Facebook’s introduction of its own crypto-currency to its 2 billion users means mass adoption of crypto-currencies and digital wallets are on the horizon. This has implications that trademark owners need to be aware of.—Thomas Barrett
In the background here are several privacy policies from major tech and media platforms. Like most privacy policies, they’re verbose and full of legal jargon — and opaquely establish companies’ justifications for collecting and selling your data. The data market has become the engine of the internet, and these privacy policies we agree to but don’t fully understand help fuel it. —Kevin Litman-Navarro
Performance on PCI Express slots has been improving by a factor of 100% every few years since the turn of the century, but things stalled with PCI Express 3.0, which was followed by a seven-year gap between the publishing of new specifications and it’s only now, in 2019, that we’re starting to see motherboards and add-in cards that support the new standard. —Jon Martindale
Cybersecurity researchers have released an updated version of GandCrab ransomware decryption tool that could allow millions of affected users to unlock their encrypted files for free without paying a ransom to the cybercriminals. —Mohit Kumar
Internet Exchange route servers are peering broker systems. They allow organizations to exchange traffic at IXPs with other organizations, even where there are no explicit BGP sessions enabled. —Internet Exchange route servers are peering broker systems. They allow organizations to exchange traffic at IXPs with other organizations, even where there are no explicit BGP sessions enabled.
In June, I participated in a workshop organized by the Internet Architecture Board on the topic of protocol design and effect, looking at the differences between initial design expectations and deployment realities. These are my impressions from the discussions that took place at this workshop. —Geoff Huston