Networks

Blogs

Software Has Already Eaten Telecoms (It Just Has Indigestion)

The unconscious and near-universal belief is that packet networks are a telecoms service, and one that constructs an 'additive' resource called 'bandwidth'. This is demonstrably technically false. They deliver distributed computing services, as they calculate how to divide up an underlying telecoms transmission resource. The ubiquitous error is a failure to recognise that the hardware platform has already been devoured by the software industry. more»

What Does the Future Hold for the Internet?

This is the fundamental question that the Internet Society is posing through the report just launched today, our 2017 Global Internet Report: Paths to Our Digital Future. The report is a window into the diverse views and perspectives of a global community that cares deeply about how the Internet will evolve and impact humanity over the next 5-7 years. We couldn't know what we would find when we embarked on the journey to map what stakeholders believe could shape the future of the Internet... more»

Networks Are Not Cars Nor Cell Phones

The network engineering world has long emphasized the longevity of the hardware we buy; I have sat through many vendor presentations where the salesman says "this feature set makes our product future proof! ... Over at the Networking Nerd, Tom has an article posted supporting this view of networking equipment, entitled Network Longevity: Think Car, not iPhone. It seems, to me, that these concepts of longevity have the entire situation precisely backward. more»

In Response to 'Networking Vendors Are Only Good for the Free Lunch'

I ran into an article over at the Register this week which painted the entire networking industry, from vendors to standards bodies, with a rather broad brush. While there are true bits and pieces in the piece, some balance seems to be in order. The article recaps a presentation by Peyton Koran at Electronic Arts (I suspect the Register spiced things up a little for effect); the line of argument seems to run something like this... more»

CE Router Certification Opens Up the Last Mile to IPv6 Fixed-Line

With reference to IPv6, probably most end users do not have any sense of it. The mainstream condition in the industry is that network carriers and content/service providers stick to their own arguments. Carriers consider lack of IPv6 content and service as the reason demand for IPv6 from the users is very low. The content and service providers believe that users cannot have access to content and service through IPv6 and thus carriers should provide the service in the background. more»

The IoT Needs a Paradigm Shift from Security to Safety of Connected Devices

Building IoT ventures from scratch by prototyping hardware devices and their backend systems as well as working for a large company that tries to sell IoT devices itself, we learned a lot about the pitfalls and problems concerning security in the IoT. Nearly every connected device out there proved to be vulnerable to attacks. Researchers showed that it's possible to remotely take control over autonomous vehicles, implanted medical devices were manipulated, voting machines compromised and of course all sorts of other "smart" devices... more»

Probability of ROI and Tighter Network Security by Blocking Malicious Subdomains

Failing to block a stealthy malicious host from making connections to your network could cost your company millions of dollars, a damaged reputation, and severe losses in sensitive private data. Threat intel teams have faced on-going problems: Expensive feeds that are slow to catch new threats; Chasing false positives in alerts wastes time and money; and Vendors selling a new appliance for every ill. Would 100% of your users Spot the Bot? more»

The Internet is Dead - Long Live the Internet

Back in the early 2000s, several notable Internet researchers were predicting the death of the Internet. Based on the narrative, the Internet infrastructure had not been designed for the scale that was being projected at the time, supposedly leading to fatal security and scalability issues. Yet somehow the Internet industry has always found a way to dodge the bullet at the very last minute. more»

The Sustained Potential and Impact of Mobile & Wireless Technologies Access for Emerging Economies

I believe Mobile Information and Communications Technologies (ICTs) are and very well remain powerful and best-suited technologies that will help provide connectivity and digital access in a much faster and cheaper way for developing countries of the globe. Thus, they are to be leveraged within their most strategic and profitable functional or usage contexts. Mobile access technologies along with relevant innovations have formed a powerful springboard for the Internet to be significantly accelerated in terms of access, usage and penetration. more»

Wireless Innovations for a Networked Society

Last week, I had the honor of moderating an engaging panel discussion at Mozilla on the need for community networks and the important role they can play in bridging the digital divide. The panel highlighted the success stories of some of the existing California-based initiatives that are actively working toward building solutions to get under-served communities online. more»

