Ever since the first smartphones hit the market, the idea of handing off cellular traffic to wireless networks has been appealing. The issue is how to do this in a frictionless and secure way for the customer. Passpoint is seeing wider industry implementation, letting carriers use wireless infrastructure while logically keeping users on the “network”.
A lot of organizations and people are finding ways to apply their expertise to the COVID-19 pandemic. Verizon put forth an interesting effort with the release of the CORD-19 search engine. The company used its considerable ad tech portfolio to create the platform.
The OSI model has eight layers, right? So why do we spend all our time working on two or three of them? Lee Badman tells us a story about how we need to remember to respect all the layers of the networking model properly.
It’s no surprise to see that various online services have seen large usage increases due to the COVID-19 pandemic. But Microsoft recently revealed that Azure usage increased by 775%. What does that mean for their cloud reliability and will other public clouds share similar numbers?
It’s been weeks since the reality of remote work hit home to untold number of organizations. Two recent reflections on this got Rich Stroffolino thinking about how the global pandemic is pushing everyone to digital transformation, both as a largely abstract industry trend, down to the practical crisis of supporting thousands of workers remotely.
Is it hot in here? Or is it just me? Chances are if you’re running computing and networking equipment in your house, it really is hot. Scott Lester details how he dealt with the heat of a home setup in this great post.
In a piece by Phil Gervasi, he discusses something good that has come out of our current reality. It’s an idea that might prevent harried parents from speeding to chauffeur kids to lessons after school: Can you actually conduct music lessons over a conferencing system like Zoom? Network Phil’s short video provides solid tips on how he optimizes audio for Zoom remote music lessons.
With the COVID-19 pandemic in full effect, the race is on by medical researchers to find potential treatments and a vaccine. All this medical research requires a lot of computer power to model potential therapies quickly. Luckily, we’re seeing two different approaches each bringing a lot of power to bear.
Prepare for another attack on encryption in the U.S. The EARN-IT Act purports to be about protecting children from predation, but it’s really about forcing the tech companies to break their encryption schemes.
FireEye recently published a study showing an 860% increase in “human-operated ransomware.” The study shows that this has resulted in attacks target times when organizations are least likely to respond. But what stood out were how they chose to visualize that information.