Back to Vendor Listings

Not Like the Others

(This is the sixth installment in an on-going examination of the first principles of data privacy and security. The first installment can be read here. The second installment can be read here. The third installment can be read here. The fourth installment can be read here. The fifth installment can be read here. These principles, often represented in regulations and privacy…

House of Cards

Packets is packets, right?  Wrong. With the demise of the Net Neutrality standards, Internet providers are free to “prioritize” certain kinds of packets over others.  Now this is nothing new.  The TCP/IP protocols already prioritize packets based upon their nature, source and destination.  Latency is not much of a problem for e-mail, file transfer, or…