peshkova - Fotolia
As the address blocks within IPv4 become exhausted, service providers are turning to IPv6 to continute to grow the customer base. Doyle says this is particularly true for service providers like Comcast, Cox Communications and CenturyLink Inc. that do business directly with home or small office users. Doyle explains that the sooner an organization prepares for IPv6 deployment, the better. "If you are a service provider and you are not actively planning for IPv6 then you’re in big trouble," Doyle says. He says it takes a couple of years just to start getting a network ready for the switch.
While running out of IP addresses is a main impetus fueling service provider migration, enterprise deployment of IPv6 is driven by different forces. Their big incentive is that most of their customer base will be using IPv6. Doyle says that in areas where IPv4 addresses have been depleted, like the APNIC regions of Japan, China and South Korea, if you want to open branches in those countries and do business, you’re going to have to deal with IPv6. Enterprises with remote workers will also have to retool their infrastructures to support employees accessing virtual private networks (VPN) over IPv6.
Read more about why IPv6 deployment is necessary for both service providers and the enterprise.
Consumer right to privacy outweighs government’s right to information
Consumer privacy concerns have reached such a high level that it will take only one event to ratchet up calls for reform. That's what Current Analysis analyst Paula Musich writes in her discussion about government surveillance over smartphone devices. The end user is gaining more control over his personal information, writes Musich. The Apple iOS 8 and the Android Lollipop upgrades --with their built-in encryption -- mean the government can't access a user's records, even with a court order. Musich says the government is overstepping its boundaries by demanding access to private information and that it has failed to realize the impact of the Snowden leaks on consumer trust. "I think they know that public backlash is building, and calls for reform will only get louder," says Musich. While no laws have yet been changed, new legislation will likely be passed to guard consumer privacy -- especially if another government snooping attempt gets uncovered.
Read why the government is overstepping its boundaries, according to Musich.
China will dominate smartphone sales in 2015
Steve Lohr blogs on The New York Times about upcoming technology trends to expect in 2015. He focuses on an IDC report that highlights two key predictions: the continued spike in smartphone sales and the amount of money invested in so-called third platform technologies, such as cloud, big data and mobile.
Lohr writes that 500 million smartphones will be sold in China next year. That's three times the number sold in the U.S. and one-third of the entire global market.
About 85% of these smartphones will be manufactured by domestic companies like Lenovo Group Ltd., Xiaomi Inc., Huawei Technologies Co. Ltd., ZTE Corp. and Coolpad Group Ltd. Smartphone growth is coming even as the rest of the Chinese economy appears to be stumbling, he writes. All told, China's spending on information and communications is expected to reach $465 billion in the coming year, an 11% spike.
Lohr says the hidden growth will happen in third-platform technologies. Spending for this sector is expected to grow by 13%. While leading companies like Amazon, Google, Microsoft and IBM are expected to continue to grow their spending on cloud and infrastructure, other companies like HP will start to focus on specialized initiatives.
Read more of why Lohr says China will be dominating the technology industry in the coming year.
Data loss prevention without DLP technology doesn’t make sense
Anton Chuvakin, a research vice president at Gartner Inc., blogs about his frustration with companies that deploy data loss prevention projects without any DLP technologies in place. He says that many companies focus on monitoring data exfiltration. Often times, a DLP plan comes after a data breach. "Think about it," he says. "In some cases, the sequence of events is truly ridiculous and goes like this: [one,] DLP technology is purchased and deployed; [two,] the organization is breached and data stolen; and [three,] anti-data breach project is initiated."
He says that network visibility will only get you so far. Having some kind of firewall in place and an analyst keeping an eye on the console can significantly boost your protection and stop data from being stolen.
Read why data loss prevention technology should be a necessary part of a DLP plan, according to Chuvakin.