Home / Blogs

In an Internet Minute

Mark Goldberg

What Happens in an Internet Minute
Source: Intel (Click to Enlarge)
Intel sent an interesting infographic: What Happens in an Internet Minute.

Looking at the traffic data, Intel asks if there is sufficient attention being paid to investment in infrastructure.

Imagine the state of the network in three years, when the number of connected devices is projected to be double the world's population. Can our networks scale to handle predicted traffic and meet consumer expectations for immediate access from multiple devices?

What about security?

Among highlights from the infographic:

  • Nearly 640 Terabytes of traffic are being transferred each minute by global IP networks;
  • 6 million Facebook views; 2 million Google search queries;
  • 30 hours of video are being uploaded to YouTube; and
  • 1.3 million videos are being viewed.

The email I received put it this way:

Governments invest in infrastructure every day — roads, bridges and airports — but what about network infrastructure?

Hopefully, network operators will not follow the practice of governments in infrastructure investment. The state of our roads, bridges and airports seem to be case studies on why network investment is best handled by the private sector. My experience is that governments tend to use "just too late" provisioning.

By Mark Goldberg, Telecommunications Consultant. More blog posts from Mark Goldberg can also be read here.

Related topics: Data Center, Security

 
   
WEEKLY WRAP — Get CircleID's Weekly Summary Report by Email:

Comments

To post comments, please login or create an account.

Related Blogs

Related News

Explore Topics

Industry Updates – Sponsored Posts

Encrypting Inbound and Outbound Email Connections with PowerMTA

Resilient Cybersecurity: Dealing with On-Premise, Cloud-Based and Hybrid Security Complexities

Verisign Releases Q4 2015 DDoS Trends - DDoS Attack Activity Increasing by 85% Year Over Year

Best Practices from Verizon - Proactively Mitigating Emerging Fraudulent Activities

Neustar Data Identifies Most Popular Times of Year for DDoS Attacks in 2015

The Framework for Resilient Cybersecurity (Webinar)

Data Volumes and Network Stress to Be Top IoT Concerns

DKIM for ESPs: The Struggle of Living Up to the Ideal

Verisign Mitigates More Attack Activity in Q3 2015 Than Any Other Quarter During Last Two Years

Verisign & Forrester Webinar: Defending Against Cyber Threats in Complex Hybrid-Cloud Environments

Dyn Evolves Internet Performance Space with Launch of Internet Intelligence

Introducing Verisign Public DNS: A Free Recursive DNS Service That Respects Your Privacy

Faster DDoS Mitigation - Introducing Verisign OpenHybrid Customer Activated Mitigation

Verisign's Q2'15 DDoS Trends: DDoS for Bitcoin Increasingly Targets Financial Industry

Protect Your Network From BYOD Malware Threats With The Verisign DNS Firewall

Announcing Verisign IntelGraph: Unprecedented Context for Cybersecurity Intelligence

Introducing the Verisign DNS Firewall

TLD Security, Spec 11 and Business Implications

Verisign Named to the Online Trust Alliance's 2015 Honor Roll

3 Key Steps for SMBs to Protect Their Website and Critical Internet Services

Sponsored Topics

Verisign

Security

Sponsored by
Verisign
Afilias

DNS Security

Sponsored by
Afilias
Afilias - Mobile & Web Services

Mobile

Sponsored by
Afilias - Mobile & Web Services
Port25

Email

Sponsored by
Port25