Championing Prudent Technological Assessment Over Industry Hype


Throughout our company’s trajectory, we’ve adhered steadfastly to an ethos of integrity, consistently questioning and challenging technologies within the industry that offered limited or no substantial value. While claiming to be the last honest vendor might be an overstatement, our commitment to honest discourse and critical evaluation stands as a testament to our track record.

Let’s delve into instances where we’ve diverged from prevailing industry trends, opting to prioritize informed skepticism over blind endorsement, even when it meant conflicting with our own financial interests.

Layer 7 and its Misplaced Promises

Early on, we highlighted the accuracy issues entrenched within Layer 7 technology. Despite our reservations, conveying outright condemnation risked credibility. In retrospect, it’s evident that Layer 7 technology largely fell short of its grand promises. We hinted at these concerns in our blog post from 2010, elucidating the potential pitfalls.

Navigating the CALEA Scare

During the CALEA emergence, rather than peddle costly solutions based on fear, we chose an alternative path. We steered our customers away from panic-inducing measures, often forgoing potential sales opportunities. Selling within the climate of fear contradicted our ethical standards.

Caching’s Limitations in a Dynamic Content Landscape

As caching encountered limitations attributed to dynamic content, our guidance remained consistent: dissuade investment, despite our own caching solution. Our commitment to honest counsel outweighed financial considerations.

Addressing IPv4 Exhaustion

In the face of IPv4 address depletion, we engaged the community by offering a reward for information on the impending switch-over date from IPv4. Our aim was to show this was a non-issue for our customers.

In Conclusion…

Our stance on these technologies reflects a commitment to integrity, placing the interests of our clientele and the industry’s long-term stability above immediate financial gains. While our contrarian perspective may not always align with prevalent market sentiments, our enduring dedication to honesty and conscientious evaluation remains unwavering.

Crickets for IPv6


Several years ago, I wrote an article explaining how there is plenty of address space with IPv4 and that the IPv6 hype had some merit, but most of it was being used as another push to scare organizations into buying a bunch of equipment they may not need.  

It turns out that I was mostly correct

How do I know this? We are regularly inside customer networks doing upgrades and support. Yes, we do see a smattering of IPv6 traffic in their logs, but it generally does not originate from their users, and at most it is a fraction of a percent. Basically, this means that their old IPv4 equipment probably would still suffice without upgrades had they gone that route.

Back in 2012 the sky was falling, everything needed to be converted over to IPv6 to save the Internet from locking up due to lack of address space.  There may be elements of the Internet where that was true but such dire predictions did not pan out in the Enterprise. Why?

Lack of control over their private address space with IPv6.

For example, one of the supposed benefits of  IPv6 addressing schemes is that they are assigned to a device in the factory, as there are so many addresses available they are practically infinite.  The problem for an IT professional managing a network is that you can’t change that IPv6 address (as far as I know) and that is where the breakdown begins.

In private organizations, the IT department wants to manage bandwidth and security permissions. Although managing security and permissions are possible with IPv6, you lose the orderliness of an IPv4 address space. 

For example, there is no easy shorthand notation with IPv6 to do something like:

“Block the address range 192.168.1.100/24 from accessing a data base server”.   

With IPv4, the admin typically assigns IP addresses to different groups of people within the enterprise and then they can go back and make a general rule for all those users with one stroke of the pen (keyboard). 

With IPv6 the admin has no control over the ip addresses, and would need to look them up, or come up with some other validation scheme to set such permissions.   

I suppose the issues stated above could have been overcome by a more modern set of tools, but that did not happen either. Again, I wonder why?

I love answering my own questions. I believe that the reason is that the embedded NAT/PAT addressing schemes that had been used prior to the IPv6 push, were well established and working just fine.  Although I am not tasked with administering  a large network, I did sleep at a Holiday Inn (once), and enterprise admins do not want public IP’s on the private side of their firewall for security purposes. Private IP addresses to the end in itself is likely more of security headache than the Ip4 NAT/PAT address schemes.  

The devil’s advocate in me says that the flat address space across the world of an IPv6 scheme is elegant and simple on face value, not to mention infinite in terms of addresses. IPv6 promises 2,250,000,000 Ip addresses, for every living person on earth. It just was not compelling enough to supplant the embedded IPv4 solutions with their NAT/PAT addressing schemes.

Out of the Box Ideas for Security


I woke up this morning thinking about the IT industry and its shift from building infrastructure to an industry where everybody is tasked with security, a necessary evil that sucks the life out of companies that could be using their resources for revenue-generating projects. Every new grad I meet is getting their 1st job at one of many companies that provide various security services. From bank fraud investigation, white-night hacking, to security auditing, there must be 10’s if not 100’s of billions dollars being spent on these endeavors. Talk about a tax burden on society! The amount of money being spent on security and equipment is the real extortion, and there is no end in site.

The good news is , I have a few ideas that might help slow down this plague.

Immerse Your Real Data in Fake Data
Ever hear of the bank that keeps an exploding dye bag that they give to people who rob them? Why not apply the same concept to data. Create large fictitious databases and embed them within your real data. Obviously you will need a way internally to ignore the fake data and separate it from real data. Assume for a minute that this issue is easily differentiated by your internal systems. The fictitious financial data could then be traced when unscrupulous hacks try to use it. Worst case, it would create a waste of time for them.

Assuming the stolen data is sold on the dark web, their dark web customers are not going to be happy when they find out the data does not yield any nefarious benefits. The best case is this would also leave a trail for the good guys to figure out who stole the data just by monitoring these fictitious accounts. For example, John James Macintosh, Age 27, of Colby, Kansas does not exist, but his bank account does, and if somebody tried to access it you would instantly know to set a trap of some kind to locate the person accessing the account (if possible).

