Banner image

Network Operations

All articles

security_time

How to Ensure Time Security Across a Global Network

Author image
Robert Allen

5 min read

In this Netnod industry Q&A, we find out how NTS is used to ensure time security across a global network of devices. We talk with Christian Storm and Axel Keskikangas, developers at Axis Communications, a global provider of network solutions in video surveillance, access control, intercom, and audi…

Article tags:

26 Likes are disabled for this article.
0
Netnod-Hackathon-Banner-1-1200x580

Connect to Port 53: Join the DNS Hackathon 2023

Author image
Johanna Eriksson

10 min read

DNS-OARC, Netnod and the RIPE NCC invite you to join us for our DNS Hackathon in Rotterdam, 20 - 21 May 2023, taking place over the weekend before RIPE 86.

Article tags:

14 Likes are disabled for this article.
0
shakealert

Detecting Waves with ShakeAlert

Author image
Marcel Flores

9 min read

When operating large, globally distributed networks, hardware failures, provider outages, and other changes in behaviour are regular occurrences. Systems that can raise alarms at the first signs of trouble can alert human operators or automated systems and enable faster corrective action. To this e…

Article tags:

16 Likes are disabled for this article.
0
sankey

Plug and Plot: Reusable Visualisations for AS-Hegemony Data

11 min read

This article presents a set of open-source tools - “reusable visualisations” - that extend the AS hegemony visualisations provided by the Internet Health Report. Users can directly use the online tools or embed the IHR data on their own posts, webpages, or Observable HQ notebooks.

Article tags:

36 Likes are disabled for this article.
0
Header-hands-working-with-keyboard-computer-on-dark-blue-tone-background

Assessing the Risk of New .nl Registrations Using RegCheck

Author image
Thymen Wabeke

14 min read

The RegCheck system helps identify potentially malicious domain name registrations with 48% recall and 22% precision. In this article, the team from SIDN Labs shares their analysis of how the system performs when it comes to identifying high-risk .nl domain name registrations.

Article tags:

11 Likes are disabled for this article.
0
PeeringDB-Roadmap

PeeringDB's Product Roadmap for 2023

Author image
Leo Vegoda

3 min read

We want to build more agility into our Product Management process in 2023. This blog post describes what we have planned for the start of the year. It also describes how we want to work over the whole year, and how you can help us make good choices.

Article tags:

7 Likes are disabled for this article.
1
ipv6_policy

IPv6 Policy Is a Community Self-Governance Success Story

Author image
Leo Vegoda

6 min read

IPv6 policy has gone through many refinements since it was first adopted by the RIRs 20 years ago. Is it time for a more significant change? Join the RIPE Address Policy Working Group in conversation on the next phase of IPv6 policy.

Article tags:

32 Likes are disabled for this article.
0
krill-logo

Running Krill Under RIPE NCC

Author image
Alex Band

12 min read

Krill is a free, open source RPKI Certificate Authority from NLnet Labs that lets you run delegated RPKI under one or multiple RIRs. In this article, we provide a comprehensive, step-by-step guide on how you can run Krill under the RIPE NCC.

Article tags:

32 Likes are disabled for this article.
0
RoVISTA_survey

Help Validate ROV Adoption Measurements from RoVista

Author image
Tijay Chung

5 min read

Measuring adoption of ROV is challenging without direct access to routers in the wild. My colleagues and I at Virginia Tech, IIJ, RIPE NCC, and MANRS have developed a new measurement platform (RoVISTA) to measure the current deployment status of ROV. You can help by taking our survey!

Article tags:

35 Likes are disabled for this article.
0
massimo_ripe_84

NTT’s RPKI Deployment - Monitoring, Awareness, and Community

Author image
Dan Fidler

6 min read

Massimo Candela - Senior Software Engineer for NTT’s Global IP Network (GIN) - has been busy sharing his experience of deploying RPKI with the community. In this guest post, Dan Fidler takes a closer look at the message Massimo has been getting across.

Article tags:

38 Likes are disabled for this article.
0

Showing 889 article(s)