Banner image

Community and Events

All articles

childcare_1.jpg

Reflecting Back on RIPE 77: Big Gains on Diversity Initiatives

Author image
Amanda Gowland

6 min read

It’s been a couple of weeks since we walked away from RIPE 77; another record breaking RIPE Meeting that welcomed 800 attendees from 64 countries at the Hotel Okura in Amsterdam. This was the third meeting at which we organised a Women in Tech Lunch, the second meeting we offered on-site childcare,…

Article tags:

2 Likes are disabled for this article.
0
Routing Security is Hot!

Routing Security is Hot!

Author image
Melchior Aelmans

3 min read

Routing security is important and it is great to see that it is now on the agenda of many network operators. We're going to organise an RPKI signing party to further increase deployment.

Article tags:

0 Likes are disabled for this article.
2
iSEND: IPv6 SEcure Neighbor Discovery Implementation for Android Devices

iSEND: IPv6 SEcure Neighbor Discovery Implementation for Android Devices

Author image
Ahmad Alsadeh

3 min read

IPv6 SEcure Neighbor Discovery (SEND) is an extension to countermeasure the security threats in IPv6 Neighbor Discovery Protocol (NDP). SEND provides address ownership proof, message protection, and router authorisation capabilities. The current lack of robust implementations of SEND at the end use…

Article tags:

0 Likes are disabled for this article.
0
RIOT in Amsterdam

RIOT in Amsterdam

Author image
Martine Sophie Lenders

14 min read

The RIOT Summit is the yearly get-together of the community around the RIOT operating system for the Internet of Things (IoT). It aims at bringing together RIOTers, beginners and experts, as well as people interested in the IoT in general. We also welcome decision makers who plan to deploy RIOT in …

Article tags:

0 Likes are disabled for this article.
1
Figure2-MPLS.png

Gunfight at OK Corral: MPLS vs. Probing

Author image
Benoit Donnet

10 min read

In this article, we investigate the various relationships between MPLS tunnels and standard probing techniques (i.e., ping and traceroute). We investigate several possible MPLS configurations and explain how they interact with measurement techniques. We also provide an external link to an online…

Article tags:

0 Likes are disabled for this article.
0
Implementation timeline 2.0.png

How We Will Be Validating abuse-c

Author image
Angela Dall'Ara

6 min read

At the RIPE NCC we’re busy working out a process so we can start validating approximately 70,000 abuse contact email addresses in the RIPE Database. Read on to see how we will approach this.

Article tags:

0 Likes are disabled for this article.
0
Internet Atlas - Tools for Digital Literacy

Internet Atlas - Tools for Digital Literacy

Author image
Andrej Petrovski

5 min read

Based on existing studies and research about the digital environment in Serbia, its legal and technical features, usage and habits among Internet users, the SHARE Foundation aims to produce tools and materials designed to inform, educate and encourage project target groups understand Internet infra…

Article tags:

2 Likes are disabled for this article.
0
RIPE Chair Selection Process

RIPE Chair Selection Process

Author image
Mirjam Kühne

3 min read

Based on community input, including a plenary session at RIPE 76 and a discussion on a dedicated mailing list, here is the final version of the RIPE Chair selection process.

Article tags:

0 Likes are disabled for this article.
0
Let's Connect! Easy to Install and Secure VPN Software that Respects your Privacy

Let's Connect! Easy to Install and Secure VPN Software that Respects your Privacy

Author image
Rogier Spoor

3 min read

Going online on unknown Internet hotspots - whether at a restaurant, an airport or in a restaurant - isn't actually very safe or secure for users. This is due to the open character of hotspots which makes it easy to impersonate legitimate hotspots and eavesdrop on traffic - or even serve malware. T…

Article tags:

0 Likes are disabled for this article.
0
CrypTech – Next Steps Towards a Safer Internet

CrypTech – Next Steps Towards a Safer Internet

Author image
Phil Roberts

4 min read

The main goal of CrypTech is to create an open-source design for a hardware cryptographic engine for Hardware Security Modules (HSMs). At the same time it also provides a associated reference implementation that allows anyone to develop, deploy and audit a secure, low-cost cryptographic engine in t…

Article tags:

0 Likes are disabled for this article.
0

Showing 487 article(s)