I recently left a fantastic company and a team that I helped build over the last four years.
I recently wrote about the Host Identity Protocol (HIP) and why it is so important for the future of the Internet. In this blog series, I go into greater detail on why I think Tempered Networks’ vision, and what our customers’ are now realizing is so game-changing.
Fixes complex, costly, and porous IP perimeters to connect previously non-routable systems for secure end-to-end borderless networking
I’ve spent over twenty years working in the technology world, specifically in networking, and for nearly all that time I was confronted with the limitations of IP networking. Since coming to work for Tempered Networks, however, I have discovered a world of networking without borders or boundaries. One where we can securely connect any two devices, anywhere in the world, no matter the network or connectivity medium, with the click of a mouse. The reason for this is the Host Identity Protocol (HIP).
For most of us, it’s hard to imagine what networking would be like without complexity. Even something simple, like moving a printer, can take weeks of planning, provisioning and system updates just to get it from the fourth floor to the fifth. The number of man hours required to make the move almost costs more than the printer. It’s not sustainable. Why?
Having researched the history of the Internet and networking in general, I have a solid idea of how we arrived at the complex, vulnerable and expensive networking architecture we have today. Now I want to examine the fundamental flaw that has resided in TCP/IP since the protocol was first proposed in 1974. The use of the IP address for both location and identity.
Why are networks today so complex, yet still vulnerable to hackers, beset by IP conflicts and often require armies of highly skilled workers to manage? Not long ago I decided to do some research to try and figure out where it all went wrong.
Organizations are increasingly taking advantage of cloud networking as a cost-effective way to increase ag
Today, we use two globally deployed namespaces, IP and DNS, to uniquely identify a host or service on the network. While they are well-designed tools, they’re being used to do much more than originally intended. The lack of provable host identities introduces weaknesses that are complex to overcome, and result in a broken trust model for IP networking.
One of the more difficult challenges for IT organizations is overcoming the current limitations of routing convergence methods and DNS names with regards to disaster recovery (DR), system failover, and device isolation.