The same techniques are used in counter intelligence to root out traitors and spies. Carefully planted fake information is dispersed as classified, and by careful forensics security agencies can find the leaker (spy).

Keep the Scammers on the Phone
For spam and phone scams you can also put an end to those, with perhaps a few AI agents working on your behalf. Train these AI entities to respond to all spam and phone scams like an actual human. Have them respond to every obnoxious spam email, and engage any phone scammer with the appropriate responses to keep them on the phone.

These scams only persist because there are just enough little old ladies and just enough people who wishfully open spyware etc. The phone scammers that call me operate in a world where only their actual target people press “1” to hear about their auto warranty options. My guess is 99.9 percent of the people who get these calls hang up instantly or don’t pick up at all. This behavior actually is a benefit to the scammer, as it makes their operation more efficient. Think about it, they only want to spend their phone time & energy on potential victims.

There is an old saying in the sales world that a quick “no” from a contact is far better than spending an hour of your time on a dead end sale. But suppose the AI agents picked up every time and strung the scammer out. This would quickly become a very inefficient business for the scammer. Not to mention computing time is very inexpensive and AI technology is becoming standard. If everybody’s computer/iPhone in the world came with an AI application that would respond to all your nefarious emails and phone scams on your behalf, the scammers would give up at some point.

Those are my favorite two ideas security ideas for now. Let me know if you like either of these, or if you have any of your own out-of-the-box security ideas.

Covid-19 and Increased Internet Usage


Our sympathies go out to everyone who has been impacted by Covid 19, whether you had it personally or it affected your family and friends. I personally lost a sister to Covid-19 complications back in May; hence I take this virus very seriously.

The question I ask myself now as we see a light at the end of the Covid-19 tunnel with the anticipated vaccines next month is, how has Covid-19 changed the IT landscape for us and our customers?

The biggest change that we have seen is Increased Internet Usage.

We have seen a 500 percent increase in NetEqualizer License upgrades over the past 6 months, which means that our customers are ramping up their circuits to ensure a work from home experience without interruption or outages. What we can’t tell for sure is whether or not these upgrades were more out of an abundance of caution, getting ahead of the curve, or if there was actually a significant increase in demand. 

Without a doubt, home usage of Internet has increased, as consumers work from home on Zoom calls, watch more movies, and find ways to entertain themselves in a world where they are staying at home most of the time.  Did this shift actually put more traffic on the average business office network where our bandwidth controllers normally reside?  The knee jerk reaction would be yes of course, but I would argue not so fast.  Let me lay out my logic here…

For one, with a group of people working remotely using the plethora of cloud-hosted collaboration applications such as Zoom, or Blackboard sharing, there is very little if any extra bandwidth burden back at the home office or campus. The additional cloud-based traffic from remote users will be pushed onto their residential ISP providers. On the other hand, organizations that did not transition services to the cloud will have their hands full handling the traffic from home users coming in over VPN into the office.

Higher Education usage is a slightly different animal.   Let’s explore the three different cases as I see them for Higher Education.

#1) Everybody is Remote

In this instance it is highly unlikely there would be any increase in bandwidth usage at the campus itself. All of the Zoom or Microsoft Teams traffic would be shifted to the ISPs at the residences of students and teachers.

2) Teachers are On-Site and Students are Remote

For this we can do an approximation.

For each teacher sharing a room session you can estimate 2 to 8 megabits of consistent bandwidth load. Take a high school with 40 teachers on active Zoom calls, you could estimate a sustained 300 megabits dedicated to Zoom.  With just a skeleton crew of teachers and no students in the building the Internet Capacity should hold as the students tend to eat up huge chunks of bandwidth which is no longer the case. 

3) Mixed Remote and In-person Students

The one scenario that would stress existing infrastructure would be the case where students are on campus while at the same time classes are being broadcast remotely for the students who are unable to come to class in person.  In this instance, you have close to the normal campus load plus all the Zoom or Microsoft Teams sessions emanating from the classrooms. To top it off these Zoom or Microsoft Team sessions are highly sensitive to latency and thus the institution cannot risk even a small amount of congestion as that would cause an interruption to all classes. 

Prior to Covid-19, Internet congestion might interrupt a Skype conference call with the sales team to Europe, which is no laughing matter but a survivable disruption.  Post Covid-19, an interruption in Internet communcation could potentially  interrupt the  entire organization, which is not tolerable. 

In summary, it was probably wise for most institutions to beef up their IT infrastructure to handle more bandwidth. Even knowing in hindsight that  in some cases, it may have not been needed on the campus or the office.  Given the absolutely essential nature that Internet communication has played to keep Businesses and Higher Ed connected, it was not worth the risk of being caught with too little.

Stay tuned for a future article detailing the impact of Covid-19 on ISPs…

Opinion: Location Based Content Services Must be Defeated


I am normally a law-abiding citizen when it comes to contracted services. For example, many years ago I purchased a house where the previous owner had hijacked their cable service.  I voluntarily turned myself in to get legal, and I would do it again if the same situation ever arose. On the other hand, when it comes to providers blocking or denying content based on your location, I feel violated and angry.  I may sound like a geezer, but in the spirit of the Internet, blocking content based on your location just seems wrong.  I don’t know if I am in the minority or mainstream with my opinion, and frankly I don’t care.  I will continue to do everything I can to defy location-based restrictions, and if I get arrested at some point, I may fight this all the way to the Supreme Court.

What follows is my list of location-enforcement transgressions.  Let’s start with MLB.tv.  Every year I pay my $120 to subscribe to this service, and every year MLB.tv blocks my local team as per an agreement they have with a local TV provider who owns the rights to the broadcast.  If you want to watch baseball in my home market, you must buy a $120 a month cable service, and you have no other options.  I’d be glad to pay for the content directly, like a pay-per-view event, but this is not an option either.

