Webinar about the Kantara User-Managed Access (UMA) working group to the IETF ACE Working Group

[UPDATED: 14. January 2015] Early 2014 we organized a couple of webinars to hear about technologies that allowed to provide authentication of Internet of Things devices and to control access to resources. We learned more about OAuth, Kerberos, and the PKI/certificate model and all talks have been recorded and can be found

Webinar about “How to Select Hardware for Internet of Things Systems?”

Various groups in the IETF currently standardize technology for use with constrained devices and the choice of hardware impacts the design of Internet of Things (IoT) systems. To provide guidance RFC 7228 “Terminology for Constrained-Node Networks” defines three classes of devices depending on their RAM and flash memory size. Class

Testing for Bufferbloat

In my previous post I summarize the ongoing activities regarding bufferbloat. Reading through the blog post you might have gotten interested to reproduce the results published in various papers, you might want to test your favorite networking gear, or you might just want to run some tests in your home