spk-logo-white-text-short2
0%
1-888-310-4540 (main) / 1-888-707-6150 (support) info@spkaa.com
Select Page

What Happened to IPv6?

Written by SPK Blog Post
Published on August 20, 2014

There was a lot of talk about IPv6 and how it would affect users and IT infrastructure as a whole when we ran out of IPv4 addresses in 2011. Since then, on the consumer and individual level, we have not seen much change. End users still use their IPv4 addresses at home and continue connecting the way they have for years.

It might seem like nothing really changed. Even at businesses and organizations, the adoption has been slow. The adoption of IPv6 support from security companies and only a percentage of websites and carriers makes it so that companies have no incentive to switch. To fully convert over, they will most likely need new hardware from individual computers to switches and networking equipment. As a result, many companies are lagging behind.

This plays a large part in the medical device design world, as well. A large number of machines run embedded operating systems with layouts that only give access to IPv4 settings. The devices would need changes to the user interface, operation calls, and device settings to even allow the possibility of IPv6.

As a result, very few companies operating medical devices can make a major switch to a pure IPv6 system. They would either need to spend millions of dollars upgrading equipment to devices that support it, go back to the manufactures and ask for quick updates, or run a system employing both IPv4 and IPv6. In this state, the switch to a pure IPv6 network is not viable.

Next Steps:

Kaveh Nasouti
Systems Integration Engineer

Latest White Papers

A Field Guide to Threat Vectors in the Software Supply Chain

A Field Guide to Threat Vectors in the Software Supply Chain

As a software developer, your main priority should be quickly and efficiently delivering software. The last thing you want is to worry about security threats. In this eBook, we will educate you on eliminating threat vectors with GitLab to secure your software supply...

Related Resources

A Field Guide to Threat Vectors in the Software Supply Chain

A Field Guide to Threat Vectors in the Software Supply Chain

As a software developer, your main priority should be quickly and efficiently delivering software. The last thing you want is to worry about security threats. In this eBook, we will educate you on eliminating threat vectors with GitLab to secure your software supply...

An Executive’s Guide to Strengthening Software Supply Chain Security

An Executive’s Guide to Strengthening Software Supply Chain Security

Modern software is assembled from a complex web of components, contributors, and tools, both internal and external. While this modularity accelerates development, it also expands the attack surface. For executives, a single breach in the software supply chain can...

Accelerating Product Development with AI-Powered GitLab Duo

Accelerating Product Development with AI-Powered GitLab Duo

Getting products designed and manufactured quickly is necessary to stay afloat in a competitive market. When working with software-driven products, this timeline can be stricter. Whether you're launching a new application or updating features for a legacy product,...