Five years ago the MLB.tv content blocking was pretty easy to circumvent; all I had to do was use a VPN connected to another city and everything worked fine.  Last year the MLB decided to subscribe to a service that notified them with a list of every commercial VPN provider, and their associated IP ranges that they owned. So basically if you used a VPN service you could not watch MLB.tv, even for games that would not normally be blacked out in your market, it is was just indiscriminate VPN blocking.

My next counter punch was to set up my own proxy server and put it behind a friend’s router in a different geographic location.  Essentially when I log into MLB.tv they see me coming from Seattle, Washington, and from a random residential private IP address not on their list of commercial VPN providers.  This works pretty well, if you have a friend willing to host a proxy for you.

Legalized internet gambling is another nemesis of location-based denial.  Internet gambling on sports betting sites is legal in some states and not others.  The gambling sites have taken location-based blocking to another level.  It’s not just enforced based on your originating IP or VPN usage, but they sniff your computer’s location-based services to prove your location.  If you turn off your location-based services, they deny you service.

I am now working on a way to circumvent this intrusion, and I don’t even gamble nor do I have any real intention of using my solution at this time.

I ask myself the question what motivates me to spend time and energy on ways to circumvent these draconian rules when I don’t even want their services.  All I can think of is that from a philosophical standpoint, I want Internet content and services to be free from geographical restrictions. I am fine with content providers charging for services, just don’t tell me where I have to be located to use your services.

 

How to Prioritize Internet Traffic For Video


My daughter, a high school teacher, texted me the other day and said she is having trouble with her home video breaking up. This is not a good situation for her and many other remote learning operations around the world.  There are ways to mitigate this issue, but it must be done upstream by her ISP, and so I could not help her directly. I tried calling Comcast to let them know we have a solution, but they did not return my call. Perhaps one of their engineers will read the blog article that follows.

There is a very simple way to make sure video works well all the time, and with the new generation of video controllers this technique is better than ever.  Okay, sorry for sounding like I am promoting a miracle cure, but in essence I am (and have been doing it with success for 17 years now).

The basic technique involves making sure your circuit does not reach 100% percent capacity.  Video is like the proverbial “canary in a coal mine”; it will be the first to suffer and will abruptly stop working when it runs out of bandwidth.

How you should keep your circuit from reaching 100% percent capacity and disrupting video?   There are two important scenarios that you need to consider:

Scenario #1 assumes you have a large non-video consumers of bandwidth that are filling your circuit.  This is a problem that we normally deal with, and the solution is to use a bandwidth controller to limit streams larger than 4 megabits during peak usage.  By doing this you can free up traffic for video, as almost all video, Netflix, etc. use 4 megabits or less.  Remote learning applications use even less, as they generally don’t need the video quality of a high def movie to be useful.

The issue with this method, and one that has come to fruition recently, is a huge influx of video, now that other recreational activities have been put on hold.  Even for ISPs that were ramping up their delivery mechanisms with the normal usage curve, the spike in recent video demand was unexpected, just like the covid-19 virus causing unplanned quarantines and lockdowns.

Scenario #2 is the situation where a majority of your traffic is video, and you may not be able to recover enough bandwidth by limiting larger streams. What do you do now?

Several years ago most video streams were an all or nothing proposition. Either they received the bandwidth they needed or they just stopped.  As the industry has matured so have the video delivery engines. They are much smarter now, and you can now force them to back off gracefully.  Today’s engines will sense the available bandwidth and back off to a lower resolution as needed.

From the perspective of an ISP, you can trick video into backing off  before you have a crisis on your hands. The trick is to progressively limit 4 megabit streams down to 1 or 2 meg.

We can do this quite easily with our bandwidth controller, but for those of you that have a simple rate limiting controller without dynamic intelligence built-in, you might be able to do this manually if you can limit individual connections.  For example, you might have a user with a 50 megabit circuit.  You would not want to limit their entire circuit down to 2 megabits, but you could limit any stream that is pulling over 4 megabits down to 2 megabits, and video will still function and the customer will continue to have access to the 50 meg circuit for other services.  By limiting just “streams” and not the entire circuit you will trick the smart video services to back off on their resolution.

A proactive approach will prevent gridlock on your entire circuit before it happens;  whereas doing nothing will cause what we call a rolling brownout.  This is when everything is fine and  all of a sudden bandwidth across the enterprise maxes out, and you basically blow a circuit breaker.  There is no bandwidth left for the video services or any other application, and thus all users experience failing application for 30 seconds or longer.  In our opinion, this is a totally preventable situation, if you have implemented manual (or intelligent) bandwidth shaping.

If you are experiencing Scenario #2, and would like to discuss how you can implement bandwidth shaping, contact one of our engineers at 303.997.1300 x103 or email us to discuss further.

The Must Have Tool for the E-Sports Enthusiast


E-Sports in schools is becoming mainstream. You can make a living at it as well. Having the right amount of bandwidth for it is essential. It doesn’t matter if that bandwidth is in-house on a LAN situation or over the Internet. Playing or even practicing suffers when a game doesn’t get what it needs. (for you readers on the other side of the coin that need to make sure other things get done without gaming interfering keep reading too :)

Believe it or not, playing games online was one of the reasons I got interested in bandwidth management!

Every FPS (first person shooter) player wants to have a gaming experience where the only reason they lose is because they met someone better than them. You don’t want to lose because you see your screen freeze waiting for the next packet to arrive to refresh the screen.

I dove into learning as much about Internet/Networking as I could so I could try and get the best setup I could for my network. I ran my own servers so I could control some of that. I never played on the same network as the server back then because that wouldn’t be fair to others. Running my own servers I could also see what else was going on with the network traffic.

I knew how much my servers needed per person to play like they should so I knew that 8 or 16 players would take a certain amount of bandwidth. I knew how much total bandwidth I had for the network. What I didn’t know was how much all the other machines on the network was using and how.

