ALERT

[WEBINAR] The Future of Data and Analytics

Protocol



Patents are meant to protect innovators, but patent trolls are taking advantage of the system by obtaining fraudulent patents and then...

Innovation vs. the Patent Troll


If you are on the Internet regularly, chances are you have come across a site that uses OAuth. Find out how the newest version of this...

OAuth 2.0 101


What's a second or two between friends? When it comes to systems and networks it can mean the difference between success and failure.

How Network Time Protocol Keeps the Internet Ticking


Did you know that the successful operation of the internet hinges on DNS and a few other protocols? Find out why this one protocol holds...

DNS: One Internet Protocol to Rule Them All


Despite its small number of commands, SNMP is a powerful - and useful - protocol.

SNMP: The Little Protocol That Could


IRC is a wonderful way to get free support, especially for open-source software, but it's often overlooked in favor of newer social media...

Remember IRC? It's Still Around - And It's Still Worth Using


IPv6 infrastructure appears to be on the way, but the switch from IPv4 won't come without obstacles. Find out more here.

The Trouble With IPv6


Wi-Fi technology has resulted in an explosion of connectivity, but this communication medium has some vulnerabilities. If proper...

Top 3 Wi-Fi Security Vulnerabilities


When BGP was developed, network security wasn't an issue. That's why the problem with BGP is also its greatest advantage: its simplicity.

Border Gateway Protocol: The Biggest Network Vulnerability Of All?


Don't know how to tell a URI from a URL? You're not alone. Learn about these commonly confused terms, as well as the less common URN.

What is the difference between a URL and a URI?


Learn about the new version of Bluetooth, what devices can use the new standard, and potential new applications for the technology.