News

Jin Jian, head of Huawei's Data Communication Protocol Development Department, delivered a keynote speech titled "Enterprise ...
Along with that comes protection for data in transit often referred to as network security. This blog focuses on discussing ...
Multiparty Session Types (MPST) provide a rigorous formalism for specifying and verifying the correctness of communications in distributed systems. Rooted in the notion of behavioural types, MPST ...
Last time, one of our readers challenged VoIP market leaders Cisco, Nortel and Avaya on their commitment to open standard, cost-effective VoIP solutions. Today, we’d like to add our observations and ...
One of the most widely used network protocols is vulnerable to a newly discovered attack that can allow adversaries to gain control over a range of environments, including industrial controllers, ...
The layer 2 market is constantly expanding, and scaling solutions like the Lightning Network exist for other blockchains as ...
IEEE 802.1X is a standard that defines how to provide authentication for devices that connect with other devices on local area networks (LANs). It provides a mechanism by which network switches and ...
6 Types of Network Address Translation: Which One to Use? Your email has been sent Even though we’re no longer running out of IP addresses, Network Address Translation still plays a vital role. Learn ...