Last year the internet ran out of 32-bit IP addresses. Sharing IP addresses, as in the standard IPv4, has its problems, but who would volunteer to be the first to switch to the 128-bit standard, IPv6? Thus, June 8, 2011 became World IPv6 Day, in which thousands of big sites switched to IPv6, with a dual stack fall-back to IPv4. In this talk, Ian Flint, Architect at Yahoo!, tells the story of how Yahoo geared up and tested for the switch, and what they learned.
One of the great benefits of the ability to use mobile devices to accomplish many tasks is the ability to take control of your home. Author and developer Mike Riley discusses his book Programming Your Home. He reviews how one can interact with lighting, remotely monitor home security, and many other actions. He reviews the technical aspects of setting up both the sensors and mobile devices to take advantage of the technology. He also reviews specific examples and reviews how he used the Android in particular for his work.
In this fiery speech, Christian Bahls speaks out as a voice of reason against the WhiteIT project. WhiteIT is a German initiative that seeks to reduce child pornography on the Internet. Bahls' warning is to look carefully into objectives and goals of the project. His concern is that the initiative is trying to use child pornography as a cover to implement intrusive technologies. In addition, he suggests that the initiative misses the larger problem of preventing child abuse and exploitation.
In a recent WIRED article introducing Chrome Frame, it's mentioned that IE7, issued in 2006, is the only approved browser at Morgan Stanley. Ben Fried, CIO at Google, says it's time for the rearguard of IT to step up the pace. Cloud computing and personal technologies are pulling at enterprise IT from both ends. Security remains the most critical issue for IT. But the opportunities are better than ever if IT can adapt.
Our long-term interaction with the web will be defined by six trends. These trends will will involve dramatic changes that will make computing more like what we are used to seeing in many of today's movies. Kevin Kelly explains why he believes that soon the internet will beneficially surround us in ways that most users don't imagine today.
In the future consumers may have lower costs for services they demand but at the cost of their privacy and attention, while private enterprise will benefit from a wide variety of customers and more expansive relationships with those customers. Martin Geddes imagines the public will soon be ready to receive billing and customer service notices via pay-per-moment options added to Twitter or other social media instead of through today's minute-based telephony.
Nearly every day the news media carries stories about how much information the government compiles about the average citizen. As Daniel J. Solove writes in his new book Nothing to Hide: The False Tradeoff Between Privacy and Security, many people say, "If you've got nothing to hide, you shouldn't worry about government surveillance." However, Solove argues that it should not be necessary to choose security over privacy. He discusses the history of privacy law and reviews the problems of technology and privacy.
Jamillah Knowles and Chris Vallance tease out the strands of the Wikileaks story so far and chat with experts on the real meaning of cyberwar and the future of leaked documents. Oh - and there's a great song about maths too.
Stormy Peters of the GNOME Foundation makes a call for the development of free, open-source web services in which complete data rights are maintained by the user. Noting cases of data lock-outs, or re-use of user data by service providers, she calls for close examination of user agreements. In this short and earthy appeal, Peters says "Don't give away your future choices with the choices you make today."
Technology reporter Glenn Fleishman discusses a number of current networking and mobile issues. Beginning with an examination of a newly found hole in the 802.11 standard, he also discusses WiFi security issues and how both enterprises and the personal users are dealing with them. Glenn also reviews such topics as location data, the now legal ability to jailbreak the iPhone, and his objections to the DMCA.