Archive for 2011/03/27
Deep-packet inspection (DPI) first came into being more than 10 years ago and appears to be the most popular policy-management choice, going all the way to Layer 7. It’s primarily associated with controlling peer-to-peer traffic and other bandwidth hogs, but it’s also used to handle security threats and for analyticsPosted: 2011/03/27 in Bandwidth Management, Education / Awareness, Filtering, Network Security, Privacy / Data Protection, Tech Evolution
And there are five catalysts to get carriers moving on the DPI front:
- It allows operators to apply “fair use” management techniques.
- It will help push the move toward tiered pricing.
- It will improve the quality and depth of network traffic.
- It will allow carriers to meter usage and charge customers accordingly.
- It provides better intelligence regarding subscriber behavior, thus allowing them to create subscriber profiles.
But wait, there’s more. Some of the new ideas coming out of DPI deployment include:
- Allowing unlimited access to Facebook and other social-networking sites when the network is uncongested.
- The ability for subscribers to block home Internet access during designated family “quiet periods.”
- Better parental control.
- An initial lowering of data charges to encourage using mobile video for such events as concerts.
- Data service promotions in underutilized cells.
The bottom line is that DPI gives operators the tools to begin charging subscribers for the data they use, and isn’t that the whole idea?
Procera Networks Inc., the intelligent policy enforcement company, announced its expanded presence in Asia Pacific with two new regional offices covering Australia and New Zealand, and in Hong Kong also covering Greater China; as well as three new ProceraPro channel partners in the regionPosted: 2011/03/27 in Bandwidth Management, Education / Awareness, Filtering, Network Security, Privacy / Data Protection, Tech Evolution
Infonetics Research predicts in its “Service Provider Deep Packet Inspection Products Outlook,” from December 2010, that the APAC region will grow faster than any other region in the coming four years. This will make Asia Pacific the largest market for DPI-based Intelligent Policy Enforcement.
The SuperMassive E10000 Series utilizes SonicWALL’s Reassembly-Free Deep Packet Inspection (RFDPI) engine to scan every byte of every packet with full content inspection of the entire stream while providing high performance and low latency. The RFDPI engine also ensures full inspection of SSL-encrypted traffic as well as non-proxyable applicationsPosted: 2011/03/27 in Bandwidth Management, Education / Awareness, Filtering, Network Security, Privacy / Data Protection, Tech Evolution
It enables comprehensive protection regardless of transport or protocol. The SonicWALL SuperMassive E10000 Series addresses the security needs of enterprises, governments, universities, and service provider deployments and secures enterprise networks, data centers and server farms
Policy enforcement and monitoring have become critical elements of assuring performance in today’s bandwidth-constrained networks, and DPI is the key enabling technology. With the skyrocketing increase in network traffic from advanced, bandwidth-hungry content like converged voice and video, packet processing solutions need to be able to mirror the resulting massive increase in throughput requirements. With up to 320Gbps system capacity, FlexTCA is the right platform at the right timePosted: 2011/03/27 in Bandwidth Management, Education / Awareness, Filtering, Network Security, Privacy / Data Protection, Tech Evolution
Network Application Visibility Layer (NAVL) application is aimed at makers of next generation network firewalls, universal threat management appliances, application delivery controllers and WAN optimization equipment manufacturers. It uses a combination of deep packet inspection, behavioural inspection, protocol dissection, and heuristic analysis to classify application signaturesPosted: 2011/03/27 in Bandwidth Management, Education / Awareness, Filtering, New Business Models, Tech Evolution
Network Reporting Centre (NRC) is a tool for end users which can easily pull network performance data together from NAVL and other sources
Neural control of cursor trajectory and click by a human with tetraplegia 1000 days after implant of an intracortical microelectrode arrayPosted: 2011/03/27 in Education / Awareness, Stats / reports, Tech Evolution
India is set to block the Internet’s newly-formed, highly controversial cyber “red-light district” after a global agency governing the web approved .xxx suffix for pornographic websites last weekPosted: 2011/03/27 in Blocking, Education / Awareness, Public Policy
Extradition: Gary McKinnon – Is it not ironic that a Parliament which has voted against the lengthy detention of criminals should keep a young man suffering from the condition known as Asperger’s syndrome in psychological torture for more than 3,300 days? Is it not time for the Home Office to liaise with those who have expertise in autism?Posted: 2011/03/27 in Cybercrime, Education / Awareness, Public Policy
As part of Google’s ongoing commitment to encouraging women to excel in computing and technology, Google is pleased to announce the Hack in The Box 2011 Conference Grant. This grant is set up to enable more female computer scientists to attend and participate in HITB2011AMSPosted: 2011/03/27 in Education / Awareness, Google
The grant includes a pass to the conference on 19th and 20th of May (accommodation not included) & travel expenses up to EUR500! We encourage all female hackers and computer scientists to apply.
To be eligible for a conference grant, candidates must:
• Be a female working in or studying Computer Science
• Maintain a strong academic background with demonstrated leadership ability
• Be able to attend the 2 full days of the main conference
Panda Security Study Reveals 63 Percent of Schools Plagued by IT Security Breaches at Least Twice a YearPosted: 2011/03/27 in Cybercrime, Education / Awareness, Stats / reports
Using “SpoofCard.com,” one of many Internet services that permit callers to hide their phone number and even change the sound of their voice, Hart made calls warning the woman that she had 10 days to leave California “or else.” In another call, he said, “You’re going to [obscenity] die.”Posted: 2011/03/27 in Education / Awareness, Mobile tech, New Business Models, Privacy / Data Protection, Tech Evolution
SpoofCard.com – Caller ID Spoofing, Voice Changing & Call Recording | Prank Calls