ALERT

[WEBINAR] Fast Analytics for Big Data and Small

Protocol


Innovation vs. the Patent Troll Innovation vs. the Patent Troll Innovation vs. the Patent Troll Innovation vs. the Patent Troll


Patents are meant to protect innovators, but patent trolls are taking advantage of the system by obtaining fraudulent patents and then...

OAuth 2.0 101 OAuth 2.0 101 OAuth 2.0 101 OAuth 2.0 101


If you are on the Internet regularly, chances are you have come across a site that uses OAuth. Find out how the newest version of this...

How Network Time Protocol Keeps the Internet Ticking How Network Time Protocol Keeps the Internet Ticking How Network Time Protocol Keeps the Internet Ticking How Network Time Protocol Keeps the Internet Ticking


What's a second or two between friends? When it comes to systems and networks it can mean the difference between success and failure

DNS: One Internet Protocol to Rule Them All DNS: One Internet Protocol to Rule Them All DNS: One Internet Protocol to Rule Them All DNS: One Internet Protocol to Rule Them All


Did you know that the successful operation of the internet hinges on DNS and a few other protocols? Find out why this one protocol holds...

SNMP: The Little Protocol That Could SNMP: The Little Protocol That Could SNMP: The Little Protocol That Could SNMP: The Little Protocol That Could


Despite its small number of commands, SNMP is a powerful - and useful - protocol

Remember IRC? It's Still Around - And It's Still Worth Using Remember IRC? It's Still Around - And It's Still Worth Using Remember IRC? It's Still Around - And It's Still Worth Using Remember IRC? It's Still Around - And It's Still Worth Using


IRC is a wonderful way to get free support, especially for open-source software, but it's often overlooked in favor of newer social media...

The Trouble With IPv6 The Trouble With IPv6 The Trouble With IPv6 The Trouble With IPv6


IPv6 infrastructure appears to be on the way, but the switch from IPv4 won't come without obstacles. Find out more here

Top 3 Wi-Fi Security Vulnerabilities Top 3 Wi-Fi Security Vulnerabilities Top 3 Wi-Fi Security Vulnerabilities Top 3 Wi-Fi Security Vulnerabilities


Wi-Fi technology has resulted in an explosion of connectivity, but this communication medium has some vulnerabilities. If proper...

Border Gateway Protocol: The Biggest Network Vulnerability Of All? Border Gateway Protocol: The Biggest Network Vulnerability Of All? Border Gateway Protocol: The Biggest Network Vulnerability Of All? Border Gateway Protocol: The Biggest Network Vulnerability Of All?


When BGP was developed, network security wasn't an issue. That's why the problem with BGP is also its greatest advantage: its simplicity

What is the difference between a URL and a URI? What is the difference between a URL and a URI? What is the difference between a URL and a URI? What is the difference between a URL and a URI?


Don't know how to tell a URI from a URL? You're not alone. Learn about these commonly confused terms, as well as the less common URN

From Bluetooth to New Tooth: A Look at Bluetooth 4.0 From Bluetooth to New Tooth: A Look at Bluetooth 4.0 From Bluetooth to New Tooth: A Look at Bluetooth 4.0 From Bluetooth to New Tooth: A Look at Bluetooth 4.0


Learn about the new version of Bluetooth, what devices can use the new standard, and potential new applications for the technology