Monthly Archives: May 2011

The Impossibility of Prediction

A panel session on the future of National Research and Education Networks (NRENs) was invited to predict what networks would look like in ten years’ time. Participants made a couple of interesting observations about this. Dave Lambert (Internet2) suggested that … Continue reading

Posted in Future of NRENs | Leave a comment

From Anonymity to Privacy

Przemek Jaroszewski suggested that we need a new approach to privacy on-line: actually trying to achieve privacy, rather than anonymity. Privacy is a very basic human instinct: a need to have control over information about what happens in our private … Continue reading

Posted in Internet Privacy | Tagged | Leave a comment

Listen to the Dyke move

One of the things I most enjoy about the TERENA conference is hearing about new applications of computers and networks. My favourite so far this year was presented by Cees de Laat in his plenary talk yesterday: understanding when the … Continue reading

Posted in e-Science | Tagged , | Leave a comment

Moonshot, Grids, Middleware and attribute aggregation

This afternoon’s session on “Middleware for advanced users” had three very interesting talks ( The session was aimed at exploring the status of middleware currently in use or being developed to support the needs of communities wishing to run federated … Continue reading

Posted in Middleware | Leave a comment

Building Privacy In

An interesting presentation from the Internet Society described how the IETF is responding to increased public and developer concern with Internet privacy. Privacy is  about individuals being able to control the dissemination and use of their information: secrecy is about … Continue reading

Posted in Internet Privacy | Tagged , | Leave a comment

Help and encouragement to move to IPv6

Yesterday afternoon’s session on IPv6 had three very good practical talks on how to encourage its adoption. See All three presentations were giving the same message that 2011 is the year to really push the adoption of IPv6 given that … Continue reading

Posted in IPv6 | Leave a comment

Moving from Technology Security to Information Security

Kenneth Høstland talked about how UNINETT are helping universities move from their traditional focus on securing Information Technology (IT) to the wider issue of Information Security (IS), whether driven by regulatory requirements, business requirements, actual threats or technology requirement. This … Continue reading

Posted in Information security | Leave a comment