Bespoke Processors and the Future of Networks

As I spend a lot of time on Oak Island (not the one on television, the other one), I tend to notice some of those trivial things in life. For instance, when the tide is pretty close to all the way in, it probably is not going to come in much longer; rather, it is likely to start going back out soon. If you spend any time around clocks with pendulums, you might have noticed the same thing; the maximum point at which the pendulum swings is the point where it also begins swinging back. more»

Nation Scale Internet Filtering — Do's and Don'ts

If a national government wants to prevent certain kinds of Internet communication inside its borders, the costs can be extreme and success will never be more than partial. VPN and tunnel technologies will keep improving as long as there is demand, and filtering or blocking out every such technology will be a never-ending game of one-upmanship. Everyone knows and will always know that determined Internet users will find a way to get to what they want, but sometimes the symbolic message is more important than the operational results. more»

APT: The Cancer Within

Unless you have a team employing the latest proactive threat-hunting techniques, the stealthy Advanced Persistent Threat (APT) hiding in your network can pass by completely unnoticed. There are as many definitions of APT as experts writing about the topic, so let's boil it down to the simple essentials: APTs are usually implanted and maintained by a team of malicious actors with the intention of living long term in your network while extracting valuable private information. more»

Is the Passion Over Net Neutrality Misguided? A New Paper Offers a Fresh Technical Approach

"Net neutrality" is implicitly framed as a debate over how to deliver an equitable ration of quality to each broadband user and application. This is the wrong debate to have, since it is both technically impossible and economically unfair. We should instead be discussing how to create a transparent market for quality that is both achievable and fair. In this paper I propose an alternative approach that (potentially) meets the needs of both consumer advocates and free market proponents. more»

Questions About Cuba's 3G Mobile Expansion

ETECSA, Cuba's telecom provider and sole operator of fixed telephony, mobile, and data in the country, is rolling out 3G mobile service in Havana and elsewhere in the country. Telegeography reports there are now 229 3G base stations in Cuba... ETECSA says 3G coverage is available in all of Havana, provincial capitals and tourist resorts. AT&T says there is GSM/GPRS coverage for 85% of national territory. more»

News Briefs

Russia Appears to Have Begun Providing an Internet Connection to North Korea

The Impacts of Hurricanes Harvey, Irma, and Maria on the Internet

Over 190 Internet Engineers, Pioneers, Technologists File Comments with FCC on Net Neutrality

Complete Internet Shutdown Reported in Syria

Mozilla, National Science Foundation Offer $2M Prize for a Decentralized Web

Cisco Introduces Intent-Based Network That Can Learn, Adapt and Mitigate Threats

5G Frequency Fees Are Waived in Singapore to Help Drive Market Tests

Trump Signs Cybersecurity Executive Order, Experts Weigh in on the New Draft

French Presidential Candidate Confirms Massive Hack, Emails Dumped Online Two Days Before Election

Seattle Restores ISP Privacy Rules. Could be First of Many Cities to Defeat FCC's Privacy Roll Back

Germany Investigating Legal Grounds to Destroy Servers Used to Carry Out Cyberattacks

Internet Heavy Weights Staying Out of Net Neutrality Battle

Fierce Political Battle Expected as FCC Chair Elaborated on Plan to Reverse 'Net Neutrality' Rules

Cuba Getting Faster YouTube Access in Next 24 Hours, Thanks to Deal Signed in December

Substantial Majority of Americans Say Local Governments Should Be Able to Build Their Own Broadband

Researches Demonstrate How IPv6 Attacks Can Bypass Network Intrusion Detection Systems

Interpol's Michael Moran Receives 2017 M3AAWG Litynski Award

China's First IPv6-Only Backbone Network Connecting 1,200 More Campuses

Data Breaches Reported During 2016 Exposed Over 4.2 Billion Records

Canadian Energy Firms at Bigger Risk of Cyberattack

Most Viewed

Most Commented

Industry Updates

Participants – Random Selection