Reducing the control loop in congestion control
Guest Post: Decoupling the control loop from full path congestion control helps to bypass bottleneck routers, reducing video buffering.
Guest Post: Decoupling the control loop from full path congestion control helps to bypass bottleneck routers, reducing video buffering.
Guest Post: How does the industry effectively assess software security?
Guest Post: The vulnerabilities that led to the discovery of browser-powered desync attacks.
People are talking about the Internet and climate change — hot air or substantial conversations?
KINDNS, DNSSEC deployment risks, fourteen years in the life of A-Root, DNS at the IETF, and more from DNS-OARC 39.
Guest Post: ACC-Turbo is an open-source, pulse-wave DDoS defence system that runs at line rate, on programmable switches.
Guest Post: How TLS stack fingerprinting can be done efficiently and provide valuable security-related insights.
Guest Post: Does the development of encrypted DNS help or hinder cybersecurity?
Guest Post: The only practical way to mitigate an attack surface is to control access to it.
Guest Post: Measuring the Log4jShell incident.