Data created by Internet of Things (IoT) sensors must be secured better, say some. A simple password-on-device solution is no longer sufficient thanks to increasing data protection regulations, a new public awareness of tracking, and hugely proliferating devices. A new kind of architecture using Se..
The global server market grew about 5 percent in 2018, but it will slow in the first half of 2019, according to market researcher TrendForce. However, the company also projects a buyer’s market for DRAM, as a glut of memory hits and memory manufacturers slow down production. Enterprise servers conti..
(Editor’s note: Recent research by Enterprise Management Associates takes a look at how enterprises view currently available SD-WAN products. This article by Shamus McGillicuddy, EMA’s research director for network management, details highlights of “Wide-Area Network Transformation: How Enterprises ..
Wi-Fi 6, also known as 802.11ax, is viewed by many to be game changing, as it’s the first major architectural change to the wireless LAN since its inception. Unlike other standards, which were just faster versions of the previous incarnation, Wi-Fi 6 is built from the ground up to support a world th..
Address Space Layout Randomization (ASLR) is a memory-protection process for operating systems that guards against buffer-overflow attacks. It helps to ensure that the memory addresses associated with running processes on systems are not predictable, thus flaws or vulnerabilities associated with the..
Wireless mesh has been around since the early times of Wi-Fi, and it's getting more attention lately in the consumer world. There are mesh systems available from Google, Eero, Linksys, Netgear, and nearly every networking brand that targets homes and small offices. But there are Wi-Fi mesh solu..
The Internet Corporation for Assigned Names and Numbers (ICANN) this week will do some important housecleaning from its successful, first-ever cryptographic key change performed last October. In October, ICANN rolled out a new, more secure root zone Key Signing Key -2017 (KSK-2017), but the process ..
The Internet Corporation for Assigned Names and Numbers will this week do some important housecleaning from its successful, first-ever cryptographic key change performed last October. In October ICANN rolled out a new, more secure root zone Key Signing Key -2017 (KSK-2017) but the process wasn’t com..
While the IoT is already a well-known phenomenon in the tech world, the specifics of IoT implementations are sometimes less than obvious. Here’s a quick-and-dirty overview of the wildly diverse and still evolving landscape of the IoT devices themselves, divided for your reading pleasure into the con..
You've probably already heard about 5G, the new cellular technology that's poised to bring massive change to both mobile and fixed wireless data networks. What you may be wondering is how 5G differs from 4G, the current cellular network standard, and what benefits the new technology will b..