{"id":3054,"date":"2015-02-01T15:33:26","date_gmt":"2015-02-01T15:33:26","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=3054"},"modified":"2020-05-06T10:30:15","modified_gmt":"2020-05-06T17:30:15","slug":"it-managers-get-ready-to-explain-your-ipv6-strategy-in-2015","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/it-managers-get-ready-to-explain-your-ipv6-strategy-in-2015\/","title":{"rendered":"IT Managers: Get Ready to Explain Your IPv6 Strategy in 2015"},"content":{"rendered":"<p>IT managers have enjoyed a long, long runway for dealing with the reality and likely impacts of IPv4 exhaustion.<\/p>\n<p>There are many reasons for this. First among these of course\u00a0is the ubiquity\u00a0of NAT, whose operational complexity and costs are ignored because of its familiarity.<\/p>\n<p>Next is that the depletion of IPv4 addresses\u00a0has been happening slowly enough that\u00a0any concerns of operational impact requiring serious risk analysis and mitigation\u00a0have stayed just under the level of crisis.<\/p>\n<p>Add to this the fact that\u00a0as\u00a0IT practice is\u00a0undergoing a generational paradigm shift. It is fragmenting and decentralizing as more and more enterprises consume or build\u00a0cloud solutions\u00a0and leverage the maturity of virtualization technology.<\/p>\n<p>But\u00a0this parochial reality for enterprises has done nothing to actually\u00a0slow the exhaustion of IPv4 or the uptake of IPv6 by service providers.\u00a02015 will be the year when the combination of total IPv4 exhaustion in North America along with watershed levels of IPv6 traffic (and the underlying operational practice to support it) will spill into the public consciousness.<\/p>\n<p>Combined with\u00a0continuing attention on trends\u00a0in mobile and IoT, the risk to Internet\u00a0growth and innovation will\u00a0compel enterprise IT management to have a clear IPv6 message with a mature\u00a0(or maturing) policy to back it up.<\/p>\n<p><strong>Growth\u00a0of IPv6 in the US<\/strong><\/p>\n<p>Last year saw\u00a0major growth of IPv6 adoption in the US.\u00a0One of the biggest but most underreported stories of the year was the explosive growth of\u00a0<a href=\"http:\/\/www.worldipv6launch.org\/measurements\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">IPv6 traffic levels at major mobile and broadband Internet service providers<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3058\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/verzion-wireless-ipv6-deployment-2015.png\" alt=\"Verizon Wireless IPv6 Deployment graph 2015\" width=\"906\" height=\"562\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/verzion-wireless-ipv6-deployment-2015.png 906w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/verzion-wireless-ipv6-deployment-2015-300x186.png 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/verzion-wireless-ipv6-deployment-2015-768x476.png 768w\" sizes=\"auto, (max-width: 906px) 100vw, 906px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3057\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/t-mobile-wireless-ipv6-deployment-2015.png\" alt=\"T-Mobile IPv6 Deployment graph 2015\" width=\"904\" height=\"562\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/t-mobile-wireless-ipv6-deployment-2015.png 904w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/t-mobile-wireless-ipv6-deployment-2015-300x187.png 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/t-mobile-wireless-ipv6-deployment-2015-768x477.png 768w\" sizes=\"auto, (max-width: 904px) 100vw, 904px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3055\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/comcast-wireless-ipv6-deployment-2015.png\" alt=\"Comcast IPv6 Deployment graph 2015\" width=\"898\" height=\"555\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/comcast-wireless-ipv6-deployment-2015.png 898w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/comcast-wireless-ipv6-deployment-2015-300x185.png 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/comcast-wireless-ipv6-deployment-2015-768x475.png 768w\" sizes=\"auto, (max-width: 898px) 100vw, 898px\" \/><\/p>\n<p><a href=\"http:\/\/6lab.cisco.com\/stats\/cible.php?country=US&amp;option=all\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Recent measurements by Cisco\u00a0<\/a>showing\u00a014% of all traffic to Google arriving over IPv6 is doubtless due to this uptake of IPv6 by these large providers.\u00a0In fact, this particular measurement has increased by over 4% in just the last few months.