Sign in / up
The Register® — Biting the hand that feeds IT

Topics

Security

Security

All SecurityCyber-crimePatchesResearchCSO
Off-Prem

Off-Prem

All Off-PremEdge + IoTChannelPaaS + IaaSSaaS
On-Prem

On-Prem

All On-PremSystemsStorageNetworksHPCPersonal TechCxOPublic Sector
Software

Software

All SoftwareAI + MLApplicationsDatabasesDevOpsOSesVirtualization
Offbeat

Offbeat

All OffbeatDebatesColumnistsScienceGeek's GuideBOFHLegalBootnotesSite NewsAbout Us
Special Features

Special Features

All Special Features The Future of the Datacenter Cybersecurity Month VMware Explore Cloud Infrastructure Month

Vendor Voice

Vendor Voice

Vendor Voice

All Vendor Voice Pure Storage Kilka Tech HERE and AWS Vonage GE Vernova with AWS Amazon Web Services (AWS) New Horizon in Cloud Computing DDN Google Cloud Data Transformation Google Gemini Hewlett Packard Enterprise: Edge-to-Cloud Platform Intel vPro VMware
Resources

Resources

Whitepapers Webinars & Events Newsletters

Bruce Davie

Contrary to some, traceroute is very real – I should know, I helped make it work

Systems Approach Gather around the fire for another retelling of computer networking history
Networks14 Dec 2024 | 74

Will passkeys ever replace passwords? Can they?

Systems Approach Here's why they really should
Security17 Nov 2024 | 126

Um, what ever did happen with network automation?

Systems Approach Is it lingering somewhere between fusion power and self-driving cars?
Networks17 Jun 2024 | 10

Forget the AI doom and hype, let's make computers useful

Systems Approach Machine learning has its place, just not in ways that suits today's hypesters
Software25 Apr 2024 | 62

How not to write about network security – and I'm speaking from experience

Systems Approach At least it's no longer an afterthought
Networks01 Feb 2024 | 20

NAT, ATM, decentralized search – and other outrageous opinions from the 1990s

Systems Approach The predictions that turned out correct ... and the ones we wished were right
Networks29 Dec 2023 | 58

How TCP's congestion control saved the internet

Systems Approach We guess it's OK it did
Networks24 Sep 2023 | 49

Why securing East-West network traffic is so important – and how it can be done

Systems Approach You don't want to hand your datacenter over to an intruder quite so easily
Networks16 Aug 2023 | 15

It's time to mark six decades of computer networking

Systems Approach As we yearn for a return to a truly decentralized internet
Networks28 Jun 2023 | 91

With Mastodon, decentralization strikes back

Systems Approach ActivityPub isn't just what we've been doing over the Christmas break
Software01 Jan 2023 | 64

If you need a TCP replacement, you won't find a QUIC one

Systems Approach But we can say what this upcoming protocol is good for
Networks07 Oct 2022 | 20

You're not wrong. The scope for quantum computers remains small

Systems Approach Perhaps a QC can help us work out why we'd want a QC
Science21 Jul 2022 | 15

Zero Trust: What does it actually mean – and why would you want it?

Systems Approach 'Narrow and specific access rights after authentication' wasn't catchy enough
Networks30 Jun 2022 | 10

How to explain what an API is – and why they matter

Systems Approach Some of us have used them for decades, some are seeing them for the first time on marketing slides
Devops25 May 2022 | 21

The time we came up with a solution – and found a big customer problem

Systems Approach A fascinating firsthand retelling of the technical history of MPLS
Networks02 Mar 2022 | 6

What is Magma? An open-source project for building mobile networks

Systems Approach Amar and Bruce explain how cloud native principles can be applied to wireless connectivity
Networks28 Dec 2021 | 6

SmartNICs, IPUs, DPUs de-hyped: Why and how cloud giants are offloading work from server CPUs

Systems Approach Where this technology grew from, and what it offers you
Networks24 Nov 2021 | 7

Here's an idea: Verification for computer networks as well as chips and code

Systems Approach What tools are available? What are the benefits? Let's find out
Networks23 Sep 2021 | 8

It's time to decentralize the internet, again: What was distributed is now centralized by Google, Facebook, etc

Systems Approach The idea was to remove central points of failure, not introduce them
Networks11 Aug 2021 | 69

Security is an architectural issue: Why the principles of zero trust and least privilege matter so much right now

Systems Approach We need to solve underlying problems, not increase complexity with point fixes
Networks27 May 2021 | 17

The Register icon Biting the hand that feeds IT

About Us

  • Contact us
  • Advertise with us
  • Who we are

Our Websites

  • The Next Platform
  • DevClass
  • Blocks and Files

Your Privacy

  • Cookies Policy
  • Privacy Policy
  • Ts & Cs
Situation Publishing

Copyright. All rights reserved © 1998–2024