Banner image

Internet Governance

All articles

earth_from_space

Amazon Doesn’t Care How You Heat Swimming Pools: ICT and Ecosocialism

Author image
Neil Mather

5 min read

Information and communication technology has a huge impact on society and the environment. Many approaches to ICT and sustainability ultimately only maintain the status quo. What could a more radical approach look like?

Article tags:

26 Likes are disabled for this article.
0
iStock-453168979

Fulfilling Our Mandate in Wartime

Author image
Hisham Ibrahim

8 min read

As part of the RIPE NCC’s commitment to supporting the Ukrainian technical community, we actively research and facilitate discussions about the country's Internet landscape and its resilience in wartime. Recently, we have seen inferences being drawn from changes to country codes in the RIPE Databas…

Article tags:

20 Likes are disabled for this article.
0
1080x1080px_01_v03_Ripe-Labs-podcast_E-01 (2)

Olena Kushnir and Viktoriia Opanasiuk: Best Practices for a Resilient Internet in Times of War

Author image
Alun Davies

1 min read

In this episode of the RIPE Labs podcast, we talk about how the war has changed the way the Internet community in Ukraine works, the pressure companies and individuals are under to keep this absolutely vital resource running, and the practices that have been adopted to make sure people stay connect…

Article tags:

24 Likes are disabled for this article.
0
climate_cost

The Climate Cost of the AI Revolution

Author image
Wim Vanderbauwhede

13 min read

ChatGPT and other AI applications such as Midjourney have pushed "Artificial Intelligence" high on the hype cycle. In this article, I want to focus specifically on the energy cost of training and using applications like ChatGPT, what their widespread adoption could mean for global CO₂ emissions, an…

Article tags:

31 Likes are disabled for this article.
0
arab_world

The Arab Mosaic: A Diverse Approach to a Shared Digital Future

Author image
Chafic Chaya

5 min read

As the UN prepares for the World Summit on the Future in 2024 and progresses towards adopting the Global Digital Compact (GDC), engagement with diverse stakeholders, including those from Arab countries, is crucial.

Article tags:

26 Likes are disabled for this article.
0
global_digital

The Global Digital Compact: Unpacking the RIPE NCC’s Contribution

Author image
Claudia Leopardi

9 min read

The Global Digital Compact: What is it? Why are we concerned? As part of her internship with the RIPE NCC's Public Policy and Internet governance team, Claudia Leopardi discusses the RIPE NCC’s contribution to this important UN process.

Article tags:

37 Likes are disabled for this article.
0
IPv6 subnetting

More Next Steps in IPv6 Policy Work

Author image
Leo Vegoda

3 min read

The RIPE Address Policy Working Group is organising interim sessions to plan IPv6 policy discussions at RIPE 86 in Rotterdam. The purpose of these sessions is not to develop policy proposals. It is to define desired policy outcomes and set priorities.

Article tags:

3 Likes are disabled for this article.
0
internet-ukraine

The Resilience of the Internet in Ukraine - One Year On

Author image
Emile Aben

17 min read

In our earlier analysis of Ukraine back in March 2022, we looked at factors that contributed to the resilience of the country's Internet since the outbreak of the war. A little over a year on, we draw on data from RIPE Atlas and RIPE RIS to investigate what has changed.

Article tags:

28 Likes are disabled for this article.
0
How EU Regulation Affects You

Cyber Resilience, "Fair Share", and Sanctions - Our Regulation Update April 2023

Author image
Suzanne Taylor

14 min read

This is the latest in an ongoing series in which we give a brief overview of the most pertinent digital policies for the RIPE community currently being proposed, debated and implemented in the European Union.

Article tags:

21 Likes are disabled for this article.
0
source

SAV: Why Is Source Address Validation Still a Problem?

Author image
Qasim Lone

13 min read

Despite being a known vulnerability for at least 25 years, source IP address spoofing remains a popular attack method for redirection, amplification and anonymity. Preventing these attacks requires that operators implement Source Address Validation (SAV) to ensure their networks filter packets with…

Article tags:

34 Likes are disabled for this article.
3

Showing 301 article(s)

Previous
1 ... 5 6 7 8 9 ... 31
Next