Technology and Innovation

All articles

The Secrets of De-Peering

Uta Meier-Hahn

There are many resources available to learn about Internet peering. But when it comes to de-peering, networkers are mostly left with their gut feeling.

Article tags:

0 You have liked this article 0 times.
2

SHA2017: Hackers' Camping, RIPE Topics

Vesna Manojlovic

Today begins the newest edition of four-yearly Dutch summer camping conferences for and by hackers: SHA2017. Since there is an overlap between topics and participants within the RIPE community, this is an invitation to the talks and workshops that might interest you.

Article tags:

0 You have liked this article 0 times.
0

Detecting Network Outages with RIPE Atlas

Anant Shah

This post describes a technique to detect bursty TCP disconnections, and how it can be used on RIPE Atlas data to better detect outages in the Internet.

Article tags:

4 You have liked this article 0 times.
4

Public Policy Demands Better Statistics

George Michaelson

This is a story about science and data and how we need to apply rigour if we want to use data to inform and influence policy decisions. It is also a story about HTTPS.

Article tags:

2 You have liked this article 0 times.
0

On the Operators' Perspective on Security Misconfigurations ㄧ The Survey

Constanze Dietrich

We want to fully understand the issue of security misconfigurations. We have some preliminary findings. But we need your help: Please, participate in our anonymous survey on security misconfigurations.

Article tags:

0 You have liked this article 0 times.
0

Taking it to the Limit - Testing the Performance of R&E Networking

Mirjam Kühne

Please read this guest post by Mian Usman, Network Architect at GÉANT: One of the big questions often asked of R&E networking is why? Why, when commercial networks are so large, is there still a need for dedicated research networks? Surely organisations can simply buy commercial off-the-shelf netw…

Article tags:

0 You have liked this article 0 times.
0

BGP Even-More Specifics in 2017

Stephen Strowes

Since October 2014, we have been advertising two IPv4 /25s and two IPv4 /28s, to better understand how far they propagate across the network. In this article, we review how things have (or have not) changed over the years.

Article tags:

1 You have liked this article 0 times.
1

The Internet was Built on Trust. But What Does it Run On?

Uta Meier-Hahn

One of the most noble narratives about the Internet is that it is built on trust. This article sets out to check if that saying still holds true.

Article tags:

0 You have liked this article 0 times.
2

Talking Traffic at TMA 2017

Stephen Strowes

Last week, the Network Traffic, Measurement and Analysis Conference (TMA) took place in Maynooth, Ireland. A full week was scheduled, featuring a PhD school across Monday and Tuesday, the Mobile Network Measurements (MNM) workshop on Tuesday, and the main conference from Wednesday to Friday. We wer…

Article tags:

4 You have liked this article 0 times.
0

Recursives in the Wild: Engineering Authoritative DNS Servers

Moritz Müller

By analysing how resolvers select authoritative name servers in the wild we investigated how DNS operators are able to reduce DNS response times.

Article tags:

0 You have liked this article 0 times.
0

Showing 155 article(s)