With NetEqualizer you can easily see how much every IP is using. That’s every connection an IP has and how much it is using, that’s the important part. You can tell if your mail server is getting hit hard, or the web server is uploading/downloading huge objects to some offsite IP. If needed you can put connection limits on things with NetEqualizer.

You can also provide priority over getting equalized by the NetEqualizer for your gaming server IP. Even though you have priority on it you can still have a total amount it can use hard limit on it.

In a setting where you want to play games during certain hours you can have rules that go on and come off at different times. For instance if you are in a high school that provides E-Sports gaming then it can be setup so that the administrative IPs all have priority from 8am to 2pm but after that you can take it off and let E-Sports have a bit more priority so you don’t end up getting LAG!

NetEqualizer works both ways, it can be used to give administration priority when you want it to be the most important traffic on the network or you can give programs like E-Sports more priority so your gaming does not suffer when its necessary.

NetEqualizer strives to be a set and forget type of bandwidth manager but it has a lot for the ones that need micro manage it as well. You can set hard limits on IPs, create Pools which have a certain amount of bandwidth and then stick IPs into those pools as members so all the IPs in the pool can use up to the pools specified hard limit. You can set connection limits on IPs. Also the default task of the NetEqualizer is to equalize. If placed on a network without any configuration besides telling it how much in and out bandwidth you have it will monitor all connections from all IPs it sees and when RATIO of incoming or outgoing bandwidth is reached it looks for all connections over a value we call HOGMIN and slows those large connections down so the rest of the connections on the network don’t suffer. A real simple example is if you
are on a standard VoIP call which only uses a few hundred K of bandwidth and someone on the network decides to start downloading a high def movie file from the web. Without NetEqualizer its anyones guess what will happen to the VoIP call. With NetEqualizer its predetermined what will happen. First thing it does is see if there is any reason to look for connections to equalize. If you are no where need your bandwidth ceiling then it does nothing and keeps monitoring. Both your VoIP and download should go along like NetEqualizer wasn’t there. Now if NetEqualizer sees that you are near your ceiling on total bandwidth that you told it you have then it looks for all connections over HOGMIN. Every connection that doesn’t specifically have a priority rule for it will be slowed down by a few milliseconds and this will happen for as long as the bandwidth is near saturation. When a connection is equalized we don’t just do it and leave it that way. We do it in stages so things like fragile FTP servers don’t just drop the connection. We put on a small delay and then in a second or so we check again and if it still needs equalizing and still a connection we put on a bit more and then we do the same routine one more time if things are still needing equalizing. Then we take it completely off and start all over in another second or two.

The NetEqualizer equalizes a connection from one IP to another IP. So if your web server is uploading a file to some IP and its huge then it may be equalized for that connection. The other 100’s or 1000’s of connections to your web server would not be equalized unless they were also over HOGMIN and there was a need to equalize. The same applies to any IP no matter if it belongs to your mail servers or game servers or testing servers. As mentioned above, you can set priority for things like video servers you push out to the world and know those streams would be over HOGMIN but are important enough to mandate they have no equalizing on them.

 

DDoS: The Real Extortion. It’s Not What You Think…


I am not normally a big fan of conspiracy theories, but I when I start to connect the dots on the evolution of DDoS, I can really only come to one conclusion that makes sense and holds together.   You may be surprised at what I have found.

But first, my observations about DDoS.

We have all heard the stories about businesses getting hacked, bank accounts compromised, or credit cards stolen.  These breaches happen quietly and discreetly, often only discovered long after the fact.  I can clearly understand the motivation of  a perpetrator behind this type of break in.  They are looking to steal some information and sell it on the dark web.

On the other hand, a DDoS attack does not pose any security threat to a business’ data, or their bank accounts.  It is used as a jamming tool to effectively cut off their communication by paralyzing their network.  I have read vanilla articles detailing how extortion was the motivation.  They generally assume the motive is money and DDoS attacks are monetized through extortion.  You get attacked, your web site is down, and some dark figure contacts you via a back channel and offers to stop the attack for a ransom.  Perhaps some DDoS attacks are motivated by this kind of extortion,  but let’s dig a little deeper to see if there is a more plausible explanation.

Through my dealings with 100’s of IT people managing networks, almost all have experienced some sort of DDoS attack in the past 5 or 6 years.

To my knowledge, none of my contacts were ever approached by somebody attempting to extort money.  When you think about this, taking a payment via extortion is a very risky endeavor for a criminal.  The FBI could easily set up a sting at any time  to track the payment.  You would have to be very, very clever to extort and take payment and not get  caught.

Another explanation is that many of these were revenge attacks from disgruntled employees or foreign agents.  Maybe a few, but based on my sample and projecting it out, these DDoS attacks are widespread, and not just limited to key political targets.  Businesses of all sizes have been affected, reaching into the millions.  I can’t imagine  that there are that many disgruntled customers or employees who all decided to settle their grievances with anonymous attacks in such a short time span.  And what foreign  agent would spend energy bringing down the Internet at a regional real estate office in Moline, Illinois?  But it was happening and it was happening everywhere.

The real AHA moment came to me one day when I was having a beer with an IT reseller that sold high-end networking equipment. He reminisced about his 15 year run selling networking equipment with nice margins.  Switches, Routers, Access Points.

But revenue was getting squeezed and had started to dry up by 2010.  Instead of making $100K sales with $30K commission, many customers dumped their channel connection and started buying their equipment as a commodity on-line at much lower margins. There was very little incentive to work the sales channels with these diminishing returns. So what was a channel sales person going to do now to replace that lost income?  The answer was this new market selling $200K integrated security systems and clearing $30K commission  per sale.

