Wi-Fi Security Bug to be Explained

Wi-Fi Security Bug to be Explained

Wireless network security weakness to demo at DEFCON: Security researchers have discovered security shortcomings in the WPA2 protocol that threaten the security of wireless networks, even if they are running…

July 27, 2010 0

Web sites vulnerable to phishing attacks

A new report from security firm Dasient concludes that the majority of websites are running third-party JavaScript somewhere on their sites, which could be putting them at risk. See the…

July 26, 2010 0

The Apple Antenna Story

What happens when real antenna engineers measure the performance of the iPhone 4’s antenna under different grip conditions? They find that it really needs a bumper: We can make several…

July 22, 2010 0

FCC’s Deeply Flawed Broadband Report

In my day job, I’m a policy researcher at ITIF working on Internet issues, so the FCC Broadband Deployment Report naturally caught my eye. See the analysis: The bottom line…

July 22, 2010 0

Internet Congestion 201

This is the second part of an examination of the nature of congestion on packet switched networks such as the Internet. In the first part, Internet Congestion 101, we looked…

July 22, 2010 2

Mobile Data Traffic Management Options

Dean Bubley is one of the most interesting contrarian thinkers in the mobile space, and all of his work is worthy of consideration whether you agree with his conclusions or…

July 19, 2010 0

Internet Congestion 101

One of the questions that comes up most persistently in discussions of the Internet is congestion. Traffic management by ISPs is a response to congestion, and naive critics of the…

June 28, 2010 2

Welcome to High Tech Forum

I’m glad you’ve found this needle in the Internet’s haystack, and hope you’ll come back on a regular basis, add us to your RSS reader, comment on our posts, and…

June 23, 2010 3