network protocol Guest User network protocol Guest User

On Fuzz Testing

Fuzz testing is a form of brute-force testing - every possibility is thrown at the target in hopes that eventually something bad will happen and a flaw revealed. Fuzz testing is a plausible technique if the number of variations is small enough that all the possibilities can be tried in the time before the target product becomes obsolete. But with some modern network protocols the time to test all the combinations could run into years - or, in many cases, eons …

Read More
network emulation Guest User network emulation Guest User

A Deep Dive into Bit Counting

The question of “how many bits” were sent and received clearly is a matter of interest when measuring data rates or data quantities. Mobile providers, consumer ISP's, consumers, and regulators talk a lot about their speed and (not so often) about their data caps. But rarely, if ever, are sufficient details provided …

Read More
government, legal Guest User government, legal Guest User

Equal Pay is Not a Regulatory Burden

The Trump Administration proposes to "pause" and review an Obama-era program designed to improve wage transparency -- so women and minorities could learn how their compensation stacked up to white men. The Trump administration argues that the government's pay data collection process is "unnecessarily burdensome” …

Read More
network protocol Guest User network protocol Guest User

TLS / SSL You've Got to Turn it On!

All of the IWL staff has worked long and hard on perfecting a TLS Test Suite. Our clients — DevSecOps engineers — need to find bugs and security vulnerabilities in apps and devices before deployment. Once they’ve identified these problems, the problems are corrected and retested prior to deployment …

Read More
news Guest User news Guest User

Why I Use a Fake Birthday on Facebook

Last month I received a number of fun and friendly birthday wishes on Facebook. Though this was a sweet and kind gesture by each of the well-wishers, I felt guilty. That’s because … it was not my birthday! Facebook thinks my birthday is June 22, 1910, but the day, the month, and the year are all wrong.

So you may wonder: Why would I intentionally lie about my birthday on Facebook? …

Read More
network protocol Guest User network protocol Guest User

Women in Automotive (lots of us)

Women who work in automotive technology met at the British Bankers Club in Menlo Park last night for a lively discussion. The women represented many facets of the industry — research scientists at the major automotive companies, new infotainment and VR startups, regulatory and compliance lawyers, venture capitalists, and, of course, automotive test solution suppliers, like IWL …

Read More
network emulation Guest User network emulation Guest User

Performance Test IOT App on ESP8266 on a Drone

Have you thought about how you will test the performance of IoT apps and drones? Our new video demonstrates performance testing of an IOT application controlling the ESP8266 Microcomputer mounted on a drone! As you might expect, as the drone flies further away from the wireless base station, performance degrades. So how can you emulate that in your test lab? …

Read More
Guest User Guest User

Why did Waze and Google Maps fail?

Waze, the “…world’s largest community-based traffic and navigation app” failed its users in the Santa Cruz, California area during the month of February 2017. These users who depend on Waze to find out traffic conditions and alternate routes were not able to do so. The same was true for Google Maps. For example, when traffic stalled for up to three hours, Waze and Google Maps happily reported that conditions were just fine …

Read More
government Guest User government Guest User

Confide, a Favorite App of the White House, May Not Be Secure

A New York City based start-up company, Confide, offers a text messaging system “with encrypted messages that self-destruct.” You can download the app at getconfide.com. Confide lets its users “discuss sensitive topics, brainstorm ideas or give unfiltered opinions without fear of the Internet’s permanent, digital record and with no copies left behind.” …

Read More

You may also search for blog posts:

By Date

By Topic