I also learned after talking to several security consultants that it was rare to get a new customer willing to proactively purchase services unless they were required to by law. For example, the banking and financial industry had established some standards. But  for large and medium private companies it is hard to extract $200K for a security system as a proactive purchase to protect against an event that had never happened.

I think you might be able to see where I am going with this, but it gets better!

I also noticed that, post purchase of these rather pricey security systems, attacks would cease.  The simple answer to this is that an on-site DDoS prevention tool generally has no chance of stopping a dedicated attack. A DDoS attack is done by thousands of hijacked home computers all hitting a business network from the outside. I have simulated them on my own network by having 100 virtual computers hitting our website over and over as fast as they can go and it cripples my web server.

The only way to stop the DDoS attack  is at the source.  In a real attack the victim must hunt down the source machine all the way back to their local ISP and have the ISP block  the attacker at the source.  Now imagine an attack coming from 1000 different sources located all over the world. For example, your home computer, if compromised by a hacker, could be taking part in an attack and you would never know it.  Professional hackers have thousands of hijacked computers under their control (this is also how spammers work).  The hacker turns your computer into a slave at its beck and call.  And the hijacker is untraceable. When they initiate an attack they tell your computer to bombard a website of their choosing, along with the thousands of other computers in their control, and BAM! the website goes down.

So why do the attacks cease once a customer has purchased a security system?   If the attacks continued after the purchase of the tool the customer would not be very happy with their purchase.  My hypothesis: Basically, somebody is calling off the dogs once they get their money.

Let me know if you agree or disagree with my analysis and hypothesis.  What do you think is happening?

Stick a Fork in Third Party Caching (Squid Proxy)


I was just going through our blog archives and noticed that many of the caching articles we promoted circa 2011 are still getting hits.  Many of the hits are coming from less developed countries where bandwidth is relatively expensive when compared to the western world.  I hope that businesses and ISPs hoping for a miracle using caching will find this article, as it applies to all third-party caching engines, not just the one we used to offer as an add-on to the NetEqualizer.

So why do I make such a bold statement about third-party caching becoming obsolete?

#1) There have been some recent changes in the way Google provides YouTube content, which makes caching it almost impossible.  All of their YouTube videos are generated dynamically and broken up into segments, to allow differential custom advertising.  (I yearn for the days without the ads!)

#2) Almost all pages and files on the Internet are marked “Do not Cache” in the HTML headers. Some of them will cache effectively, but you must assume the designer plans on making dynamic, on the fly, changes to their content.  Caching an obsolete page and delivering it to an end user could actually result in serious issues, and perhaps even a lawsuit, if you cause some form of economic harm by ignoring the “do not cache” directive.

#3) Streaming content as well as most HTML content is now encrypted, and since we are not the NSA, we do not have a back door to decrypt and deliver from our caching engines.

As you may have noticed I have been careful to point out that caching is obsolete on third-party caching engines, not all caching engines, so what gives?

Some of the larger content providers, such as Netflix, will work with larger ISPs to provide large caching servers for their proprietary and encrypted content. This is a win-win for both Netflix and the Last Mile ISP.  There are some restrictions on who Netflix will support with this technology.  The point is that it is Netflix providing the caching engine, for their content only, with their proprietary software, and a third-party engine cannot offer this service.  There may be other content providers providing a similar technology.  However, for now, you can stick a fork in any generic third-party caching server.

Creative Marketing Pushing the Limits


I just spent the evening advocating for my 90 year old mother, getting her through the bureaucracy gauntlet of a large teaching hospital.  The highlight of my evening was when I had to move my car from in front of the ER entrance, and upon my return the security guard refused to let me back into the ER.  I had essentially been evicted from the hospital.  I’ll spare you the details of the rest of tonight’s carnage as it is not really relevant for a technical product blog, but it did jar a repressed memory from when we were in early startup mode years ago, and I was trying to gain some market traction.

Flash back to early 2005, NetEqualizer was no more than a bundled open source CD selling for less than a decent television goes for these days. Our customers were mostly early adopters running on shoestring budgets.  Encouragement came in the form of feedback from customers. We were getting amazing reviews from smaller ISPs, who raved about how good our bandwidth shaping technology was.  My problem was that their enthusiasm was not translating into larger corporate customers.  In order to survive, we had to leverage our success into a higher-end market, where despite our technical success we were still an unknown commodity.

With time on my hands, and my industry expertise current on the Telco industry, I started writing small articles for trade magazines.  These vignettes were great for building a resume, but not so great at getting the NetEqualizer in front of customers.  With each passing week I would chat with the editor(s) from Ziff Davis and propose article ideas. Slowly I was becoming a respected yet starving feature writer. By necessity, entrepreneurs have to think out of the box, and I was no exception when I hatched the idea for my next article.  The conversation with my Editor went something like:

Me:  “Hey Bill, I have an idea for a new article.”

Bill: “Let’s hear it. ”

Me: “Well, there is big trade show next month in Orlando…  How about I head down there and write a new product review feature for your magazine? I’ll walk the floor and impromptu interview various vendors and put together a review feature with a little insider flair, what do you think?”

Bill: “Go for it! Keep me posted. We can’t pay your expenses though.”

Me: “That’s fine. In return for not getting paid, I hope to use my access as your feature writer to also start some conservations on our Bandwidth shaper, to get some feedback on our direction.”

Bill : “Sounds good, just keep it discreet.”

And so I was off to Orlando.

On trade show day I wandered the floor with my little badge identifying me as a representative of the publishing company Ziff Davis.  I walked booth to booth introducing myself and asking about what new products were being featured.

The strategy was working.  Various marketing executives were eager to tell me about their new offerings.  Once we had a little rapport going, and I had gathered the information I needed for my product review, I would attempt to work into the conversation that I was not only a part-time feature writer, but also a tech entrepreneur. Much to my surprise, most people were curious to learn about my endeavor and our start up technology.  That was until I entered the Nortel Booth.

