Data Center


Regulation and Reason

Imagine living in a country where it was necessary to register with your community government by providing a copy of one of the following... This may be necessary in perhaps a large number of nations. However, as a United States citizen and resident, I was quite surprised when my local community issued the request. I investigated and found much to my dismay, that my community in fact was required by regulation to survey its residents on a biennial basis. more»

Future Network Forum to Be Held in Nanjing in December 2015

Between December 10th and 11th 2015, the China Future Network Development and Innovation Forum, jointly hosted by the Chinese Academy of Engineering and the Nanjing Municipal Government, is scheduled to be held in Nanjing, Jiangsu, China. The forum will be jointly organized by Jiangsu Future Networks Innovation Institute and Beijing Internet Institute, with the theme of "Building future network test facilities and promoting network development & innovation", and it will invite nearly a hundred industrial experts at home and abroad, to establish a platform marked by security, innovation, openness, cooperation where the policy, industry, academics, and application are integrated. more»

Correcting Federal Databases: A Procedural Guide

Federal databases, such as those being compiled by the Consumer Financial Protection Bureau and the Federal Trade Commission, contain data about many people and businesses. Although some of this data may be protected personal information (PPI), there is also extensive information in federal databases that is publicly disseminated via the internet. If the information is wrong, it has the potential to be a vector of tortious mischief. more»

ICT Sectors Are Merging Into a New Wholesale Platform for the Networked Economy

There certainly is a lot of interest in the IoT (personal devices) and M2M (industrial applications) market. But what we are seeing is only what is happening on the surface. Most of the IoT and M2M activities are taking place unseen. For example, all new electronic devices (smartphones, tablets, set-top boxes, game consoles) are now IoT devices. Wearable technology has also become a thriving part of the IoT industry, with an ever-broadening range of possible uses and devices, including smart watches, glasses, clothing items, skin patches, and even implants for health monitoring. more»

Cloud Versus Dedicated Data Centers: Rumble in the Virtual Jungle

Cloud or dedicated? That's the question companies face each time they need new storage space or resources -- is it better to build local or host off site? Both tech segments are performing strongly, with the global data center blade server market to reach more than $15 billion by 2019 at a compound annual growth rate of 10.25 percent and cloud computing sitting on a $16 billion market that's only trending up thanks to increased public and hybrid adoption. In other words, it's virtual war: Who wins the battle? more»

So You've Got Some Big Data, but Now What?

As Internet connection continues on a steady path of becoming a ubiquitous commodity in mature markets, we saw an eruption of big data tracking and analysis software in 2014. But what are operators going to do with all this new information? And how can they turn data into revenue? To start with, providers need more than just a data measurement tool. They need a solution that can analyze real-time data and then automate processes to optimize their networks and improve their subscribers' experiences. more»

The IETF's *Other* Diversity Challenge: An Update

Last June I wrote an article titled "The IETF's Other Diversity Challenge" where I discussed the positive steps the Internet Engineering Task Force (IETF) is taking to increase the diversity of its participants and raised a potentially overlooked demographic: Network Operators. That essay was a problem statement of sorts, and I was long ago taught that you should only raise problems that you have a solution for, or are at least willing to help solve. more»

A Cynic's View of 2015 Security Predictions - Part 2

Every year those in the security industry are bombarded with various cyber security predictions. There's the good, the bad and the ugly. Some predictions are fairly ground breaking, while others are just recycled from previous years -- that's allowed of course if the threats still stand. In part one of my predictions I looked at the malware threats, so let's take a look at big data and the cloud for part two. more»

Business Model Canvas for SaaS Providers

As a follow up to the earlier article on the IaaS business model, here is a high level overview of the SaaS provider business model and some of the strategic options that are in there... As examples in this article I consider two hypothetical SaaS providers. The first one delivers bookkeeping software, the second one delivers a project collaboration platform. more»

Big Data Stress? Go Zen With These 5 Technologies

The promise of "big data" -- real-time insights, predictive analytics and a better understanding of customer behaviors -- has many companies jumping into this near-bottomless information pool with both feet. But the sheer volume of data can cause serious stress for IT professionals trying to balance C-suite expectations, legacy tech limitations and corporate workloads. What's more, the data market is rapidly evolving. more»

