Banner image

Community and Events

All articles

How Consumer IoT Devices Expose Information

How Consumer IoT Devices Expose Information

Author image
Anna Maria Mandalari

11 min read

Do our Internet-of-Things (IoT) devices at home expose private information unexpectedly? Do leaks of sensitive user data depend on the location and jurisdiction of the IoT device? Through a total of 34,586 rigorous automated and manual controlled experiments, we characterised information exposure f…

Article tags:

0 Likes are disabled for this article.
0
Results of the First IoT Hackathon

Results of the First IoT Hackathon

Author image
Vesna Manojlovic

10 min read

The tenth RIPE NCC hackathon took on the Internet of Things (IoT). Over two days, community members experimented with possible IoT solutions.

Article tags:

0 Likes are disabled for this article.
0
Live from the Pan-European Quantum Internet Hackathon

Live from the Pan-European Quantum Internet Hackathon

Author image
Ulka Athale

3 min read

Our first ever distributed hackathon is underway simultaneously in Delft, Dublin, Geneva, Padova, Paris, and Sarajevo. Here's what's been happening.

Article tags:

0 Likes are disabled for this article.
1
Analysing the Costs (and Benefits) of DNS, DoT, and DoH for the Modern Web

Analysing the Costs (and Benefits) of DNS, DoT, and DoH for the Modern Web

Author image
Austin Hounsel

7 min read

All Internet communication relies on the Domain Name System (DNS), which maps a human-readable name to an IP address before two endpoints establish a connection to exchange data.

Article tags:

0 Likes are disabled for this article.
1
Internet Clouds are (also) Unpredictable: A Study on the Effects of Recent Traffic Engineering Trends In Cloud Provider Networks

Internet Clouds are (also) Unpredictable: A Study on the Effects of Recent Traffic Engineering Trends In Cloud Provider Networks

Author image
Marco Chiesa

8 min read

How does the largest cloud provider worldwide perform Traffic-Engineering? What are the implications for the geo-distributed applications running in the cloud? We explored these and more questions through a comprehensive set of measurements across the Amazon Web Services (AWS) cloud network.

Article tags:

0 Likes are disabled for this article.
0
RIPE NCC Community Projects Fund - Call for Applications is Open

Community Projects Fund Selection Committee Introduces Two New Members

Author image
Alastair Strachan

3 min read

We are happy to announce the election of two new selection committee members for the RIPE NCC Community Projects Fund.

Article tags:

0 Likes are disabled for this article.
0
How Diverse is RIS?

How Diverse is RIS?

Author image
Emile Aben

8 min read

Is the current set of the RIPE Routing Information Service (RIS) peers providing a good level of diverse data? Let's look at some measurement results.

Article tags:

0 Likes are disabled for this article.
1
5 Reasons why the Internet of Things is for you – really!

5 Reasons why the Internet of Things is for you – really!

Author image
Constanze Dietrich

2 min read

Okay, fine – the title is a clickbait. However, we have some awesome project proposals and indeed really good reasons to join the upcoming IoT hackathon in Rotterdam on 12 - 13 October - right before RIPE 79!

Article tags:

0 Likes are disabled for this article.
0
RIPE 78: The Big Picture

RIPE 78: The Big Picture

Author image
Hans Petter Holen

12 min read

The community met in Reykjavik for RIPE 78 over 20-24 May 2019. In keeping with the idea of better reporting, here are some of the key events and discussions from the meeting week. A lot goes on at a RIPE Meeting, so not everything is mentioned here. Topics are ordered roughly according to when the…

Article tags:

0 Likes are disabled for this article.
0
ARTEMIS: an Open-source Tool for Detecting BGP Prefix Hijacking in Real Time

ARTEMIS: an Open-source Tool for Detecting BGP Prefix Hijacking in Real Time

Author image
Vasileios Kotronis

15 min read

ARTEMIS is a defense approach against BGP prefix hijacking attacks. It is (a) based on accurate and fast detection operated by the AS itself, by leveraging the pervasiveness of publicly available BGP monitoring services, and it (b) enables flexible and fast mitigation of hijacking events. In this a…

Article tags:

6 Likes are disabled for this article.
2

Showing 479 article(s)