Biometric authentication is the latest in a wave of authentication methods with voice being one of the top contenders. Here’s a detailed overview of this technology, including risks, benefits and future potential.
Major changes are coming to the plumbing that underlies the Web. The HTTP protocol was last updated in the late 1990s and has largely remained unchanged since its inception more than 20 years ago. Two recent, ongoing initiatives promise to reshape the Web as we’ve known it. This article provides a high-level overview of what lies ahead.
In this article we’ll look at the use of XPath queries to decide whether or not to execute a task when a specific Windows event occurs.
In this article we'll discuss how to use Performance Monitor to watch for certain conditions and set up a triggering mechanism for responding to them.
In this series the author looks at some well-known network attacks and examines free, readily-available tools and scripting techniques that can help you respond to them.
In this article we'll go over examples of how Apple utilizes Bonjour in its products.
In this article the author discusses Apple's Bonjour.
In this article the author reviews how Microsoft does service discovery over IPv6 multicast.
In this article the author explains what is IPv6 zero-configuration networking and Microsoft's IPv6 multicast name resolution.
In this post the author will wrap up how multicast is used for IPv6 auto-configuration.