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3056\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/percentage-of-ipv6-users-2015.png\" alt=\"Percentage of IPv6 Users - 2015\" width=\"1600\" height=\"818\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/percentage-of-ipv6-users-2015.png 1600w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/percentage-of-ipv6-users-2015-300x153.png 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/percentage-of-ipv6-users-2015-768x393.png 768w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/percentage-of-ipv6-users-2015-1024x524.png 1024w\" sizes=\"auto, (max-width: 1600px) 100vw, 1600px\" \/><\/p>\n<p>At last year\u2019s North American IPv6 Summit, Alain Fiocco\u00a0(head of\u00a0Cisco\u2019s IPv6 program and excellent\u00a0<a href=\"http:\/\/6lab.cisco.com\/index.php\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">6lab project<\/a>)\u00a0offered the prediction that continued growth will lead those same traffic levels to 25% by the end of this year.<\/p>\n<p>And IPv6 Essentials author\u00a0and leader of the Swiss IPv6 Council\u00a0Silvia Hagen has predicted based on her own analysis that we\u2019re likely to see worldwide IPv6 traffic to Google grow to 50% by the end of 2017.<\/p>\n<p><strong>IPv4: Going, Going, Gone<\/strong><\/p>\n<p>Meanwhile,\u00a0<a href=\"http:\/\/www.potaroo.net\/ispcol\/2015-01\/addressing2014.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">according to Geoff Huston<\/a>, the\u00a0expansion of the Internet as measured by allocations of public IPv4 address space\u00a0was slow in 2014\u00a0at a\u00a01.8% relative annual growth rate.\u00a0This continues the trend from 2013\u00a0when the rate was 1.9%\u00a0(down from a peak of 8.8% just 7 years ago in 2008).<\/p>\n<p>The current prediction for total exhaustion of IPv4 in North America\u00a0<a href=\"http:\/\/www.potaroo.net\/tools\/ipv4\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">is for sometime around\u00a0April of this year<\/a>\u00a0(2 months from now!).<\/p>\n<p>The rate at which providers can operationally scale IPv6 architectures in time to support the impending tsunami of new devices requiring Internet connectivity in some form will prove\u00a0highly variable.<\/p>\n<p>But any short to medium-term operational\u00a0volatility\u00a0resulting\u00a0from such\u00a0growth pains will likely pale in comparison to the increasingly brittle and costly attempts to keep IPv4 viable through NAT.<\/p>\n<p>The exhaustion of IPv4\u00a0and the complexity and cost\u00a0of\u00a0efforts to keep it viable, the challenge of scaling and reaching operational maturity of\u00a0IPv6 offerings, these factors will conspire to impede\u00a0the continued explosive growth of mobile along with the\u00a0promise of IoT\u00a0deployments.<\/p>\n<p><strong>The IT Story of 2015?<\/strong><\/p>\n<p>It\u2019s very likely that both the technology and mainstream media will begin to publicize this\u00a0resulting downward pressure on Internet growth and innovation. This publicity will include some variation of the themes mentioned above.<\/p>\n<p>Pressure on IT management to clearly explain their IPv6 strategy\u00a0was only ever going to increase in 2015.<\/p>\n<p>But the audience for this critical message may now expand to include both shareholders and the\u00a0public at large.\u00a0This is the year the\u00a0media may drive an increasing and avid\u00a0interest in, if not IPv6 itself, then the threat to the growth of the Internet\u00a0with IPv6 identified as the biggest part of the solution.<\/p>\n<p>The resulting scrutiny\u00a0may prove particularly unwelcome one to those organizations who have neglected to create any IPv6 strategy at all.*<\/p>\n<p>*(If nothing else, we can probably look forward to the shopworn quip\u00a0\u201cSo whatever happened to IPv5?\u201d falling from the lips of the public at large. So when you\u2019re\u00a0fixing Uncle\u00a0Bob\u2019s malware-infected laptop this Thanksgiving and he tries it out on you be sure you\u2019re prepared with\u00a0a courteous chuckle.)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>IT managers have enjoyed a long, long runway for dealing with the reality and likely impacts of IPv4 exhaustion. There are many reasons for this. First among these of course\u00a0is the ubiquity\u00a0of NAT, whose operational complexity and costs are ignored because of its familiarity. Next is that the depletion of IPv4 addresses\u00a0has been happening slowly [&hellip;]<\/p>\n","protected":false},"author":319,"featured_media":2788,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[17],"tags":[16,38,15],"class_list":{"0":"post-3054","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ipv6-coe","8":"tag-infoblox","9":"tag-ipv6","10":"tag-security","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>IT Managers: Get Ready to Explain Your IPv6 Strategy in 2015<\/title>\n<meta name=\"description\" content=\"IT managers have enjoyed a long, long runway for dealing with the reality and likely impacts of IPv4 exhaustion.