Network Operations

All articles

Unlocking Digital Growth: The Role of IXPs in the Middle East

Unlocking Digital Growth: The Role of IXPs in the Middle East

Jad El Cham

4 min read

What does it take for an IXP to be successful? What requirements are these crucial bits of Internet infrastructure meant to fulfil? Do any of these questions have one-size-fits-all answers? A new report from the RIPE NCC explores all of the above and more in the context of Middle East IXPs.

Article tags:

59 You have liked this article 0 times.
2
The LLM Misinformation Problem I Was Not Expecting

The LLM Misinformation Problem I Was Not Expecting

Kathleen Moriarty

5 min read

The prolific use of Artificial Intelligence Large Language Models (LLMs) present new challenges we must address and new questions we must answer. For instance, what do we do when AI is wrong?

Article tags:

60 You have liked this article 0 times.
3
André Grilo: Ready or Not - Rethinking Cybersecurity for a Post-Quantum World

André Grilo: Ready or Not - Rethinking Cybersecurity for a Post-Quantum World

Anastasiya Pak

1 min read

Quantum technologies promise all kinds of fascinating possibilities, but they also come with risks. In this episode, André Grilo, founder and CEO of QuantumNova, talks about why we need to start investing in post-quantum cryptography to protect ourselves against post-quantum threats.

Article tags:

76 You have liked this article 0 times.
0
A Quantum-Safe Cryptography DNSSEC Testbed

A Quantum-Safe Cryptography DNSSEC Testbed

Caspar Schutijser

7 min read

As the prospect of more powerful quantum computers looms on the digital horizon, questions emerge over the threat this might pose to many of the cryptographic functions used in Internet security. The team at SIDN Labs has been working to evaluate the impact of quantum-safe cryptography algorithms o…

Article tags:

33 You have liked this article 0 times.
1
RPKI 2023 Review - Growth, Governments, and Innovation

RPKI 2023 Review - Growth, Governments, and Innovation

Job Snijders

7 min read

Happy new year everyone! Having just closed chapter 2023 - let's look back at the previous year. In this article, I'll share some RPKI statistics, summarise highlights from the IETF standards development process, and reflect on emerging trends.

Article tags:

22 You have liked this article 0 times.
0
Anycast DNS for the I–Root Service: 20 Years of 100% Availability

Anycast DNS for the I–Root Service: 20 Years of 100% Availability

Lars-Johan Liman

5 min read

Lars-Johan Liman, Netnod's DNS nestor, makes a few personal reflections on the 20th anniversary of Netnod's deployment of anycast – a technology that is a crucial part of the infrastructure of Netnod's modern DNS services.

Article tags:

49 You have liked this article 0 times.
0
Jim Cowie: The Historical Record of the Internet

Jim Cowie: The Historical Record of the Internet

Alun Davies

2 min read

Understanding outages and shutdowns and how the Internet as a whole came to be vulnerable to - but also resilient against - these kinds of events requires more than a snapshot of things as they are today. In this episode, Jim Cowie talks about how historical measurement data can help us acquire a b…

Article tags:

99 You have liked this article 0 times.
0
Models of Trust for the RPKI

Models of Trust for the RPKI

Geoff Huston

13 min read

There are five RPKI Trust Anchors, one for each RIR. But if one of these trusted operators were coerced into falsely issuing a certificate, there's no way relying parties could avoid being misled. Geoff Huston talks about the adopted approach to RPKI Trust Anchors and how things might be improved.

Article tags:

29 You have liked this article 0 times.
0
Security Control Changes Due to TLS Encrypted ClientHello

Security Control Changes Due to TLS Encrypted ClientHello

Kathleen Moriarty

8 min read

The way we defend our systems is shifting right now thanks to a major change to the Transport Layer Protocol (TLS) taking place between the browser and a new device called the client-facing server.

Article tags:

18 You have liked this article 0 times.
0
Using Timestamps Inside RPKI Objects to Optimise RRDP-RSYNC Transport Switchovers

Using Timestamps Inside RPKI Objects to Optimise RRDP-RSYNC Transport Switchovers

Job Snijders

13 min read

Tricks to help reduce bandwidth and CPU cycles for both RPKI Publication Point servers and RPKI validators when switching between RRDP and RSYNC transports, as implemented in rpki-client.

Article tags:

19 You have liked this article 0 times.
0

Showing 835 article(s)