Banner image

Community and Events

All articles

RIPE Chair Commitments

RIPE Chair Commitments

Author image
Hans Petter Holen

10 min read

To help with the selection of suitable candidates for the RIPE Chair and RIPE Vice Chair positions, I share here an adapted overview of the work involved that was previously shared with the RIPE Nominating Committee. The intention is to build understanding in the community and help to inform any di…

Article tags:

0 Likes are disabled for this article.
0
Working Together While Apart

Working Together While Apart

Author image
Fergal Cunningham

25 min read

The RIPE NCC has been working remotely since mid-March. In this article we take a look at how we are maintaining our operations as we adapt to a world that has changed completely.

Article tags:

2 Likes are disabled for this article.
0
RIPE Chair Selection - Next Steps

RIPE Chair Selection - Next Steps

Author image
Daniel Karrenberg

8 min read

Please find below an update from the RIPE Nominating Committee. Three of the NomCom members answer some of the questions you might have about the next steps in the selection process.

Article tags:

0 Likes are disabled for this article.
0
DNS is Virtually Awesome

DNS is Virtually Awesome

Author image
Shane Kerr

5 min read

The RIPE DNS working group will be holding online sessions every few weeks. We have already had the first session, a talk from Kim Davies at PTI/ICANN about some of the challenges of DNSSEC KSK management for the root zone. This session went very well, and we are looking forward to many more in the…

Article tags:

2 Likes are disabled for this article.
0
The RIPE NCC's Use of Zoom for Meetings

The RIPE NCC's Use of Zoom for Meetings

Author image
Kaveh Ranjbar

9 min read

In this article we explain why we will be using Zoom for the upcoming RIPE 80 and RIPE NCC General Meeting, and we outline the policies and settings we have in place to address concerns about privacy and security.

Article tags:

5 Likes are disabled for this article.
8
Validating RPKI Validators

Validating RPKI Validators

Author image
Mirjam Kühne

5 min read

In this guest post Drikus Brits describes some results and take-aways from the RPKI Deployathon that took place during APRICOT 2020.

Article tags:

0 Likes are disabled for this article.
2
Ten Requirements for the Evaluation of Contact Tracing Apps

Ten Requirements for the Evaluation of Contact Tracing Apps

Author image
Vesna Manojlovic

8 min read

There is an increased interest in the security and privacy impacts of software used for slowing down the spread of the COVID-19 epidemic. In this article, we republish the Chaos Computer Club (CCC) recommendations for your information.

Article tags:

0 Likes are disabled for this article.
3
Internet Usage Measurements in the Time of Corona

Internet Usage Measurements in the Time of Corona

Author image
Vesna Manojlovic

4 min read

Many organisations are measuring the impact of the COVID-19 crisis on Internet performance: in this article, we look at four recent reports.

Article tags:

0 Likes are disabled for this article.
3
What COVID-19 Means for Network Security

What COVID-19 Means for Network Security

Author image
Gary Stevens

4 min read

In this article, we’ll take a look at ways that the pandemic is changing network security.

Article tags:

0 Likes are disabled for this article.
0

Showing 487 article(s)