Archive

Category Archives for "Networking"

LoRaWAN key to building full-stack production IoT networks

Outside of the consumer market, real examples of the Internet of Things (IoT) often disappoint because in the end, they are limited by one or more of the IoT’s constraints: tens of billions of devices, cheap to acquire, cheap to deploy, security and ubiquitous connections.I spoke with Dave Kjendal, Senet’s vice president of engineering and CTO, because he has built products and networks that meet these constraints. It was insightful because Senet has produced products using the entire IoT stack. Senet’s evolution began in 2009 with low-cost fuel oil tank sensors communicating over the unlicensed airwaves to optimize delivery routes. The company now operates a general purpose LoRaWAN IoT network that covers one-fortieth of the United States. LoRaWAN is an implementation of low-power, wide-area networks designed to transmit small messages at a frequency of about one an hour. It serves about 55 percent of IoT WAN connectivity. It is a different technical approach than what the mobile carriers promise with 3GPP, which is yet to be standardized.To read this article in full or to leave a comment, please click here

Contrarian Reading on Net Neutrality

‘net neturality has been much in the news recently; a while back I did a piece for Tech Target on some of the complexities here, and I ran across three other articles that provide a contrarian view—not what you are likely to hear from the major edge providers. Since I am always trying to understand both sides of an issue, I am always looking for solid, well written views on both sides. It is hard to dig behind the hype in our 140 character world, but it is also important.

Hence this post, with pointers to my older post and three other articles of interest. Warning: some of these are more trenchant and contrarian than others.

The primary foundation of net neutrality explained is this: Providers should not be able to give services they offer any advantage over a competing service running over their network. The perfect example might seem to be voice services. Suppose you purchase access to the internet from a company that not only sells internet access, but also voice services. Now, suppose the provider decides to sell its voice service as superior in quality to any other available voice service — and guarantee its service is Continue reading

IoT in the office: Plantronics service blocks annoying noises

The Internet of Things (IoT) is creating interesting, new business opportunities. This week, Plantronics announced a new noise-as-a-service portfolio called Habitat Soundscaping. The solution set is designed to counteract the productivity-killing side effects of open offices.Habitat Soundscaping sounds a bit crazy, so let’s hear them out.Plantronics has been around since the early 1960s when it launched lightweight aviation headsets. Its business opportunities expanded from pilots to include astronauts, call center agents, knowledge workers and mobile professionals. Headsets evolved from big clunky proprietary interfaces through 2.5 and 3.5 mm jacks to USB to Bluetooth.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Can SD-WANs meet standards requirements?

Any innovative technology faces a battle of doubt. When Amazon first rolled out AWS, few could imagine servers running in the cloud. Before Salesforce, many thought CRM to be too critical to run as SaaS. I find SD-WANs to be facing a similar battle. It’s inconceivable to many that an SD-WAN could replace MPLS. This is particularly true for security teams.At one recent client, a chemical company, the team was looking to transition from MPLS to SD-WAN. The security group, though, could not accept the fact that SD-WANs met the requirements stipulated by CFATS (Chemical Facility Anti-Terrorism Standards) guiding the chemical industry.It was a classic example of professionals getting hooked into the implementation and failing to consider alternative approaches to addressing the same need. CFATS professionals assume MPLS and firewalls to be mandated by the standard. MPLS being the de facto transport. As for firewalls, “Organizations understand and feel safe with firewalls,” says Nirvik Nandy, my partner and the president and CEO, of Red Lantern, a security and compliance consultancy.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Can SD-WANs meet standards requirements?

Any innovative technology faces a battle of doubt. When Amazon first rolled out AWS, few could imagine servers running in the cloud. Before Salesforce, many thought CRM to be too critical to run as SaaS. I find SD-WANs to be facing a similar battle. It’s inconceivable to many that an SD-WAN could replace MPLS. This is particularly true for security teams.At one recent client, a chemical company, the team was looking to transition from MPLS to SD-WAN. The security group, though, could not accept the fact that SD-WANs met the requirements stipulated by CFATS (Chemical Facility Anti-Terrorism Standards) guiding the chemical industry.It was a classic example of professionals getting hooked into the implementation and failing to consider alternative approaches to addressing the same need. CFATS professionals assume MPLS and firewalls to be mandated by the standard. MPLS being the de facto transport. As for firewalls, “Organizations understand and feel safe with firewalls,” says Nirvik Nandy, my partner and the president and CEO, of Red Lantern, a security and compliance consultancy.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Can SD-WANs meet standards requirements?

