/ Recently Commented

X-Force Report: Corporations Becoming No. 1 Security Threat to Their Own Customers

With the alarming increase in cyberattacks, criminals are literally turning businesses against their own customers in order to steal consumer's personal data, warns the latest annual X-Force Trend and Risk report from IBM. "The security industry puts a lot of effort into the technical evaluation of security threats, examining, sometimes at great length, the potential threat that each issue might present to corporations and consumers. Criminal attackers out for profit, however, have considerations that the security industry does not always take into account, such as monetization cost and overall profitability." more

Benkler Analyzes Broadband in Stimulus Bills

Yochai Benkler has done a close reading of the broadband portions of both House and Senate stimulus bills. Nice work. To summarize Yochai's summary: House: $6 Billion, split between Commerce and Agriculture Depts., requires adherence to FCC's Four Internet Principles (the Martin FCC Version); Senate: $9 Billion, via Commerce Department's NTIA, requires less specific "interconnection and nondiscrimination." How much broadband can a Billion buy? more

IPv6… the Internet Dragon Stirred Under Its Shell

At Cisco Networkers in Barcelona earlier this week, some of us saw a dragon try to wiggle out of its shell, provided you connected in IPv6 that is. A smile to Kame, the turtle which only danced under a IPv6 caress. Networkers 2009 saw more than 3000 attendants and a good complement of IPv6 presentations highlighted by a high powered plenary panel on the status of IPv6. more

Designing Secure Networks with Cisco Technology, Part 1

In this multipart series I will be presenting some of the leading industry-standard best practices for enterprise network security using Cisco technologies.... "Wisdom consists in being able to distinguish among dangers and make a choice of the least harmful." That quote is quite possibly the most accurate depiction possible of the never-ending struggle between network security and corporate budget. Providing a mechanism to defend the enterprise network from every conceivable threat is impossible in terms of both technology and funding. more

Google Flags Entire Web Unsafe, Glitch Due to Human Error According to Company

A glitch in Google's security update on Saturday morning caused links to every search result -- including Google's own pages -- to get flagged with the warning: "This site may harm your computer." The errors caused panic among users around the world who at first feared the popular search engine had suffered a major security failure. The problem which lasted for approximately 40 minutes has now been acknowledged and fixed by Google. The reason for the hiccup, as explained by Google, was due to a human error in the list of URLs Google uses to identify and flag websites known to install malicious software. more

An Interview With Richard Whitt, Google’s Washington Telecom and Media Counsel

I recently had the opportunity to interview, Richard Whitt, Google's Washington Telecom and Media Counsel, who will be one of the keynote speakers at the upcoming Emerging Communications Conference (eComm 2009) being held on March 3-5 at the San Francisco Airport Marriott. The following is the transcript of our phone conversation and the audio recording of the interview. more

Extra Details on the Measurement Lab Launch

Well if you've been following tech news today, you probably already know -- after month (years, really) of work, the MeasurementLab.net (M-Lab) initiative has now officially launched. Given how many people have been working on this project, I'm amazed it didn't leak. Having just launched, I've been stunned by the immediate outpouring of interest — not only did it peg our servers, taking a couple of the research tools momentarily offline, but my inbox has been entirely flooded by correspondences. more

VoIP Security Predictions for 2009

Here are my VoIP and Voice security predictions for 2009, limited to just a few, key predictions... The poor economy will slow the adoption rate for VoIP and Unified Communications (UC). This will continue to limit the size of the enterprise VoIP deployments for potential hackers to exploit. VoIP/UC will continue to be mostly an internal/campus application where the threat level for attack is low, so deployments will be largely secured along the same lines as other data network applications. more

Top Ten List of Needed FCC Regulatory Reforms

Honesty is the best policy. At the risk of anthromorphizing a regulatory agency, at the very least the FCC has not told the complete truth, or put itself in a position not to know the truth. The FCC has contributed to debates about what constitutes credible facts and statistics, and what this data means. For example, soon-to-be former FCC Chairman Kevin Martin asserted as the gospel truth his factual conclusion that cable television operators collectively have a 70% market share... The FCC should acknowledge that it may not know all the facts. more

Sun’s New Green Data Centre Expected to Save $1 Million a Year

Responding to market demand for more energy-efficient datacenters, Sun Microsystems, Inc. has announced the completion of its new Broomfield, Colo. datacenter. The largest datacenter consolidation project undertaken in the company's history is expected to save more than $1 million in electricity costs and 11,000 metric tons of CO2 per year in Broomfield. The new Broomfield datacenter follows similar Sun projects completed in Blackwater, UK, Santa Clara, Calif. and Bangalore, India in August 2007. more

Comparing Online Activity Levels of Age Groups, Study Reveals Surprising Results

Contrary to the image of Generation Y as the "Net Generation," internet users in their 20s do not dominate every aspect of online life, says a new report released today by Pew Internet. Based on December 2008 survey conducted by Pew Internet and American Life Project, generation X is the most likely group to bank, shop, and look for health information online. Boomers are just as likely as Generation Y to make travel reservations online. And even Silent Generation internet users are competitive when it comes to email (although teens might point out that this is proof that email is for old people). Over half of the adult internet population is between 18 and 44 years old. But larger percentages of older generations are online now than in the past, and they are doing more activities online, according to surveys. more

Google and Others Launch M-Lab, Allows Users Track ISP Performance

Announced today, Google Inc. along with the New America Foundation's Open Technology Institute, PlanetLab Consortium, and academic researchers are launching a new initiative called Measurement Lab, or M-Lab. According to Google's announcement, M-Lab is an open, distributed server platform for researchers to deploy Internet measurement tools. "The goal of M-Lab is to advance network research and empower the public with useful information about their broadband connections. By enhancing Internet transparency, M-Lab helps sustain a healthy, innovative Internet." more

Vint Cerf: 2009 a Turning Point for the Internet

Patrick Neighly reports on CommsDay about the Pacific Telecommunications Council 2009 Conference held last week where Vint Cerf was a keynote speaker. From the report: "Historians will view 2009 as a turning point in Internet history, according to Google internet evangelist Vint Cerf. Speaking to PTC'09 attendees, the legendary figure warned the industry to brace for 'significant change' and said Asia was poised to forever change the look and experience of the online landscape. The region boasts 578.5 million surfers with nearly 85% of its population still to come. That influx is likely to combine with the launch of non-Latin-character addresses to reshape the Web into a very different beast." more

Domain Name Brand-Sharing Starts With Embracing Web 2.0

Irrespective of which solution to the current domain name brand-sharing impasse ends up being adopted by brand owners (option 1, option 2, or a combination), the owners must first understand and embrace current trends in online communications, information gathering, and entertainment. Thus, for a solution to succeed the corporate mindset toward new technologies needs to change; after that brand owners can work cooperatively with the domain name industry (owners and institutions) to increase the aggregate pie. more

Obama’s Tech Stimulus Plan: Health IT, Broadband, and Smart Grid

Steve Lohr has a nice piece in the New York Times ('Technology Gets a Piece of Stimulus,' 26 Jan 2009, p. C1) this morning about the role that technology and innovation will play in the economic recovery (aka stimulus) bill supported by the Obama Administration. In the past, health IT deployment has been approached as an engineering problem: what computers have to be part of which networks exchanging which types of data? This loses sight of the purpose of electronic medical records... more