Home / Blogs

In an Internet Minute

Mark Goldberg

What Happens in an Internet Minute
Source: Intel (Click to Enlarge)
Intel sent an interesting infographic: What Happens in an Internet Minute.

Looking at the traffic data, Intel asks if there is sufficient attention being paid to investment in infrastructure.

Imagine the state of the network in three years, when the number of connected devices is projected to be double the world's population. Can our networks scale to handle predicted traffic and meet consumer expectations for immediate access from multiple devices?

What about security?

Among highlights from the infographic:

  • Nearly 640 Terabytes of traffic are being transferred each minute by global IP networks;
  • 6 million Facebook views; 2 million Google search queries;
  • 30 hours of video are being uploaded to YouTube; and
  • 1.3 million videos are being viewed.

The email I received put it this way:

Governments invest in infrastructure every day — roads, bridges and airports — but what about network infrastructure?

Hopefully, network operators will not follow the practice of governments in infrastructure investment. The state of our roads, bridges and airports seem to be case studies on why network investment is best handled by the private sector. My experience is that governments tend to use "just too late" provisioning.

By Mark Goldberg, Telecommunications Consultant. More blog posts from Mark Goldberg can also be read here.

Related topics: Data Center, Security

WEEKLY WRAP — Get CircleID's Weekly Summary Report by Email:

Comments

To post comments, please login or create an account.

Related Blogs

Related News

Topics

Industry Updates – Sponsored Posts

DotConnectAfrica Delegates Attend the Kenya Internet Governance Forum

3 Questions to Ask Your DNS Host about Lowering DDoS Risks

Continuing to Work in the Public Interest

Verisign Named to the OTA's 2014 Online Trust Honor Roll

4 Minutes Vs. 4 Hours: A Responder Explains Emergency DDoS Mitigation

Dyn Acquires Internet Intelligence Company, Renesys

Tips to Address New FFIEC DDoS Requirements

Smokescreening: Data Theft Makes DDoS More Dangerous

dotStrategy Selects Neustar's Registry Threat Mitigation Services for .BUZZ Registry

24 Million Home Routers Expose ISPs to Massive DNS-Based DDoS Attacks

What Does a DDoS Attack Look Like? (Watch First 3 Minutes of an Actual Attack)

Joining Forces to Advance Protection Against Growing Diversity of DDoS Attacks

Why Managed DNS Means Secure DNS

Rodney Joffe on Why DNS Has Become a Favorite Attack Vector

Motivated to Solve Problems at Verisign

Diversity, Openness and vBSDcon 2013

Neustar's Proposal for New gTLD Collision Risk Mitigation

IT Project Management: Best Practices in Small-Scale Engagements

DDoS Attacks in the United Kingdom: 2012 Annual Trends and Impact Survey

7 Keys to Professional Services Value: A Client-Side Perspective

Sponsored Topics