AXIS - The Fulcrum of Africa's Internet Success

The Internet Society (ISOC) has been working with the African Union (AU) to facilitate the African Internet Exchange System (AXIS). This AXIS project funded by the EU-Africa Infrastructure Trust Fund and the Government of Luxembourg will help keep Internet traffic in Africa internal to the continent and avoid expensive international transit costs and delay latency in routing Internet traffic through other continents. more»

Painting Ourselves Into a Corner with Path MTU Discovery

In Tony Li's article on path MTU discovery we see this text: "The next attempt to solve the MTU problem has been Packetization Layer Path MTU Discovery (PLPMTUD). Rather than depending on ICMP messaging, in this approach, the transport layer depends on packet loss to determine that the packet was too big for the network. Heuristics are used to differentiate between MTU problems and congestion. Obviously, this technique is only practical for protocols where the source can determine that there has been packet loss. Unidirectional, unacknowledged transfers, typically using UDP, would not be able to use this mechanism. To date, PLPMTUD hasn't demonstrated a significant improvement in the situation." Tony's article is (as usual) quite readable and useful, but my specific concern here is DNS... more»

The IETF's *Other* Diversity Challenge

The Internet Engineering Task Force (IETF) is the standards body for the Internet. It is the organization that publishes and maintains the standards describing the Internet Protocol (IP -- versions 4 and 6), and all directly related and supporting protocols, such as TCP, UDP, DNS (and DNSSEC), BGP, DHCP, NDP, the list goes on, and on... But how do they do that? How does the IETF produce documents, and ensure that they are high quality, relevant, and influential? more»

Future of Cloud Computing and Why It's Here to Stay

Nowadays, everybody is talking about cloud computing. Fans say it's the future, the answer to every problem with computing as we know it; others say it's just a fad and will eventually die. Who's right? While nobody knows the future, the fact is, enough evidence is available that we can all reasonably predict what's coming. Consider these facts... more»

Securing the Core

BGP. Border Gateway Protocol. The de-facto standard routing protocol of the Internet. The nervous system of the Internet. I don't think I can overstate the importance, the criticality of BGP to the operation of the modern Internet. BGP is the glue that holds the Internet together at its core. And like so many integral pieces of the Internet, it, too, is designed and built on the principle of trust... The folks who operate the individual networks that make up the Internet are generally interested in keeping the Internet operating, in keeping the packets flowing. And they do a great job, for the most part. more»

News Briefs

Air Pollution in China Causing Higher Data Center Equipment Failure Rates

Internet Is Too Loud, Literally

Google Spent $7.3 Billion on Data Centers in 2013, Double Its 2012 Spending

Google Announces Major Data Center Expansions, Finland Investment Tops $1 Billion USD

Google DNS to Be Discontinued in Brazil Ahead of New Law

Brazil Pushing Plans for Local Internet Data Storage Amid U.S. Spying

EU Politicians Call for Immediate Suspension of Data-Sharing Agreement Amid New NSA Allegations

A Quick Look at Today's Amazon Outage

NSA Builds Its Biggest Data Farm Amidst Controversy

Bloomberg on Netflix as World's Biggest User of Cloud Computing

Hurricane Sandy Causes Major Impact on Internet Infrastructure in New York City and Beyond

Google Launches Storage Service, "Drive"

White House Launches Big Data Research and Development Initiative

SEC Filing Reveals Facebook Network Equipment Valued Over $1B at Close of 2011

White House Issues Cloud Computing Policy Standards

Cloud Computing Traffic Expected to Grow 12-Fold by 2015

EU Does a 180 on Search Engine Data Retention

Digital River Sues Eric Porat of Brooklyn, New York over Data Breach

YouTube Serving Over 2 Billion Views a Day in 5th Year of Operation

German High Court Says No to Retaining Telecom, Email Data for Tracking Criminal Networks

Most Viewed

Most Commented

Industry Updates

Participants – Random Selection