Banner image

Technology and Innovation

All articles

meowmeow

Putting the MAU Into meowmeow: On Personal ASNs

Author image
Tobias Fiebig

14 min read

Is the use of personal ASNs to gain hands-on operational experience really such a bad idea, or is this one of the ways we make sure the Internet remains a place of equitable participation, expression and learning? In this guest article, Tobias Fiebig shares his views.

Article tags:

62 Please read the article before liking.
0
networks_ripe

A Comprehensive Review of RIR Policies in the Domain of AS Number Management

Author image
Nachiket Kondhalkar

4 min read

A research team at TU Delft is researching the management of AS Numbers across RIRs as well as the potential impact of the new annual maintenance fees for ASNs and we invite you to contribute.

Article tags:

22 Please read the article before liking.
0
internet_in_space

A Multifaceted Look at Starlink Performance - The Good, the Bad and the Ugly

Author image
Nitinder Mohan

9 min read

How does Starlink stack up against terrestrial ISPs as a global service? And exactly what factors impact its operations? A new multifaceted active and passive measurement study uncovers the good, the bad and the ugly when it comes to Starlink performance.

Article tags:

64 Please read the article before liking.
0
1080x1080px_01_v03_Ripe-Labs-podcast_E-01 (2)

Paola Grosso: Defining a Responsible Internet

Author image
Alun Davies

2 min read

For many, the Internet is essentially a black box. We connect with other endpoints to send and receive data, but we have little insight into what happens in between. Dr Paola Grosso talks about how CATRIN seeks to provide more visibility and control so we can make more responsible decisions on how …

Article tags:

58 Likes are disabled for this article.
0
nodes and connections

20 Years of Inferring Interdomain Routing Policies

Author image
Savvas Kastanakis

9 min read

As the structure of the Internet has become ever flatter over time, what effect has this had on the dynamics of inter-domain routing? A new study examines whether 20-year-old insights into the characteristics of routing policies still hold.

Article tags:

61 Likes are disabled for this article.
0
BEREC

BEREC Report on the IP Interconnection Ecosystem

Author image
Christoph Mertens

4 min read

Following on from their earlier call for input, BEREC have now released a draft report on the IP interconnection ecosystem. Take a look at their findings and contribute by sending your feedback.

Article tags:

10 Likes are disabled for this article.
0
blocks

Whose CIDR Is It Anyway?

Author image
Jan Schaumann

22 min read

IP address space wasn't divided evenly, and after years of re-allocation and re-assigment, the question that comes to mind is: who owns what parts of it? In the latest in a series of articles on the centralisation of the Internet, Jan Schaumann digs into the data to try to get a clearer view.

Article tags:

80 Likes are disabled for this article.
3
Netnod-Hackathon-Banner-1-1200x580

Authenticated DNSSEC Bootstrapping: From Hackathon Project to Useful Software

Author image
Peter Thomassen

7 min read

At the RIPE DNS Hackathon 2023, a group of DNS enthusiasts started writing implementations of the Authenticated DNSSEC Bootstrapping protocol. After the event, the work continued, culminating in the completion of a module for Knot DNS. So what problem does the new feature address, and how can you u…

Article tags:

21 Likes are disabled for this article.
0
DDoS Attack

Collaborative DDoS Mitigation: From Research to Operational Practice

Author image
Thijs van den Hout

11 min read

Distributed denial-of-service (DDoS) attacks continue to plague the Internet and pose a risk to the availability of critical digital systems that we increasingly depend on in our daily lives. Thijs van den Hout and his colleagues outline their contributions and lessons learned from 5 years of resea…

Article tags:

51 Likes are disabled for this article.
0
1080x1080px_01_v03_Ripe-Labs-podcast_E-01 (2)

Bert Hubert: Internet Privacy and the Cost of Losing Control

Author image
Alun Davies

2 min read

Internet users, the companies who sell us our devices, and governments are all caught up in the struggle for online privacy. In this episode, Bert Hubert explains how outsourcing and other market forces determine the flow of control over personal data and why we need to understand the consequences.

Article tags:

256 Likes are disabled for this article.
0

Showing 218 article(s)