Network Operations

All articles

Stopping Support for Internet Explorer 8 on Windows XP in RIPE Atlas and RIPEstat

Stopping Support for Internet Explorer 8 on Windows XP in RIPE Atlas and RIPEstat

Robert Kisteleki

2 min read

Microsoft ended support for Windows XP as of April 2014. We're about to change RIPE Atlas and RIPEstat to stop support for Internet Explorer 8 running on these systems.

Article tags:

0 You have liked this article 0 times.
2
RIPE NCC Membership - Developments After Reaching the Last /8

RIPE NCC Membership - Developments After Reaching the Last /8

Rene Wilhelm

20 min read

On 14 September 2012, the RIPE NCC started allocating IPv4 addresses based on the last /8 policy. With more than two years passed, we look at the effects this had on membership numbers and demographics. We also look at what the last /8 policy meant for IPv6 uptake.

Article tags:

0 You have liked this article 0 times.
0
Visualising IPv4 and IPv6 Tweets

Visualising IPv4 and IPv6 Tweets

Emile Aben

3 min read

This time we explored Twitter feed visualisation with CartoDB, a map visualisation tool.

Article tags:

0 You have liked this article 0 times.
0
Year in Review and Looking Ahead to 2015

Year in Review and Looking Ahead to 2015

Axel Pawlik

5 min read

RIPE NCC Managing Director Axel Pawlik recently gave an interview about what he sees as the most important developments of 2014 and looks ahead to the big issues in 2015.

Article tags:

2 You have liked this article 0 times.
1
Survey on Internet Routing Security

Survey on Internet Routing Security

Sebastian Abt

2 min read

This is a call for participation in a survey on Internet Routing Security. The survey runs until 9 January 2015 and will only take a few minutes.

Article tags:

0 You have liked this article 0 times.
2
Call for Input: RPKI Browser

Call for Input: RPKI Browser

Matthias Wählisch

3 min read

The RPKI Browser is a graphical user interface to the objects of the distributed RPKI repository. The development is at very early stage. In this article, we ask for external input in terms of use cases, features etc.

Article tags:

1 You have liked this article 0 times.
0
The Resolvers We Use

The Resolvers We Use

Geoff Huston

23 min read

The Internet’s Domain Name System is a modern day miracle. It may not represent the largest database that has ever been built, but nevertheless it’s truly massive. And even if it’s not the largest database that’s ever been built, it’s perhaps one of the more intensively used. The DNS is consulted e…

Article tags:

0 You have liked this article 0 times.
0
Who's Watching

Who's Watching

Geoff Huston

28 min read

Much has been said over the pasts year or so about various forms of cyber spying. The United States has accused the Chinese of cyber espionage and stealing industrial secrets. A former contractor to the United States' NSA, Edward Snowden, has accused various US intelligence agencies of systematic e…

Article tags:

0 You have liked this article 0 times.
1
ECDSA and DNSSEC

ECDSA and DNSSEC

Geoff Huston

23 min read

Yes, that's a cryptic topic, even for an article that addresses matters of the use of cryptographic algorithms, so congratulations for getting even this far! This is a report of an experiment conducted in September and October 2014 by the authors to measure the extent to which deployed DNSSEC-valid…

Article tags:

0 You have liked this article 0 times.
0
Privacy and Security - Five Objectives

Privacy and Security - Five Objectives

Geoff Huston

7 min read

It has been a very busy period in the domain of computer security. With "shellshock", "heartbleed" and NTP monlink adding to the background of open DNS resolvers, port 445 viral nasties, SYN attacks and other forms of vulnerability exploits, it's getting very hard to see the forest for the trees. W…

Article tags:

0 You have liked this article 0 times.
2

Showing 868 article(s)