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/it-managers-get-ready-to-explain-your-ipv6-strategy-in-2015\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT Managers: Get Ready to Explain Your IPv6 Strategy in 2015\" \/>\n<meta property=\"og:description\" content=\"IT managers have enjoyed a long, long runway for dealing with the reality and likely impacts of IPv4 exhaustion.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/it-managers-get-ready-to-explain-your-ipv6-strategy-in-2015\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-02-01T15:33:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:30:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Tom Coffeen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tom Coffeen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/it-managers-get-ready-to-explain-your-ipv6-strategy-in-2015\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/it-managers-get-ready-to-explain-your-ipv6-strategy-in-2015\\\/\"},\"author\":{\"name\":\"Tom Coffeen\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b299068ee4a9f542d2ad7d59a5b1d5b1\"},\"headline\":\"IT Managers: Get Ready to Explain Your IPv6 Strategy in 2015\",\"datePublished\":\"2015-02-01T15:33:26+00:00\",\"dateModified\":\"2020-05-06T17:30:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/it-managers-get-ready-to-explain-your-ipv6-strategy-in-2015\\\/\"},\"wordCount\":747,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/it-managers-get-ready-to-explain-your-ipv6-strategy-in-2015\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg\",\"keywords\":[\"Infoblox\",\"IPv6\",\"Security\"],\"articleSection\":[\"IPv6 CoE\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/it-managers-get-ready-to-explain-your-ipv6-strategy-in-2015\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/it-managers-get-ready-to-explain-your-ipv6-strategy-in-2015\\\/\",\"name\":\"IT Managers: Get Ready to Explain Your IPv6 Strategy in 2015\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/it-managers-get-ready-to-explain-your-ipv6-strategy-in-2015\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/it-managers-get-ready-to-explain-your-ipv6-strategy-in-2015\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg\",\"datePublished\":\"2015-02-01T15:33:26+00:00\",\"dateModified\":\"2020-05-06T17:30:15+00:00\",\"description\":\"IT managers have enjoyed a long, long runway for dealing with the reality and likely impacts of IPv4 exhaustion.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/it-managers-get-ready-to-explain-your-ipv6-strategy-in-2015\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/it-managers-get-ready-to-explain-your-ipv6-strategy-in-2015\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/it-managers-get-ready-to-explain-your-ipv6-strategy-in-2015\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg\",\"width\":660,\"height\":454,\"caption\":\"3 Ways to Ruin Your Future Network with IPv6 Unique Local Addresses (Part 2 of 2)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/it-managers-get-ready-to-explain-your-ipv6-strategy-in-2015\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IPv6 CoE\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/ipv6-coe\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IT Managers: Get Ready to Explain Your IPv6 Strategy in 2015\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b299068ee4a9f542d2ad7d59a5b1d5b1\",\"name\":\"Tom Coffeen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_319_1574118081-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_319_1574118081-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_319_1574118081-96x96.jpg\",\"caption\":\"Tom Coffeen\"},\"description\":\"Tom Coffeen is a network engineer, architect, and author with over twenty years of internetwork design, deployment, administration, and management experience. Tom co-founded HexaBuild, an IT consultancy specializing in the advancement of cloud, IoT, and security deployment best practices through IPv6 adoption. Prior to co-founding HexaBuild, Tom was an IPv6 Evangelist and a Distinguished Architect at Infoblox. Before that Tom was the VP of network architecture at the global CDN Limelight Networks where he led their deployment of IPv6. He is also the author of O\u2019Reilly Media\u2019s IPv6 Address Planning.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/tom-coffeen\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"IT Managers: Get Ready to Explain Your IPv6 Strategy in 2015","description":"IT managers have enjoyed a long, long runway for dealing with the reality and likely impacts of IPv4 exhaustion.