Mike Fratto

Network Computing Editor


Upcoming Events

A Network Computing Webcast:
SSDs and New Storage Options in the Data Center

March 13, 2013
11:00 AM PT / 2:00 PM ET

Solid state is showing up at every level of the storage stack -- as a memory cache, an auxiliary storage tier for hot data that's automatically shuttled between flash and mechanical disk, even as dedicated primary storage, so-called Tier 0. But if funds are limited, where should you use solid state to get the best bang for the buck? In this Network Computing webcast, we'll discuss various deployment options.

Register Now!


Interop Las Vegas 2013
May 6-10, 2013
Mandalay Bay Conference Center
Las Vegas

Attend Interop Las Vegas 2013 and get access to 125+ workshops and conference classes, 350+ exhibiting companies and the latest tech.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Vendor NewsFeed

More Vendor NewsFeed »

See more from this blogger

Vint Cerf's Internet Safety

At the Internet Society NY INET conference, there was a wide-ranging discussion on a variety of topics, from Net neutrality to privacy. A highlight was Vint Cerf’s keynote in the afternoon. He focused on the importance of safety mechanisms for those using the Internet--safety in terms of being protected from abusive behavior and safety in terms of the ability to speak freely and, where and when needed, remain anonymous. These are big issues in the international theater.

Cerf carefully balances anonymity and identification by making a clear distinction between an identifier, which is some unique blob of data, and identification, which relates to a specific person or computer. What hangs in the balance is the user's ability to determine to whom and when they want to identify themselves to someone else. If you are a corporate whistle blower or a rebel in an oppressive regime, you probably want to protect your identity lest you be fired, jailed or killed for your actions.

However, if you are using the Internet to buy shoes with a credit card, you want the shopping application to ensure that you are using your credit card and not someone who has stolen your identity. There are a number of examples where you want to share your identity--or not--and organizations like ISOC, standards groups, nations and concerned parties are trying to define policies and technologies that can address competing concerns.

Identity leakage is pervasive, and it exists up and down the application stack. For example, IPv6 nodes using Stateless Address Auto Configuration (SLAAC) will typically use a computer's NIC MAC address as the host portion of the IPv6 address. MAC addresses are globally unique and, when combined with network components from router advertisements, should enable globally unique IPv6 addresses. However, since MAC addresses don't change, the host identifier is a good way to track computers and therefore users, as they move from network to network, globally. IETF RFC 4941 "Privacy Extensions to Autoconf" defines "mechanisms that eliminate this issue in those situations where it is a concern."


Page:  1 | 2  | Next Page »


Related Reading


More Insights


Network Computing encourages readers to engage in spirited, healthy debate, including taking us to task. However, Network Computing moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. Network Computing further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | Please read our commenting policy.
 
IaaS Providers
Cloud Computing Comparison
With 17 top vendors and features matrixes covering more than 60 decision points, this is your one-stop shop for an IaaS shortlist.
IaaS Providers

IPv6 Reports

Research and Reports

The Virtual Network
February 2013

Network Computing: February 2013

Upcoming Events



TechWeb Careers