When I brought up my alter ego personality as an entrepreneur to the Nortel Marketing rep, he blew a gasket and had me escorted from his booth by some henchmen.  It was  one of those demoralizing, embarrassing moments as an entrepreneur that you just have to push past.

Obviously, we kept going and there were many more dead ends to come. I learned just as in the hospital, whether your an advocate for your product, or your ailing mother, you must push ahead and continue to work out of the box.  And yes, I eventually did get back into the ER, and yes, it was embarrassing.

As a reference, here are links to some of the trade magazine articles I wrote back in the Mid 2000’s:

https://www.extremetech.com/extreme/80248-analysis-vuzes-allegations-are-anecdotal-but-troubling

https://www.pcmag.com/news/210995/analysis-the-white-lies-isps-tell-about-broadband-speeds

 

 

 

NetEqualizer Speeds up Websites with Embedded Video


Maybe I am old school, but when I go to a news site, I typically don’t want to watch videos of the news.  I want to skim the article text and move on. I find reading my news  to be a much more efficient way of filtering the content I am interested in.    The problem I have run into recently is that the text portion of news site portals loads much more slowly than a few years ago.  The text portions are starved for bandwidth while waiting for a video to load.  Considering text takes up very little bandwidth it should load very quickly, if not for that darn video!

Solution.

I can easily tune my NetEqualizer to throttle video, and leave text alone, thus I can get to reading the text without having to wait on the video to load.  It may seem counter-intuitive, but slowing a website video down does make the page load faster.

Here is a behind the scenes explanation of how the NetEq enhances the speed of some of the popular news sites when the stories are loaded with embedded video.

  • Your browser typically attempts to load multiple elements of a webpage at one time.  So I can’t really blame the browser for the text delays. Both the video and text, along with other images, all load simultaneously from the browsers perspective.
  • Video by its nature tries to buffer ahead when bandwidth is available.
  • With my business grade 20 megabit Internet, the video buffering will dominate the entire 20 megabits.  The text loading, even though small with respect to data, tends to suffer in the wings when a video download is dominating the link.
  • Why exactly the text loading does not get equal cycles to load I am not 100 percent sure, but people who design routers have told me that the persistent video connection once started is favored by the router over other packets.
  • The  NetEqualizer by its own design punishes large streams by slowing them down when your link is at capacity.    This allows the text loading a nice chunk of bandwidth to work with and it loads much more quickly than when competing with the video stream.

For  more details on how this works we have a youtube that explains it all.

 

 

 

 

NetEqualizer News: October 2018


We hope you enjoy this month’s NetEqualizer Newsletter. Highlights include our 8.6 Release finishing its testing phase and more!

 

October 2018

 

8.6 Release is Ready for Pre-Release!
Greetings! Enjoy another issue of NetEqualizer News.

Here in Colorado, we never really got a chance to experience a light frost. We went from a balmy 65 degrees on October 13th to winter with snow with temperatures in the mid teens on October 14th.
Like the changes in the weather, the NetEqualizer feature set is always evolving. In this issue we bring you the new 8.6 release, and as an added bonus a little out of-the-box thinking for the future. 

We continue to work with you to solve some of your most pressing network problems – so if you have one that you would like to discuss with us, please call or email me anytime at 303.997.1300 x103 or art@apconnections.net. 

– Art Reisman (CTO)

In this Issue:

:: The 8.6 Release is GA

:: Far-out Product Ideas

The 8.6 Release is GA

8.6 is now available for everyone!

How to get 8.6

Just e-mail us at support@apconnections.net or call us at 303-997-1300 during business hours to get the ball rolling.

Is upgrading painful?

No needles we promise! The upgrade process for 8.6 requires running a couple of commands from the GUI and then a single reboot. Worst case you should expect a 30 second service outage.

What is in 8.6?

Perhaps you missed our internal review back in August when we were testing. Here are the details of the main 8.6 features.  You can also read our full 8.6 Release Notes on our blog site at any time.

1) Scalable Time and Date for Reporting

Ever ask the question, “what was my bandwidth usage between 9:00pm and 12:00 pm last Thursday?” We now have the answer at your finger tips. Using the time and date range bar, located at the top of all our graphical reports, you can hone in on a particular time/date period – immediately rescaling the report as you move the bar. Our previous releases had fixed time periods of one day, one week, one month, etc. which was nice, but nowhere near as convenient. This was one of our most requested features.

2) Set your Priority to expire

Giving a user priority is akin to giving them permanent keys to the Fort Knox of Bandwidth. Perhaps you have a user that has a good reason for some extra bandwidth on Tuesday evening due to a business presentation; but come Wednesday you don’t wan’t their laptop with priority to accidentally go off in the middle day on a 50G backup with unlimited bandwidth, that might bring your network to a crawl. Never fear! Now, when assigning priority you can set an expiration date on your priority and avoid leaving that gate open.

3) Watch individual usage live on your screen

We have always had static reports on historical usage per IP, and now we have added a real time bar chart that updates once a second, so you can see in real time what a single IP is doing in terms of usage. I have used it while watching youtube and Netflix video, and was surprised to see how these application will consistently burst ahead to buffer up large chunks of bandwidth just by watching the usage bar jump up. I had suspected this behavior from Netflix, but it was nice to see it confirmed visually on my screen.

4) Bursting Pool/Subnet settings

People have always liked our pool/subnet shaping feature, but we often get asked by customers to relax enforcement during slack usage times. For example, if you have your guest wireless network restricted to 50 megabits on a 1G circuit on our 8.5 release, those users will never be able to go above 50 megabits. Now in 8.6, if you put a 50 megabit restriction on a group you can tell the NetEqualizer only to enforce that rule when the entire circuit is at capacity. With our 8.6 release, you have the choice of keeping the hard 50 megabit restriction in place all the time, or to only enforce this restriction during peak times.

