Tech giants including Aamzon and Tiwtter are staring out of the contentious, public fight over the future of the Obama-era net neutrality rules. more
Renesys reports that Internet services in Egypt have been restored. According to the report, Egyptian Internet providers returned to the Internet at 09:29:31 UTC (11:29am Cairo time). "Websites such as the Egyptian Stock Exchange, Commercial International Bank of Egypt, MCDR, and the US Embassy in Cairo, are once again reachable. All major Egyptian ISPs appear to have readvertised routes to their domestic customer networks in the global routing table."
more
Over at the ECI blog, Jonathan Homa has a nice article about the importance of network planning: In the classic movie, The Graduate (1967), the protagonist is advised on career choices, "In one word – plastics." If you were asked by a young person today, graduating with an engineering or similar degree about a career choice in telecommunications, would you think of responding, "network planning"? Well, probably not... more
Arbor Networks today released its Global DDoS Attack Data for the first half of 2016 affirming continued escalation in both the size and frequency of denial-of-service (DDoS) attacks. more
M86 Security today released it's bi-annual security report for the first half of 2010, highlighting the evolution of obfuscation through combined attacks. From the report: "This threat trend is the latest to emerge as cybercriminals seek new ways to limit the effectiveness of many proactive security controls. Because existing techniques for 'covering their tracks' are becoming less effective, cybercriminals have begun using combined attacks, which are more complex and difficult to detect. By splitting the malicious code between Adobe ActionScript language - built into Adobe flash - and JavaScript components on the webpage, they limit the effectiveness of many of the the proactive security detection mechanisms in place today." more
In just one week, representatives of governments from all around the world will gather at the UN headquarters in New York for the 10-year Review of the World Summit on the Information Society, a.k.a. "WSIS+10". We are very pleased to see the consensus forming that the principles of multi-stakeholder cooperation and engagement should be at the core of the Information Society. Moreover, consensus has emerged around a "post-2015" vision for how the Internet can be used to support the Sustainable Development Goals (SDGs) that will bring about a better future for us all. more
Antigua and Barbuda will host the eighteenth regional meeting of the Caribbean Network Operators Group (CaribNOG) from September 25 to 27. CaribNOG is a vibrant community of professionals committed to improving the region’s networks, expanding the technical capacity of those who build and secure them, and strengthening the interconnections among all actors in the Internet space. more
The seventeenth regional meeting of the Caribbean Network Operators Group, CaribNOG 17, took place at the Hilton Barbados Resort, Bridgetown, Barbados from April 10 to 12, 2019, with the theme "Securing Caribbean Networks." Approximately 100 participants, including technical experts from the global Internet community and other stakeholders from across the Caribbean, joined dozens of online participants for this first of two regional gatherings for the year. more
CaribNOG and PCH have renewed their partnership to boost the Caribbean's Internet resilience, expanding technical capacity, advancing inclusive training, and strengthening the people and systems essential for recovery as islands rebuild after Hurricane Melissa. more
The IETF met in November 2022 in London. Among the many sessions that were held in that meeting was a session of the Decentralised Internet Infrastructure Research Group, (DINRG). The research group's ambitions are lofty: DINRG will investigate open research issues in decentralizing infrastructure services such as trust management, identity management, name resolution, resource/asset ownership management, and resource discovery. more
Senior Research Engineer, Doug Madory at Renesys reports: "A few hours ago, we observed a total Internet blackout in Sudan and, as we publish this blog, the Internet remains largely unavailable. By count of impacted networks, it is the largest national blackout since Egypt disconnected itself in January 2011. The massive outage came as the government began a violent crackdown on protests triggered by the government’s decision to end fuel subsidies." more
In Systemantics: How Systems Really Work and How They Fail, John Gall says: "A complex system that works is invariably found to have evolved from a simple system that worked. A complex system designed from scratch never works and cannot be patched up to make it work. You have to start over with a working simple system." In the software development world, this is called Gall's Law... more
The Eastern Caribbean island of Grenada has been selected as the venue for the fifth regional meeting of the Caribbean Internet Peering and Interconnection Forum, CarPIF, set for June 12 to 13. The annual international event, which draws Internet giants like Facebook and Google to the region, is focused on developing the Internet in the Caribbean by improving policy and building relationships between network operators and content providers. more
The U.S. became the top attack traffic source in the second quarter of 2010, accounting for 11% of observed attack traffic in total, reports Akamai in its State of the Internet Report released today. According to the report, China and Russia held the second and third place spots, accounting for just over 20% of observed attack traffic. Attack traffic from known mobile networks has been reported to be significantly more concentrated than overall observed attack traffic, with half of the observed mobile attacks coming from just three countries: Italy (25%), Brazil (18%) and Chile (7.5%). more
Congestion. Traffic. Two words that draw a visceral response, whether you are commuting to work or managing a network. Managing data traffic used to be easy. Everything was housed in centralized data centers, and all traffic was routed through big, dedicated, effective but expensive "pipes" -- Multiprotocol Label Switching (MPLS) links. When all the applications are at the data center, it makes sense to build private access for all traffic. more