Patents are meant to protect innovators, but patent trolls are taking advantage of the system by obtaining fraudulent patents and then...

Innovation vs. the Patent Troll

If you are on the Internet regularly, chances are you have come across a site that uses OAuth. Find out how the newest version of this...

OAuth 2.0 101

What's a second or two between friends? When it comes to systems and networks it can mean the difference between success and failure.

How Network Time Protocol Keeps the Internet Ticking

Did you know that the successful operation of the internet hinges on DNS and a few other protocols? Find out why this one protocol holds...

DNS: One Internet Protocol to Rule Them All

Despite its small number of commands, SNMP is a powerful - and useful - protocol that has persisted for decades, and is likely to continue...

SNMP: The Little Protocol That Could

IRC is a wonderful way to get free support, especially for open-source software, but it's often overlooked in favor of newer social media...

Remember IRC? It's Still Around - And It's Still Worth Using

IPv6 infrastructure appears to be on the way, but the switch from IPv4 won't come without obstacles. Find out more here.

The Trouble With IPv6

Wi-Fi technology has resulted in an explosion of connectivity, but this communication medium has some vulnerabilities. If proper...

Top 3 Wi-Fi Security Vulnerabilities

When BGP was developed, network security wasn't an issue. That's why the problem with BGP is also its greatest advantage: its simplicity.

Border Gateway Protocol: The Biggest Network Vulnerability Of All?

Don't know how to tell a URI from a URL? You're not alone. Learn about these commonly confused terms, as well as the less common URN.

What is the difference between a URL and a URI?

Learn about the new version of Bluetooth, what devices can use the new standard, and potential new applications for the technology.