Louis Pétiniaud is a post-doctoral researcher in the geopolitics of Internet infrastructures and routing at GEODE, and teaches geopolitics of cyberspace in the Bachelor of Science program at Ecole Polytechnique. He holds a PhD from the French Institute of Geopolitics (Paris 8 University). His dissertation explored the links between the … More
• 20 min read
The Internet is a network of networks administered, controlled and shaped by humans. As such, it is as much affected by power relationships across the public and private actors as it, in turn, affects them. In this article, the team from GEODE explores the complex relations between the technical an…
I am a Cybersecurity Researcher at KOR Labs where I analyze all the aspects of the Domain Name System. I am particularly interested in RFC compliance, large-scale Internet measurements, and network security in general. Originally from academia, I enjoy discussing my research with the broader network operators community. More
• 6 min read
In November 2021, Internet users from Mexico lost access to whatsapp.net and facebook.com. By the time the event was reported, the underlying problem had already gone unnoticed for quite some time. Here, we present key takeaways from our analysis of the event - carried out with RIPE Atlas - and we …
Vincentas Grinius is a serial entrepreneur with over 15 years of experience in network, infrastructure, and internet policy. As the CEO of IPXO, an all-in-one Internet Protocol platform, Grinius is committed to addressing complex network management issues and helping to alleviate the global IPv4 shortage. With a strong background in … More
• 8 min read
The policy of the Asia-Pacific Regional Internet Registry (APNIC) that does not accept IP leasing has been questioned during its recent meeting in conjunction with APRICOT. While each of the five global RIRs has its own policies regarding IP leasing, this opinion piece argues that the APNIC policy …
Hi, I'm Jacky. Located in the vast and beautiful north of Germany - also known as Schleswig-Holstein - I'm a network architect with a variegated background in IT Ops, SecOps and agile management. Currently, my main focus lies in developing IPv6 strategies and architecture for one of the largest German … More
• 11 min read
With the next RIPE Meeting coming up, some of us might be dreading the networking we take ourselves to know less about: social networking. But its functions show inherent parallels to the base functions of computer networking. So accompany me to a deep dive on how the OSI layers relate to human com…
Hey there! My name is Radu, and I'm a Systems Engineer studying Cybersecurity in Estonia. My expertise is Networking and Network Security. I've always been passionate about technology and how it can shape the world around us. But what drives me is the potential for technology to make the internet … More
• 16 min read
Explore the concepts and tools needed to ensure the stability and reliability of BGP networks. With a focus on security, visibility, and operability, this article gives an overview of configuring BGP, a complex protocol used to build and maintain the Internet.
When operating large, globally distributed networks, hardware failures, provider outages, and other changes in behaviour are regular occurrences. Systems that can raise alarms at the first signs of trouble can alert human operators or automated systems and enable faster corrective action. To this e…
This article presents a set of open-source tools - “reusable visualisations” - that extend the AS hegemony visualisations provided by the Internet Health Report. Users can directly use the online tools or embed the IHR data on their own posts, webpages, or Observable HQ notebooks.
Fredrik is currently working at Netnod as a Security Expert in the Security Engineering team. His role is focused on internal processes, public policy development and the implications of policy on Netnod’s services. In 2021, Fredrik defended his PhD-thesis, Coordinating the Internet: Thought styles, technology and coordination. Prior to that, … More
• 10 min read
With information security such a complex and fast-moving field, how can companies gather enough information to make informed decisions about what is right for their networks? What criteria should you look for, how do you evaluate systems, and how can you determine which methods will scale most effe…