As always, the 8.6 Release will be free to customers with valid NetEqualizer Software and Support (NSS) plans. Renew today if you are not current!

Far-out Product Ideas

Some interesting product ideas, just for fun…

Every once in a while we try to get out of the box and think of ideas that will stretch the imagination a little bit. Below are a couple that came to mind today. If you have a far-out idea, we’d love to hear about it. As a technology company we are always looking for ways to leap frog into new paradigms.
Site Survey Drone
I suspect others have thought of this idea and perhaps it has been implemented, so apologies in advance in case this is not an original idea.
We know that there are a variety of ways to survey areas for wireless coverage, and yet once the service is rolled out, dead spots abound. The contractor in charge must rely on reports from customers, or physically walk the site to find areas lacking in coverage. Seems like a good job for a small drone? Yes you need to a little intelligence to self navigate, and perhaps there might be little problems like closed doors (there goes the engineer in me thinking of obstacles). Bottom line is, it could be done, and could save a good bit of time and money.
Cleaning your Keyboard After a Sticky Spill
Yes I am going farther out with this one, but what if there was some service where you could hire an ant colony to clean up that sugary mess on your key board or mother board? Would ants be able to do this job effectively? The idea came to me when I saw a heard of goats being used to clear brush and noxious weeds off public right aways and roadsides. Ants are tireless workers and love sugar and people are always destroying their electronics with sticky spills.
Automatic Survey Response Application for your Phone 
I get 10 robo-calls a day with operators spoofing caller ID’s. You really can’t block them because they have figured out how to come from a new number with every call, and if you do block them, you are likely blocking an innocent party, since the caller ID was hijacked. To date, the FCC seems reluctant to do anything about it. I am not sure why perhaps there is money in this traffic for the operators? Last I heard, 50 percent of outbound calls in the US is from this garbage spammed traffic.
My idea: What if you had a little intelligent application (your private Watson that understands context) on your phone that responded like a potential real customer. Here is an example interaction.

Robo-Caller: Hello this is Henry with the warranty department, did you know your 1978 Honda is not covered by warranty?

Robo-App: Wow, please tell me more!

Robo-Caller: For a simple $9.99 a month we can extend your expired manufacture’s warranty.

Robo-App: Yes I’d like to sign up…

And so on. The idea is to engage the robo-caller for as long as possible, thus wasting their time to the point where the spamming operation is no longer viable.

Please email me at art@apconnections.net to share your far-out idea!
Blueberry Picking in New York

This picture is of a late summer right of passage in New York – picking blueberries with the family. It was taken last year at a blueberry patch in the Finger Lakes.

APconnections, home of the NetEqualizer | (303) 997-1300 | Email | Website 

NetEqualizer News: August 2018


We hope you enjoy this month’s NetEqualizer Newsletter. Highlights include our 8.6 Release finishing its testing phase and more!

 

August 2018

 

8.6 Release is Ready for Pre-Release!
Greetings! Enjoy another issue of NetEqualizer News.

Wow how the summer flies by. The public schools here in Colorado are all in full session this week. By the time Labor day roles around, the buses will have been rolling for two weeks. Even though the days are still hot, and it still feels like summer outside our offices, nature is starting to signal the end of the season. The orioles that frequented our backyard feeder since May have headed south, replaced by migrating humming birds that are coming down from the mountains on their journey to Mexico and beyond. Best of all, August signals the completion of the 8.6 testing cycle. We will be releasing 8.6 with all its amazing new features in just a few days! 

We continue to work with you to solve some of your most pressing network problems – so if you have one that you would like to discuss with us, please call or email me anytime at 303.997.1300 x103 or art@apconnections.net. 

– Art Reisman (CTO)

In this Issue:

:: The 8.6 Release

:: Call Out for Pre Release Testing

:: Best of Blog: Three Myths About QoS and Your Internet Speed

The 8.6 Release

8.6 is headed to pre-release!

There are quite a few “wow” features in this upcoming release. Here are some first impressions now that our early beta users have had a chance to kick the tires on a live 8.6 system…

1) Scalable Time and Date for reporting

Ever ask the question, “what was my bandwidth usage between 9:00pm and 12:00 pm last Thursday?” We now have the answer at your finger tips. Using the time and date range bar, located at the top of all our graphical reports, you can hone in on a particular time/date period – immediately rescaling the report as you move the bar. Our previous releases had fixed time periods of one day, one week, one month, etc. which was nice, but nowhere near as convenient. This was one of our most requested features.

2) Set your Priority to expire

Giving a user priority is akin to giving them permanent keys to the Fort Knox of Bandwidth. Perhaps you have a user that has a good reason for some extra bandwidth on Tuesday evening due to a business presentation; but come Wednesday you don’t wan’t their laptop with priority to accidentally go off in the middle day on a 50G backup with unlimited bandwidth, that might bring your network to a crawl. Never fear! Now, when assigning priority you can set an expiration date on your priority and avoid leaving that gate open.

3) Watch individual usage live on your screen

We have always had static reports on historical usage per IP, and now we have added a real time bar chart that updates once a second, so you can see in real time what a single IP is doing in terms of usage. I have used it while watching youtube and Netflix video, and was surprised to see how these application will consistently burst ahead to buffer up large chunks of bandwidth just by watching the usage bar jump up. I had suspected this behavior from Netflix, but it was nice to see it confirmed visually on my screen.

4) Bursting Pool/Subnet settings

People have always liked our pool/subnet shaping feature, but we often get asked by customers to relax enforcement during slack usage times. For example, if you have your guest wireless network restricted to 50 megabits on a 1G circuit on our 8.5 release, those users will never be able to go above 50 megabits. Now in 8.6, if you put a 50 megabit restriction on a group you can tell the NetEqualizer only to enforce that rule when the entire circuit is at capacity. With our 8.6 release, you have the choice of keeping the hard 50 megabit restriction in place all the time, or to only enforce this restriction during peak times.

