Prior to planning or funding 5G rollouts, technology implementers must rigorously question 5G claims and look for substantiated evidence
IWL issued a caution today that some of the claims made by investors in 5G technology are exaggerated or lead to overly-naïve conclusions.
Nearly half of US mobile shoppers say they would abandon an app if it doesn’t load in three seconds or less, according to industry research reported in ComputerWeekly.com in 2014.
More than ever, users want a snappy, responsive product. If they don’t get it, they will walk away.
To help combat...
Practical considerations for software developers considering 5G network emulation
5G is the latest technology for cellular mobile communications. Deployment is expected to take place sometime between late 2019 and mid 2020. The benefits of 5G will be available to new, 5G-enabled devices. Howev...
Software developers and implementers want guidelines and advisories for testing TCP/IP. Available and implemented in the 1970s and codified in the 1980s, updates and changes to the TCP/IP protocol continue up through the present day.
Info Security recently published an article about the Payment Card Industry's final push to force the adoption of TLS 1.1 or higher.
This article provides a good summary of the evolution of SSL/TLS, the pitfalls of earlier versions, and advantages of the most recent standards:
IWL's KMAX network emulator is changing the way passwords are handled.
The state of California has enacted a new law that affects the way that initial passwords are established on network attached devices TITLE 1.81.26. Security of Connected Devices
It is a sensible law that will improve the security of devices on the internet.
As a consequence of these new requirements IWL is making a few changes to KMAX.
These changes are in effect for KMAX units constructed after mid November 2018. (Except for KMAX-V, the date for the change on that platform is yet to be established, but it is expected to occur before the end of 2018.)
Open source advocates have long proclaimed the intrinsic quality and security of open source code. They argue that because the code is open it is inspected by many eyes and tested by many hands.
I dispute that argument.
Code will become better through more inspection, and improved testing, no matter whether that code is "open", "free", or "proprietary".
IWL Engineering has completed its investigation of the CVE-2018-10933 security flaw (libssh bug) and found that this bug is not present in our products.
Based on testing conducted by IWL engineers, there is no indication that either Mini Maxwell or KMAX is subject to the libssh flaw.
For the Maxwell Pro products, based on RedHat Fedora, RedHat has stated that its systems are not vulnerable; our testing is consistent with that.
Implementations of the popular Message Queuing Telemetry Transport (MQTT) Publish and Subscribe Protocol are now subject to rigorous testing.
Question: My team is developing a new software app that runs on iOS and Android phones. I have Windows 10 running on my desktop. I plan to go ahead and test it out with the built-in Windows 10...
The Los Angeles Times reported today that "More than 23,000 Californians were registered to vote incorrectly by state DMV."
The errors, which were discovered more than a month ago, happened when DMV employees did not clear their computer screens between customer appointments. That ...