Banner image

Network Operations

All articles

The BGP Tuner: Intuitive Anycast Management

The BGP Tuner: Intuitive Anycast Management

Author image
Joao M. Ceron

5 min read

DNS operators have very few intelligent real-time tools that enable them to monitor their anycast services, for instance during a DDoS attack. In this post, we describe the challenges associated with measuring anycast services and propose a tool called the BGP Tuner. By using our open-source tool, …

Article tags:

2 Likes are disabled for this article.
0
Your EU Regulation Update: May 2020 Edition

Your EU Regulation Update: May 2020 Edition

Author image
Suzanne Taylor

11 min read

This is the fourth in an ongoing series in which we give a brief overview of the most pertinent digital policies currently being proposed, debated and implemented in the European Union.

Article tags:

0 Likes are disabled for this article.
1
RPKI: Past, Present and Future

RPKI: Past, Present and Future

Author image
Felipe Victolla Silveira

8 min read

With RPKI experiencing a huge growth in its deployment and becoming a key part in the operations of the Internet, we have been investing a significant amount of resources in making its infrastructure resilient, secure, and highly available. Recent outages have raised concerns about the maturity lev…

Article tags:

0 Likes are disabled for this article.
2
The 1M Day Isn't That Far Away

The 1M Day Isn't That Far Away

Author image
Berislav Todorovic

4 min read

In less than two years from now, the number of IPv4 prefixes in the global BGP routing table will hit the one million figure. Should you be worried? Most probably not, but better safe than sorry.

Article tags:

0 Likes are disabled for this article.
2
Lessons Learned on Improving RPKI

Lessons Learned on Improving RPKI

Author image
Nathalie Trenaman

8 min read

“It's fine to celebrate success but it is more important to heed the lessons of failure.” (Bill Gates)

Article tags:

0 Likes are disabled for this article.
6
Blind Trust

Blind Trust

Author image
Mirjam Kühne

8 min read

"For well over a decade I have been concerned about the blind trust that exists in the technical world." Merike Kaeo, a global expert in information security, explains why and what we should do about it.

Article tags:

0 Likes are disabled for this article.
0
DNS is Virtually Awesome

DNS is Virtually Awesome

Author image
Shane Kerr

5 min read

The RIPE DNS working group will be holding online sessions every few weeks. We have already had the first session, a talk from Kim Davies at PTI/ICANN about some of the challenges of DNSSEC KSK management for the root zone. This session went very well, and we are looking forward to many more in the…

Article tags:

2 Likes are disabled for this article.
0
Easy BGP Monitoring with BGPalerter

Easy BGP Monitoring with BGPalerter

Author image
Massimo Candela

9 min read

This is a brief tutorial that explains how to monitor BGP prefixes easily and effectively. For this purpose, we will use an open-source application named BGPalerter which is ready to go and requires almost no configuration. Currently, we use this solution at NTT, one of the largest global providers…

Article tags:

0 Likes are disabled for this article.
2
Post-growth Entrepreneurship

Post-growth Entrepreneurship

Author image
Mirjam Kühne

7 min read

"Business is one of the most effective forms of activism. Business is one of the most expressive forms of art." Melanie Rieback, CEO and Co-founder of Radically Open Security, the world’s first not-for-profit computer security consultancy company, explains what she means by this and why post-growth…

Article tags:

12 Likes are disabled for this article.
0
k-root locations on map.png

RIPE NCC Country Report: Southeast Europe

Author image
Suzanne Taylor

3 min read

We examine the Internet landscape in eight different countries in Southeast Europe as the next in our series of RIPE NCC Country Reports.

Article tags:

0 Likes are disabled for this article.
0

Showing 892 article(s)