Network Operations

All articles

Plug and Plot: Reusable Visualisations for AS-Hegemony Data

Plug and Plot: Reusable Visualisations for AS-Hegemony Data

11 min read

This article presents a set of open-source tools - “reusable visualisations” - that extend the AS hegemony visualisations provided by the Internet Health Report. Users can directly use the online tools or embed the IHR data on their own posts, webpages, or Observable HQ notebooks.

Article tags:

36 You have liked this article 0 times.
0
Assessing the Risk of New .nl Registrations Using RegCheck

Assessing the Risk of New .nl Registrations Using RegCheck

Thymen Wabeke

14 min read

The RegCheck system helps identify potentially malicious domain name registrations with 48% recall and 22% precision. In this article, the team from SIDN Labs shares their analysis of how the system performs when it comes to identifying high-risk .nl domain name registrations.

Article tags:

11 You have liked this article 0 times.
0
PeeringDB's Product Roadmap for 2023

PeeringDB's Product Roadmap for 2023

Leo Vegoda

3 min read

We want to build more agility into our Product Management process in 2023. This blog post describes what we have planned for the start of the year. It also describes how we want to work over the whole year, and how you can help us make good choices.

Article tags:

7 You have liked this article 0 times.
1
IPv6 Policy Is a Community Self-Governance Success Story

IPv6 Policy Is a Community Self-Governance Success Story

Leo Vegoda

6 min read

IPv6 policy has gone through many refinements since it was first adopted by the RIRs 20 years ago. Is it time for a more significant change? Join the RIPE Address Policy Working Group in conversation on the next phase of IPv6 policy.

Article tags:

32 You have liked this article 0 times.
0
Running Krill Under RIPE NCC

Running Krill Under RIPE NCC

Alex Band

12 min read

Krill is a free, open source RPKI Certificate Authority from NLnet Labs that lets you run delegated RPKI under one or multiple RIRs. In this article, we provide a comprehensive, step-by-step guide on how you can run Krill under the RIPE NCC.

Article tags:

32 You have liked this article 0 times.
0
Help Validate ROV Adoption Measurements from RoVista

Help Validate ROV Adoption Measurements from RoVista

Tijay Chung

5 min read

Measuring adoption of ROV is challenging without direct access to routers in the wild. My colleagues and I at Virginia Tech, IIJ, RIPE NCC, and MANRS have developed a new measurement platform (RoVISTA) to measure the current deployment status of ROV. You can help by taking our survey!

Article tags:

35 You have liked this article 0 times.
0
NTT’s RPKI Deployment - Monitoring, Awareness, and Community

NTT’s RPKI Deployment - Monitoring, Awareness, and Community

Dan Fidler

6 min read

Massimo Candela - Senior Software Engineer for NTT’s Global IP Network (GIN) - has been busy sharing his experience of deploying RPKI with the community. In this guest post, Dan Fidler takes a closer look at the message Massimo has been getting across.

Article tags:

38 You have liked this article 0 times.
0
PeeringDB 2022 Product Report

PeeringDB 2022 Product Report

Leo Vegoda

3 min read

Data quality and search were ranked most important by respondents to our last three user surveys. This update looks at improvements we have made to keep data quality high by improving automation, giving users better tools, and making it easier to find and export data in PeeringDB.

Article tags:

10 You have liked this article 0 times.
0
Tracing the Evolving Levels of Support for WebAuthn

Tracing the Evolving Levels of Support for WebAuthn

Kathleen Moriarty

26 min read

You've likely been hearing about the World Wide Web Consortium’s (W3C) Web Authentication (WebAuthn) and wondering if you're ready to implement it in your environment. Here's everything you need to know!

Article tags:

13 You have liked this article 0 times.
0
Security by Diversity: The Business of Security Through Diversity

Security by Diversity: The Business of Security Through Diversity

Fredrik Lindeberg

10 min read

With information security such a complex and fast-moving field, how can companies gather enough information to make informed decisions about what is right for their networks? What criteria should you look for, how do you evaluate systems, and how can you determine which methods will scale most effe…

Article tags:

16 You have liked this article 0 times.
0

Showing 868 article(s)