft Proposal

Just in time for ICANN's 44th meeting next week, a new Internet Draft has turned up, purporting to fix the centralization of the DNS. The draft has received some attention, including an article in PC World. It isn't entirely clear what the real purpose of the draft is, but it is hard to credit the notion that it is solving any technical problem. Without examining the reasons why the draft exists, I want to debunk a claim in it. more

The Early History of Usenet, Part VIII: The Great Renaming

The Great Renaming was a significant event in Usenet history since it involved issues of technology, money, and governance. From a personal perspective -- and remember that this series of blog posts is purely my recollections – it also marked the end of my "official" involvement in "running" Usenet. I put "running" in quotation marks in the previous sentence because of the difficulty of actually controlling a non-hierarchical, distributed system with no built-in, authenticated control mechanisms. more

Renesys Chronicles Today’s Internet Blackout in the Sudan (Now Restored)

The team over at Renesys has once again provided a great analysis of an Internet outage in a country, this time in Sudan. In the article simply titled "Internet Blackout in Sudan", Doug Madory writes: A few hours ago, we observed a total Internet blackout in Sudan and, as we publish this blog, the Internet remains largely unavailable. By count of impacted networks, it is the largest national blackout since Egypt disconnected itself in January 2011..." more