Internet Governance

All articles

Advancing Internet Technologies in South East Europe

Advancing Internet Technologies in South East Europe

Qasim Lone

13 min read

On 22-23 April, the South East Europe Internet community will come together in Athens, Greece, to explore trends in the adoption of Internet technologies across the region. In preparation for the discussions to take place, we’ve been examining changes in key Internet tech, such as IPv6 and RPKI.

Article tags:

104 You have liked this article 0 times.
0
Criteria for the Accreditation of Regional Internet Registries

Criteria for the Accreditation of Regional Internet Registries

Athina Fragkouli

8 min read

ICP-2 - a document spelling out criteria for the establishment of new RIRs - was published all the way back in 2001. And while the requirements it lays out remain applicable to all RIRs, more recent events have revealed missing pieces that it's up to the community to fill in.

Article tags:

124 You have liked this article 0 times.
4
Internet Sanctions on Russian Media: Diverging Actions and Mixed Effects

Internet Sanctions on Russian Media: Diverging Actions and Mixed Effects

Moritz Müller

10 min read

EU sanctions on Russian controlled content require ISPs in member states to block access to websites. But our research reveals that their implementation varies widely, both between and within individual EU member states, raising important questions about their effectiveness.

Article tags:

52 You have liked this article 0 times.
0
Making the Case for a Multistakeholder Approach

Making the Case for a Multistakeholder Approach

Chris Buckridge

3 min read

Open, inclusive, and bottom-up may seem natural to those of us in the Internet technical community, but making the case for keeping Internet governance that way is an ongoing challenge.

Article tags:

55 You have liked this article 0 times.
0
As the Balance of Security Controls Shifts, Where Does Responsibility Rest?

As the Balance of Security Controls Shifts, Where Does Responsibility Rest?

Kathleen Moriarty

4 min read

Ongoing debates on encryption and privacy highlight the complex dance between industry standards and policy. The outcome of these security and surveillance tussles remains open, reflecting the evolving relationship between technology and governance.

Article tags:

63 You have liked this article 0 times.
0
Unlocking Digital Growth: The Role of IXPs in the Middle East

Unlocking Digital Growth: The Role of IXPs in the Middle East

Jad El Cham

4 min read

What does it take for an IXP to be successful? What requirements are these crucial bits of Internet infrastructure meant to fulfil? Do any of these questions have one-size-fits-all answers? A new report from the RIPE NCC explores all of the above and more in the context of Middle East IXPs.

Article tags:

59 You have liked this article 0 times.
2
Computing Within Limits 2023

Computing Within Limits 2023

Vesna Manojlovic

9 min read

My goal in this article is to inform technical communities of the research presented at the LIMITS conference, and to invite those who work at the intersection of sustainable technology and climate justice to join RIPE and the IETF.

Article tags:

52 You have liked this article 0 times.
1
Palestine Internet Connectivity as Seen in BGP

Palestine Internet Connectivity as Seen in BGP

Qasim Lone

9 min read

What does Internet routing data tell us about how the Internet in Palestine has fared since the outbreak of war in October.

Article tags:

131 You have liked this article 0 times.
0
RIPE NCC Internet Country Report: Türkiye

RIPE NCC Internet Country Report: Türkiye

Suzanne Taylor

3 min read

We take a comprehensive look at the Internet landscape in Türkiye as the next in our series of RIPE NCC Internet Country Reports.

Article tags:

21 You have liked this article 0 times.
0
Are IoT Safeguards Keeping Smart Homes Safe?

Are IoT Safeguards Keeping Smart Homes Safe?

Anna Maria Mandalari

3 min read

With IoT devices becoming an increasingly common and convenient addition to our daily lives, we examine whether the safeguards meant to maintain security and privacy when using these devices are actually effective.

Article tags:

49 You have liked this article 0 times.
0

Showing 274 article(s)