On Jan 6, 2011, at 11:21 AM, Jeff Kell wrote:
I hesitate to write anything off to impossibility, having witnessed the 8 to 16 to 32 to 64-bit processor progression :)
Indeed; how quickly we forget, eh? ;>
And the "depth" of infrastructure at which you can decide the traffic is bogus is much greater with IPv6.
/s/can/have the ability to
Most will end up on the target network anyway, no?
And that's the real point. ------------------------------------------------------------------------ Roland Dobbins <rdobbins@arbor.net> // <http://www.arbornetworks.com> Most software today is very much like an Egyptian pyramid, with millions of bricks piled on top of each other, with no structural integrity, but just done by brute force and thousands of slaves. -- Alan Kay