Technology and Innovation

Latest articles

Putting the MAU Into meowmeow: On Personal ASNs

Putting the MAU Into meowmeow: On Personal ASNs

Tobias Fiebig

14 min read

Is the use of personal ASNs to gain hands-on operational experience really such a bad idea, or is this one of the ways we make sure the Internet remains a place of equitable participation, expression and learning? In this guest article, Tobias Fiebig shares his views.

Article tags:

19 You have liked this article 0 times.
0
A Comprehensive Review of RIR Policies in the Domain of AS Number Management

A Comprehensive Review of RIR Policies in the Domain of AS Number Management

Nachiket Kondhalkar

4 min read

A research team at TU Delft is researching the management of AS Numbers across RIRs as well as the potential impact of the new annual maintenance fees for ASNs and we invite you to contribute.

Article tags:

17 You have liked this article 0 times.
0
Assessing the Security of Internet Paths

Assessing the Security of Internet Paths

Shyam Krishna Khadka

9 min read

Although many critical infrastructures (CIs) rely on cloud services (e.g., email) for their daily operations, they typically have limited insight into the security status of the paths their traffic might follow across the Internet to reach their cloud provider’s infrastructures. Can a CI know all t…

Article tags:

18 You have liked this article 0 times.
0
A Multifaceted Look at Starlink Performance - The Good, the Bad and the Ugly

A Multifaceted Look at Starlink Performance - The Good, the Bad and the Ugly

Nitinder Mohan

9 min read

How does Starlink stack up against terrestrial ISPs as a global service? And exactly what factors impact its operations? A new multifaceted active and passive measurement study uncovers the good, the bad and the ugly when it comes to Starlink performance.

Article tags:

27 You have liked this article 0 times.
0

All articles

Paola Grosso: Defining a Responsible Internet

Paola Grosso: Defining a Responsible Internet

Alun Davies

2 min read

For many, the Internet is essentially a black box. We connect with other endpoints to send and receive data, but we have little insight into what happens in between. Dr Paola Grosso talks about how CATRIN seeks to provide more visibility and control so we can make more responsible decisions on how …

Article tags:

56 You have liked this article 0 times.
0
20 Years of Inferring Interdomain Routing Policies

20 Years of Inferring Interdomain Routing Policies

Savvas Kastanakis

9 min read

As the structure of the Internet has become ever flatter over time, what effect has this had on the dynamics of inter-domain routing? A new study examines whether 20-year-old insights into the characteristics of routing policies still hold.

Article tags:

54 You have liked this article 0 times.
0
BEREC Report on the IP Interconnection Ecosystem

BEREC Report on the IP Interconnection Ecosystem

Christoph Mertens

4 min read

Following on from their earlier call for input, BEREC have now released a draft report on the IP interconnection ecosystem. Take a look at their findings and contribute by sending your feedback.

Article tags:

10 You have liked this article 0 times.
0
Whose CIDR Is It Anyway?

Whose CIDR Is It Anyway?

Jan Schaumann

22 min read

IP address space wasn't divided evenly, and after years of re-allocation and re-assigment, the question that comes to mind is: who owns what parts of it? In the latest in a series of articles on the centralisation of the Internet, Jan Schaumann digs into the data to try to get a clearer view.

Article tags:

66 You have liked this article 0 times.
3
Authenticated DNSSEC Bootstrapping: From Hackathon Project to Useful Software

Authenticated DNSSEC Bootstrapping: From Hackathon Project to Useful Software

Peter Thomassen

7 min read

At the RIPE DNS Hackathon 2023, a group of DNS enthusiasts started writing implementations of the Authenticated DNSSEC Bootstrapping protocol. After the event, the work continued, culminating in the completion of a module for Knot DNS. So what problem does the new feature address, and how can you u…

Article tags:

18 You have liked this article 0 times.
0
Collaborative DDoS Mitigation: From Research to Operational Practice

Collaborative DDoS Mitigation: From Research to Operational Practice

Thijs van den Hout

11 min read

Distributed denial-of-service (DDoS) attacks continue to plague the Internet and pose a risk to the availability of critical digital systems that we increasingly depend on in our daily lives. Thijs van den Hout and his colleagues outline their contributions and lessons learned from 5 years of resea…

Article tags:

51 You have liked this article 0 times.
0

Showing 198 article(s)

Previous
1 2 3 ... 20
Next