768 Results for

protocols

Gallery

SmartThings' protocol hub grows up (pictures)

At CES 2015, SmartThings unveiled a new hub and sensors designed to launch the brand into a new generation of connectivity and integration.

6 Images By January 6, 2015

Article

Key players in Internet of Things promote Thread protocol at Google campus

Google's Nest Labs, Samsung, Big Ass Fans and others came together to tout the burgeoning Thread standard that allows smart home devices to communicate with one another.

By September 30, 2014

Article

Nginx upgrade funded by fans of Google's SPDY Web protocol

Nginx will move to the latest version of Google's Web-speedup software with funding from CloudFlare, MaxCDN, and WordPress developer Automattic.

By December 20, 2013

Article

The driver's license of the future is coming to your smartphone

A few states have begun the journey toward offering a digital version of your driver's license that would reside on your phone. But the going could be stop and go for a while.

By March 21, 2015

Article

More than 1,200 popular Android apps still vulnerable to FREAK

Researchers from FireEye claim the security risks posed by the FREAK bug are far from over.

By March 18, 2015

Article

Apple didn't violate wireless tech patents, jury finds

A federal jury in Texas says that Apple did not infringe on five wireless technology patents in a case filed back in 2012.

By March 17, 2015

Article

Microsoft Windows update addresses FREAK flaw, Stuxnet worm

The fix comes less than a week after Redmond acknowledged vulnerability to decade-old encryption flaw.

By March 10, 2015

Article

What we now know -- and still don't know -- about the Apple Watch

At its media event on March 9, Apple was supposed to fill in the missing details on its new Watch line, which ships April 24. Some blanks have been filled in, but many pressing questions remain.

By March 10, 2015

Article

Court: Homeland Security must disclose cellular shutdown protocols

The US government's SOP 303 codifies the shutdown and restoration process "for use by commercial and private wireless networks during national crises."

By November 15, 2013

Article

Microsoft Windows vulnerable to 'FREAK' encryption flaw too

Previously thought limited to Apple and Google browsers, the flaw leaves communications between affected users and websites open to interception.

By March 5, 2015