Featured article

Easy RIPE Atlas Data Analysis with SQL

Article tags:

Giovane Moura

Based in Arnhem, The Netherlands

27 min read

Not a big fan of pandas dataframe syntax? Prefer to use SQL? Then suffer no more! In this detailed, step-by-step guide using RIPE Atlas public data, find out how DuckDB allows you to use SQL without any DB server on a Jupyter Notebook.

Read article
14 You have liked this article 0 times.
0

Latest articles

The RIPE Chair Team Reports - February 2025

The RIPE Chair Team Reports - February 2025

Mirjam Kühne

5 min read

The RIPE Chair Team reports on work that is happening right now around RIPE governance and RIPE policy and catch us up on important industry events that have been taking place over the past month.

7 You have liked this article 0 times.
0
Building a Secure Test Environment for an IXP

Building a Secure Test Environment for an IXP

Marta Burocchi

10 min read

IXPs operate on principles of trust and cooperation upheld through adherence to clear rules. Quarantine VLAN is a way to help test whether new peers are compliant with those rules. Namex Digital Twin now enables Namex members to carry out these tests for themselves.

Article tags:

33 You have liked this article 0 times.
0
Looking Back at 2024 - An External Engagement and Community Retrospective

Looking Back at 2024 - An External Engagement and Community Retrospective

Alena Muravska

15 min read

In this article, we look at three main objectives that drive our external engagement and community work at the RIPE NCC and show, through numbers and metrics, how we measured the impact we made in 2024.

Article tags:

41 You have liked this article 0 times.
0
Why Small and Medium-Size Operators Should Care About Sustainability

Why Small and Medium-Size Operators Should Care About Sustainability

Michael Oghia

3 min read

A new resource dedicated to small and medium-sized digital infrastructure providers in Europe highlights the benefits of incorporating sustainability into their operations, offers a consolidated list of best practices and recommendations, and shares additional resources to help them make practical …

Article tags:

45 You have liked this article 0 times.
4
Using API Keys in the RIPE Database

Using API Keys in the RIPE Database

Ed Shryane

4 min read

API keys are a new way to authenticate updates in the RIPE Database. They are associated with a user’s RIPE NCC Access account, and are intended to help you script (automate) updates to the RIPE Database.

Article tags:

25 You have liked this article 0 times.
0
RIPE Atlas Anchors - Operating System Refresh

RIPE Atlas Anchors - Operating System Refresh

Sean Mottles

7 min read

RIPE Atlas anchors give us a reliable set of vantage points from which to observe the Internet, but keeping them operational over time raises interesting challenges. Here, we give an update on a recent upgrade we carried out for anchors and lessons learned along the way.

Article tags:

17 You have liked this article 0 times.
1
RPKI's 2024 Year in Review

RPKI's 2024 Year in Review

Job Snijders

7 min read

Having just closed the book on another orbit around the sun - let's look back at how RPKI did in 2024! In this memo I'll share some RPKI statistics, summarise highlights from the IETF Standards Development process, and reflect on emerging trends.

Article tags:

33 You have liked this article 0 times.
0
View all articles

Latest Podcasts

  • Francesca Bosco: Who Governs Cyberspace?

    Francesca Bosco: Who Governs Cyberspace?

    Anastasiya Pak

    2 min read

    In this episode, we dive into the evolving world of cyberspace and international cybersecurity law with Francesca Bosco from the CyberPeace Institute. Unpacking the evolving definition of cyberspace, the latest in international cybersecurity legislation, and its potential impact on civil society, F…

    Article tags:

    16 You have liked this article 0 times.
    0
  • Daniel Kapellmann: Detecting Cyber Threats to Critical Systems

    Daniel Kapellmann: Detecting Cyber Threats to Critical Systems

    Anastasiya Pak

    2 min read

    It is no longer unusual for Operational Technology systems to be connected to IT systems and the Internet, but this leaves them increasingly open to cyber threats. Daniel Kapellmann, Security Engineering Manager at Google Threat Intelligence, talks about how convergence of OT with IT systems amplif…

    Article tags:

    17 You have liked this article 0 times.
    0
  • View all

Editor's Pick