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/it-managers-get-ready-to-explain-your-ipv6-strategy-in-2015\/","og_locale":"en_US","og_type":"article","og_title":"IT Managers: Get Ready to Explain Your IPv6 Strategy in 2015","og_description":"IT managers have enjoyed a long, long runway for dealing with the reality and likely impacts of IPv4 exhaustion.","og_url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/it-managers-get-ready-to-explain-your-ipv6-strategy-in-2015\/","og_site_name":"Infoblox Blog","article_published_time":"2015-02-01T15:33:26+00:00","article_modified_time":"2020-05-06T17:30:15+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg","type":"image\/jpeg"}],"author":"Tom Coffeen","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Tom Coffeen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/it-managers-get-ready-to-explain-your-ipv6-strategy-in-2015\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/it-managers-get-ready-to-explain-your-ipv6-strategy-in-2015\/"},"author":{"name":"Tom Coffeen","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b299068ee4a9f542d2ad7d59a5b1d5b1"},"headline":"IT Managers: Get Ready to Explain Your IPv6 Strategy in 2015","datePublished":"2015-02-01T15:33:26+00:00","dateModified":"2020-05-06T17:30:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/it-managers-get-ready-to-explain-your-ipv6-strategy-in-2015\/"},"wordCount":747,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/it-managers-get-ready-to-explain-your-ipv6-strategy-in-2015\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg","keywords":["Infoblox","IPv6","Security"],"articleSection":["IPv6 CoE"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/it-managers-get-ready-to-explain-your-ipv6-strategy-in-2015\/","url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/it-managers-get-ready-to-explain-your-ipv6-strategy-in-2015\/","name":"IT Managers: Get Ready to Explain Your IPv6 Strategy in 2015","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/it-managers-get-ready-to-explain-your-ipv6-strategy-in-2015\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/it-managers-get-ready-to-explain-your-ipv6-strategy-in-2015\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg","datePublished":"2015-02-01T15:33:26+00:00","dateModified":"2020-05-06T17:30:15+00:00","description":"IT managers have enjoyed a long, long runway for dealing with the reality and likely impacts of IPv4 exhaustion.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/it-managers-get-ready-to-explain-your-ipv6-strategy-in-2015\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/ipv6-coe\/it-managers-get-ready-to-explain-your-ipv6-strategy-in-2015\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/it-managers-get-ready-to-explain-your-ipv6-strategy-in-2015\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg","width":660,"height":454,"caption":"3 Ways to Ruin Your Future Network with IPv6 Unique Local Addresses (Part 2 of 2)"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/it-managers-get-ready-to-explain-your-ipv6-strategy-in-2015\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"IPv6 CoE","item":"https:\/\/www.infoblox.com\/blog\/category\/ipv6-coe\/"},{"@type":"ListItem","position":3,"name":"IT Managers: Get Ready to Explain Your IPv6 Strategy in 2015"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b299068ee4a9f542d2ad7d59a5b1d5b1","name":"Tom Coffeen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_319_1574118081-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_319_1574118081-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_319_1574118081-96x96.jpg","caption":"Tom Coffeen"},"description":"Tom Coffeen is a network engineer, architect, and author with over twenty years of internetwork design, deployment, administration, and management experience. Tom co-founded HexaBuild, an IT consultancy specializing in the advancement of cloud, IoT, and security deployment best practices through IPv6 adoption. Prior to co-founding HexaBuild, Tom was an IPv6 Evangelist and a Distinguished Architect at Infoblox. Before that Tom was the VP of network architecture at the global CDN Limelight Networks where he led their deployment of IPv6. He is also the author of O\u2019Reilly Media\u2019s IPv6 Address Planning.","url":"https:\/\/www.infoblox.com\/blog\/author\/tom-coffeen\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3054","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/319"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=3054"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3054\/revisions"}],"predecessor-version":[{"id":3059,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3054\/revisions\/3059"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2788"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=3054"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=3054"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=3054"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}