Blogs

Last modified: January 30, 2014
  • ISC founder Paul Vixie inducted into the 2014 Internet Hall of Fame

    ISC founder Paul Vixie recently joined the elite ranks of membership in the Internet Hall of Fame. Each Hall of Fame member has made significant contributions to the advancement of the global Internet. Most of the work for which Dr Vixie was cited was accomplished while he was at ISC, and ISC was definitely guided and shaped by his vision.

    Read more
    0
  • ISC DHCP 4.3.0 is Live!

    ISC DHCP 4.3.0 is now online! As mentioned in the previous blog by Shawn Routhier, the theme behind the of DHCP 4.3.0 is “v6 uplift”. Certain features that were specifically designed for DHCPv4 is now available for DHCPv6, making network management of IPv6 network more manageable and simple. As Shawn stated “ tried use the same commands or similar commands so that

    Read more
    0
  • Completion of BIND 10 Initial Development Program delivers Basis of ISC Next Generation Nameserver Software

    Internet Systems Consortium (ISC) is pleased to announce the completion of a multi-year software development program funded by JPRS and other key sponsors.  The next generation nameserver software framework is available as the BIND 10 distribution, http://bind10.isc.org/wiki/ProductionRelease, which has been well received by sponsors and the open source community. “We are proud to have been able to work closely with

    Read more
    0
  • ISC wraps up Open Home Gateway Forum

    Following a successful public demonstration at the 88th Internet Engineering Task Force (IETF) meeting November 2013, ISC’s Open Home Gateway Forum team has submitted its code for package signing and validation to the OpenWrt project. ISC is now disbanding the Open Home Gateway Forum since this code has been completed. Comcast and ISC created the Open Home Gateway Forum (OHGF)

    Read more
    0
  • The Crypto Library Disaster

    At the first time someone writes (or contributes to, so this does not apply only to first systems) an application using low level cryptography, (s)he has the choices between two bad and two very bad solutions. This blog explains the reasons of this recurrent disaster and tries to give some idea to avoid it… The worst possible solution is of

    Read more
    0