As always, the 8.6 Release will be free to customers with valid NetEqualizer Software and Support (NSS) plans. Renew today if you are not current!

Beat the crowd get a pre-release version

We need your help!

As of August 15th, we have completed all of our pre-release testing and declared 8.6 stable and ready for live customers! If you are dying to get your hands on any of our new features described above, please e-mail us and we will be glad to send out a pre-release version.

Best Of Blog

Three Myths About QoS and Your Internet Speed

By Art Reisman
This month’s best of blog talks about QoS and your Internet speed. It’s one of our favorites! Enjoy.

—————————————————————————————————————–
Myth #1: A QoS device will somehow make your traffic go faster across the Internet.
The Internet does not care about your local QoS device. In fact, QoS means nothing to the Internet. The only way your traffic can get special treatment across the Internet would be for you to buy a private dedicated link – which is really not practical for general Internet usage, as it would only be a point-to-point link…

Photo of the Month
Blueberry Picking in New York

This picture is of a late summer right of passage in New York – picking blueberries with the family. It was taken last year at a blueberry patch in the Finger Lakes.

APconnections, home of the NetEqualizer | (303) 997-1300 | Email | Website 

NetEqualizer 15 Year Anniversary, Celebrating Famous NetEqualizer Users


First off, before I get into trouble , I want to assure all of our customers that in no way do we actually know or have data on who has had their personal traffic pass through a NetEqualizer over the past 15 years. What we can surmise, with a degree of probability/speculation, based on many of the locations we are installed  is , who has likely seen their traffic pass through our device.  What follows is a list of  those likely candidates

Michael Phelps:   For many years we were the primary source of Bandwidth Control in the olympic training center in Colorado Springs where many of the Olympic Swim team would practice  prior to the Olympics.  Basically any olympic athlete that connected to the wireless network in the training center from 2006 through 200? had their traffic pass though a NetEqualizer

 

Donald Trump:  NetEqualizer products have been used in several Los Angeles/Hollywood production studios where taping and of popular television shows take place , after taping the raw cuts are sent from the studio’s for editing and distribution. Yes it is very likely the Apprentice was taped in a Studio where the NetEqualizer was the Primary bandwidth  control solution.

 

The Pope:  Not sure if the Pope uses the Internet when he visits the US embassy in the Vatican but yes we do have NetEqualizer installed in the Vatican

 

Jerry Jones:  We have a NetEqualizer handling the traffic in the AT&T stadium business and conference center. I suspect that Jerry has wondered into that section of the Building  on occasion

Mark Cuban:  I have exchanged e-mails with Mark on a few other idea’s  un related to NetEqualizer. In our office  all of our traffic pass through our local NetEqualizer , hence I know with certainty that our e-mail exchange went through a NetEqualizer!

 

Barack Obama:  Prior to becoming president Mr Obama visited the Green Zone in Afghanistan along with other members of congress. At the time we had several systems in the green zone ( basically little american cities for Military people stationed there) keeping their wifi up and running.  For non secure communications he would have been using the local wifi and thus passing through a NetEqualizer.

These are just a few instances where I could logically place  these celebrities in locations where active NetEqualizers were shaping traffic.  Of course, we have  had many thousands of units installed over the years and the possibilities   are  endless.    Tens  of millions of users have passed through our controllers over the years . From Resort Hotels, Sports Venues , Universities, Conferences Centers, Fortune 500 business, and many many Rural and small Town ISPs all have deployed our equipment. Hence the actual list of famous people who have stumbled through a NetEqualizer is likely much higher, stay tuned for more to come.

 

By Art Reisman CTO/ Co Founder NetEqualizer

 

 

though

Smart Bandwidth Shaping


The NetEqualizer Bandwidth shaper has always had the ability to shape a group of people (subnet) to a fixed bandwidth limit. In laymen terms what this means is that you can take a segment of a network and say something like “you guys are only going to get 50 megabits, and try as you might to use more than 50 megabits, you are capped, and won’t be able to go over 50 megabits”.

What has been often requested and not supported, until now, is the ability to selectively enforce the group/subnet bandwidth limit.  In laymen terms again, “I want to set a 50 megabit limit on those guys, but only have it enforced when my network is near peak utilization.  The rest of the time I want those guys to be able to have all available bandwidth.”

Why is this important ?

The best way to answer this question is with an example.

A typical customer for our legacy enforcement feature would be a company where different business units within the company are allocated fixed amounts of bandwidth.   From experience and feed back from our customers we know , most of the time, the company as a whole, has more than enough bandwidth in reserve to accommodate all the business units.  The fixed allocations are really only needed during peak times to make sure no single business unit crowds out the others in a free for all bandwidth grab.   Assuming the critical peak usage situation only happens once a week, or once a day for a few hours , the old fixed allocation scheme is forcing business units to use a limited amount of bandwidth during times when there is unused bandwidth just going to waste. With our new scheme, the intelligence of the NetEqualizer will only apply the fixed allocation during those moments when bandwidth is at a premium.  There is no need for an IT person to make time of day adjustments to maximize utilization , it is automatically done for them.

With our new “Pool Bursting feature”, coming out in July, customers’ wishes have been made a reality.  Enforcement of our pool/subnet bandwidth limits can now be specified as absolute (always enforced) or enforced only at times of peak congestion.

One word of caution though.   As with any dynamic need-based enforcement there may be some customer backlash.  For example, the customer that comes to expect high bandwidth during low utilization times may not be happy if the enforcement kicks in and they are all of sudden hit with a bandwidth cap.