[kml_flashembed movie="http://youtube.com/v/-QMEf3FfuoI" width="425" height="350" wmode="transparent" /]
Net neutrality is the principle that data packets on the Internet should be moved impartially, without regard to content, destination or source.
[kml_flashembed movie="http://youtube.com/v/RbY8Hb6abbg" width="425" height="350" wmode="transparent" /]
An animated explanation about how data is moved around on the Internet.
[kml_flashembed movie="http://www.youtube.com/v/CJo0RVdNIMU" width="425" height="350" wmode="transparent" /]
|The industry’s trade body, the ISPA, has spent months in discussions with music and movie companies about ways of preventing illegal filesharing, but buoyed by recent success in France, the major record labels and Hollywood studios have lobbied the government hard for faster action.
Richard Wray, Filesharing law ‘unworkable’
If you asked yourself “What recent success in France?” like I did, here you go. Short version? There are less than a dozen ISPs in France. All the stakeholders got together and agreed that service providers in France will issue warning messages to customers who are downloading files illegally — and if the customer ignores the message, he loses Internet access. An independent authority, supervised by a judge, will be in charge.
|The price of memory has decreased to the point where it is now possible to maintain flow state at the input port rather than trying to control flows at the output queue.
Larry Roberts as quoted in Jim Duffy’s article ‘Net pioneer Roberts touts ‘Fast Flow Routing’
Larry Roberts is one of the designers and developers of the ARPANET. He also founded Anagran, a company that sells the Anagran FR-1000 Flow Router. The list price for the FR-1000 is $70,000.
According to the Anagran website:
Conventional wisdom for the past 40 years had concluded that while potentially enormously powerful, flow technology was too expensive to implement in a commercial product due to the amount of memory required to maintain state information on every flow. However, the steep and rapid decline in memory cost over the past decade has actually made keeping flow state virtually insignificant from a cost standpoint. In fact, flow technology is not just feasible, but is now an extremely cost-effective and efficient way to optimize flows.
Had to look it up: A flow is a single meaningful end-to-end activity over the network.
Retired AT&T technician Mark Klein explains why the NSA has to spy on everybody.
[kml_flashembed movie="http://www.youtube.com/v/LDk6jxcSDlQ" width="425" height="350" wmode="transparent" /]
The mission of the Internet Crime Complaint Center (IC3) is “to serve as a vehicle to receive, develop, and refer criminal complaints regarding the rapidly expanding arena of cyber crime.”
The IC3 gives the victims of cyber crime a convenient and easy-to-use reporting mechanism that alerts authorities of suspected criminal or civil violations. For law enforcement and regulatory agencies at the federal, state, local, and international level, IC3 provides a central referral mechanism for complaints involving Internet related crimes.
|One of the earliest drivers for pseudowire standards came from the need to run virtual circuit services such as frame relay and ATM over IP.Tom Nolle, Pseudowires: Reality vs. Hype|
I need to read more about how pseudowires fit into Cisco’s AToM (Any Transport over MPLS.) Luca Martini is now an exec at Cisco. Here’s more about “Dry Martini.”
Where the original Martini pseudowire work was intended primarily for transparent LAN services and virtual LAN services over the WAN, Dry Martini was expected to map Layer 2 services over optical wavelengths, ATM virtual circuits, Sonet cross-connects or other transport options, without requiring MPLS going out to endpoints. Ironically enough, although the work was an extension to MPLS, it eliminated the need to use Layer 3 MPLS to the client. As a result, Dry Martini became known as Transport MPLS.
|“Do we really need another fish-related buzzword? I’m beginning to wonder if the security community will ever find another classification of security problems that doesn’t involve the act of feeding oneself.
I can’t decide which is worse, this or spear phishing. I suppose it’s the latter, as it’s often used incorrectly to describe any targeted email attack – even those not attempting to coax PII out of hapless users.
Once we get into crustaceans and invertebrates, I quit.”
Michael Cloppert , Vishing
Let’s see…there’s phishing, spear phishing, SMiSHing, Rock Phish and now vishing. Did I miss any?
|A new energy-capturing knee brace can generate enough electricity from walking to operate a portable GPS locator, a cell phone, a motorized prosthetic joint or an implanted neurotransmitter. With each stride the leg accelerates and then decelerates, using energy both for moving and braking. It’s sort of like the way that some hybrid-electric cars produce electricity from braking.
Randolph E. Schmid, Device generates power from a knee’s swing
(Photo Credit: Greg Ehlers/Simon Fraser University)