It was 11:10pm on the night of October 9, 2019. Here along the Monterey Bay the weather was calm, cool, and a bit damp. The lights were on, the internet was working, the car was charging; everything was normal.
At 11:11pm things suddenly changed.
The lights went out.
Internet service dropped...
Karl Auerbach, Chief Technical Officer at IWL, will deliver one of the keynote addresses at the North American Network Operator’s Group (NANOG 77):
10:00 a.m. - 10:30 a.m.
Tuesday October 29, 2019
ICS-CERT (Industrial Control System – Computer Emergency Response Team) is part of the U.S. Department of Homeland Security. Recently CERT issued two Advisories concerning TCP/IP implementation...
IWL has its offices at the Kings Village Center in Scotts Valley, California. This morning we noticed construction in the parking lot.
A bit of inquiring revealed that Tesla is installing a new Supercharging station here in the...
Prior to planning or funding 5G rollouts, technology implementers must rigorously question 5G claims and look for substantiated evidence
IWL issued a caution today that some of the claims made by investors in 5G technology are exaggerated or lead to overly-naïve conclusions.
Nearly half of US mobile shoppers say they would abandon an app if it doesn’t load in three seconds or less, according to industry research reported in ComputerWeekly.com in 2014.
More than ever, users want a snappy, responsive product. If they don’t get it, they will walk away.
To help combat...
Practical considerations for software developers considering 5G network emulation
5G is the latest technology for cellular mobile communications. Deployment is expected to take place sometime between late 2019 and mid 2020. The benefits of 5G will be available to new, 5G-enabled devices. Howev...
Software developers and implementers want guidelines and advisories for testing TCP/IP. Available and implemented in the 1970s and codified in the 1980s, updates and changes to the TCP/IP protocol continue up through the present day.
Info Security recently published an article about the Payment Card Industry's final push to force the adoption of TLS 1.1 or higher.
This article provides a good summary of the evolution of SSL/TLS, the pitfalls of earlier versions, and advantages of the most recent standards:
IWL's KMAX network emulator is changing the way passwords are handled.
The state of California has enacted a new law that affects the way that initial passwords are established on network attached devices TITLE 1.81.26. Security of Connected Devices
It is a sensible law that will improve the security of devices on the internet.
As a consequence of these new requirements IWL is making a few changes to KMAX.
These changes are in effect for KMAX units constructed after mid November 2018. (Except for KMAX-V, the date for the change on that platform is yet to be established, but it is expected to occur before the end of 2018.)
Open source advocates have long proclaimed the intrinsic quality and security of open source code. They argue that because the code is open it is inspected by many eyes and tested by many hands.
I dispute that argument.
Code will become better through more inspection, and improved testing, no matter whether that code is "open", "free", or "proprietary".