Banner image

Network Operations

Latest articles

autocast cover

Autocast: Automatic Anycast Site Optimisation

Author image
Thijs van den Hout

16 min read

Autocast turns one round of unicast latency measurements into millisecond-accurate predictions, automatically selecting the optimal anycast locations for fast .nl response times worldwide. Pairing simulated annealing with real resolver telemetry, it delivers lean, cost-aware PoP sets - often around…

Article tags:

18 Please read the article before liking.
0
Piracy Shield

Live-Event Blocking at Scale: Effectiveness vs. Collateral Damage in Italy’s Piracy Shield

Author image
Antonio Prado

9 min read

Italy’s Piracy Shield blocks IPs and domains within minutes, but measurements performed by researchers at the University of Twente and colleagues show broad collateral damage to legitimate services. We share the results of those measurements in the hopes of sparking a community discussion around th…

Article tags:

46 Please read the article before liking.
3
edge_cases_dnssec_pqc

Edge Cases in DNSSEC Validation with Multiple Algorithms

Author image
Arlin Kokkelmans

17 min read

As part of our research into post-quantum cryptography (PQC) for DNSSEC, we test PQC as a drop-in replacement for classical algorithms. We explore a transition where both run simultaneously, analysing how resolvers validate records, edge cases, and the feasibility and impact of such a period.

Article tags:

24 Please read the article before liking.
0
muse_cyberattack_cover

Cyber Risk Is Business Risk: Lessons from the MUSE Cyberattack

Author image
Kathleen Moriarty

5 min read

Recent disruption linked to the MUSE cyberattack shows how dependent airports are on shared IT services. This article looks at governance and network design choices that limit blast radius and keep operations running.

Article tags:

28 Please read the article before liking.
0

All articles

bgp_mrt_clickhouse_cover

Working with BGP Data

14 min read

Have you heard about MRT dumps, but never tried to use them because the bar seems too high? Or are you tired of doing “parse -> grep -> process” every time you touch BGP MRT dumps? This hands-on guide shows how to load RIS/RouteViews data into ClickHouse - covering tools, schema, and example querie…

Article tags:

27 Please read the article before liking.
0
CA 2025 cover

CAPIF 4: Advancing Internet Technologies in Central Asia

Author image
Qasim Lone

13 min read

Ahead of CAPIF 4, we once again pause to examine the latest in Central Asia’s digital transformation. Against a backdrop of deepening regional cooperation, we chart improvements in routing security and IPv6 adoption, while also probing interconnection patterns as seen in K-root data.

Article tags:

63 Please read the article before liking.
0
digital bangladesh

Bangladesh’s Internet Transformation: From Satellite Shadows to Digital Highways

Author image
Md.Kamruzzaman Khan

7 min read

In the past two decades, the Internet in Bangladesh has gotten out from under the shadow of its earlier dependence on costly satellite links for connectivity, growing from 0.1% to over 75% penetration. But the real work lies ahead: strengthening local peering, reaching rural areas, and building inf…

Article tags:

20 Please read the article before liking.
1
insidethebox

Keeping Network Sites Online During Blackouts

Author image
Yuriy Vykhnevych

8 min read

When blackouts become a frequent reality, keeping network sites online requires more than ad-hoc fixes. This article outlines a power management system, tested in practice, with design notes and an operator playbook.

Article tags:

263 Please read the article before liking.
0
quantum security

Quantum-Safe Security is a Toolbox, Not a Single Solution

Author image
Melchior Aelmans

7 min read

Quantum-safe security is less about a single breakthrough and more about assembling the right mix of tools. This article explores why a flexible, multi-layered approach is the key to preparing our digital infrastructure as we head into the post-quantum future.

Article tags:

11 Please read the article before liking.
0
interconnections

Engagement in IXPs - Strategies and Growth in the Network Ecosystem

Author image
Flavio Luciani

5 min read

Internet Exchange Points aren’t just places where packets meet - they’re where networks build trust, performance, and resilience. Making an IXP thrive depends on shared principles of neutrality, alignment, and sustained human engagement.

Article tags:

37 Please read the article before liking.
1

Showing 918 article(s)

Previous
1 2 3 ... 92
Next