Any innovative technology faces a battle of doubt. When Amazon first rolled out AWS, few could imagine servers running in the cloud. Before Salesforce, many thought CRM to be too critical to run as SaaS. I find SD-WANs to be facing a similar battle. It’s inconceivable to many that an SD-WAN could replace MPLS. This is particularly true for security teams.At one recent client, a chemical company, the team was looking to transition from MPLS to SD-WAN. The security group, though, could not accept the fact that SD-WANs met the requirements stipulated by CFATS (Chemical Facility Anti-Terrorism Standards) guiding the chemical industry.It was a classic example of professionals getting hooked into the implementation and failing to consider alternative approaches to addressing the same need. CFATS professionals assume MPLS and firewalls to be mandated by the standard. MPLS being the de facto transport. As for firewalls, “Organizations understand and feel safe with firewalls,” says Nirvik Nandy, my partner and the president and CEO, of Red Lantern, a security and compliance consultancy.To read this article in full or to leave a comment, please click here

13% off Zeiss Pre-Moistened Lens Cleaning Wipes – Deal Alert

Zeiss provides an effective way to clean and preserve valuable optics. Whether used with camera lenses, eyeglasses, sunglasses, telescopes, or spotting scopes, these non-abrasive pre-moistened wipes are safe and effective. These ammonia-free wipes are appropriate for anti-reflective coatings and may also be used to clean laptop, GPS, tablet, or cell phone screens without leaving streaks. Designed for a single use, these wipes come in individual disposable packets.  The wipes are highly rated on Amazon, where it currently averages 4.7 out of 5 stars (read reviews). Its typical list price of $29.99 has been reduced 13% to $25.99 for a pack of 400. See the discounted Lens Cleaning Wipes now on Amazon.To read this article in full or to leave a comment, please click here

Telecom Heroics in Somalia

Internet service in and around Mogadishu, Somalia suffered a crippling blow recently as the East African Submarine System (EASSy) cable, which provides service to the area, was cut by the anchor of a passing ship.  The government of Somalia estimated that the impact of the submarine cable cut was US$10 million per day and detained the MSC Alice, the cargo vessel that reportedly caused the damage.

The cable was repaired on 17 July. The incident is the latest in a series of recent submarine cable breaks (see Nigeria, Ecuador, Congo-Brazzaville and Vietnam) that remind us how dependent much of the world remains on a limited set of physical connections which maintain connectivity to the global Internet.

Internet in Mogadishu

 

The story of how high-speed Internet service came to Mogadishu is nothing short of remarkable.  It involved Somali telecommunications personnel staring down the threat of a local terrorist group (Al-Shabaab) in order to establish Somalia’s first submarine cable connection.  This submarine cable link would be vital if Mogadishu were to have any hope of improving its local economy and ending decades of violence and hunger.  However, in January 2014, Al-Shabaab Continue reading

Episode 8 – Wireless Misconceptions

For many the world of wireless networking is a world that is dark and full of terrors, but it doesn’t have to be that way. In this episode of Network Collective, the panel reveals many of the most common wireless networking misconceptions so you too can be a wizard in the black art of RF. I promise, no RF math was used in the filming of this episode.

—–
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/


Scott McDermott
Guest
Luke Jenkins
Guest
Glenn Cate
Guest
Jordan Martin
Co-Host
Eyvonne Sharp
Co-Host
Phil Gervasi
Co-Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post Episode 8 – Wireless Misconceptions appeared first on Network Collective.

Episode 8 – Wireless Misconceptions

For many the world of wireless networking is a world that is dark and full of terrors, but it doesn’t have to be that way. In this episode of Network Collective, the panel reveals many of the most common wireless networking misconceptions so you too can be a wizard in the black art of RF. I promise, no RF math was used in the filming of this episode.

—–
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/


Scott McDermott
Guest
Luke Jenkins
Guest
Glenn Cate
Guest
Jordan Martin
Co-Host
Eyvonne Sharp
Co-Host
Phil Gervasi
Co-Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post Episode 8 – Wireless Misconceptions appeared first on Network Collective.