the introduction of ATSC 3.0. This is the newest upgrade to broadcast television and is the first big upgrade since TV converted to all-digital over a decade ago. ATSC 3.0 is the latest standard that’s been released by the Advanced Television Systems Committee that creates the standards used by over-the-air broadcasters. —Doug Dawson

Adjacency to the current set of capabilities provides a disciplined way to think about where to invest next when working to stave off irrelevance. If distribution of runtimes is blocked, competition falters, and adjacent capabilities can go un-addressed. —Alex Russell

One strong message from the 2018 APNIC Survey was that not all organizations are ready to deploy IPv6, therefore, even while promoting IPv6 deployment, APNIC must continue to support access to IPv4 address space. —Vivek Nigam

How can we find a way to gain 80% of the benefits for 20% of the work? Named after Italian economist Vilfredo Pareto, the “Pareto Principle” asserts that for many events, roughly 80% of the effects come from 20% of the causes. Can we identify a Cybersecurity Pareto Principle? We can if security teams concentrate on these six priorities: —Dan Blum

Hypertext Transfer Protocol Secure (HTTPS) is a secure extension of the Hypertext Transfer Protocol (HTTP). —Bill Hess

Earlier this year, I did a webinar for the APNIC Academy on Learning from Honeypots. In the presentation, I shared some insights from our Community Honeynet Project, and information about the infrastructure and data collected. Since then, I have received some questions about the tools we use to run the community project. —Adli Wahid

In an effort to understand how other economies have adopted DNSSEC more than Japan, I interviewed organizations in Sweden, Iceland, and Saudi Arabia, which as mentioned have been instrumental in the increase in the percentage of worldwide DNSSEC validation. —Yoshibumi Suematsu

There are now more than 1,000 top-level domains (TLDs), but which is best for branding yourself or your business? With search engines, does it even make a difference? What does it matter which TLD you chose as long as you rank high enough on Google? —David Castello

What’s in a name? A lot, actually, if we’re talking about Intel processors. Intel uses internal code names designed to hide what the company is working on until it’s ready to go public. So, it’s no wonder these terms aren’t very meaningful to the uninitiated. —Ian Paul

Similar to Thunderbolt 3, the next-generation Thunderbolt 4 unites charging, video delivery, and data transfers on the same port. Thunderbolt 4 also adds compatibility with the USB4 standard, improved security, support for multi-monitor setups, and fast data transfer rates of up to 40Gbps. —Chuong Nguyen

Nilay and Katie discuss the history of bug bounty programs, from the early iterations to the current state of affairs, from good to bad. Though Moussouris says the concept of hiring hackers to help make organizations more secure has numerous positives, the commercialization of the practice has created blindspots and other unintended incentives. —Andrew Marino

Ransomware has been around for decades going back all the way to 1989. Since then it has only magnified in scope and complexity. Now at a time when working remotely is becoming more universal and the world is trying to overcome the Covid-19 pandemic, ransomware has never been more prominent. —Matthew Jerzewski