Network Operations

All articles

PeeringDB 2022 Product Report

PeeringDB 2022 Product Report

Leo Vegoda

3 min read

Data quality and search were ranked most important by respondents to our last three user surveys. This update looks at improvements we have made to keep data quality high by improving automation, giving users better tools, and making it easier to find and export data in PeeringDB.

Article tags:

10 You have liked this article 0 times.
0
Tracing the Evolving Levels of Support for WebAuthn

Tracing the Evolving Levels of Support for WebAuthn

Kathleen Moriarty

26 min read

You've likely been hearing about the World Wide Web Consortium’s (W3C) Web Authentication (WebAuthn) and wondering if you're ready to implement it in your environment. Here's everything you need to know!

Article tags:

13 You have liked this article 0 times.
0
Security by Diversity: The Business of Security Through Diversity

Security by Diversity: The Business of Security Through Diversity

Fredrik Lindeberg

10 min read

With information security such a complex and fast-moving field, how can companies gather enough information to make informed decisions about what is right for their networks? What criteria should you look for, how do you evaluate systems, and how can you determine which methods will scale most effe…

Article tags:

16 You have liked this article 0 times.
0
Chris Amin: RIPE IPmap - Geolocating Routes Across the Internet

Chris Amin: RIPE IPmap - Geolocating Routes Across the Internet

Alun Davies

2 min read

Geolocation providers usually focus on locating end user devices at the edge of the Internet. But what about the machines that make up the infrastructure in the middle? In this episode, Chris Amin talks about RIPE IPmap - an API developed by the RIPE NCC to geolocate core Internet infrastructure.

Article tags:

85 You have liked this article 0 times.
2
RIPE NCC Internet Country Report: The Nordic Region

RIPE NCC Internet Country Report: The Nordic Region

Suzanne Taylor

5 min read

We take a comprehensive look at the five countries and three autonomous regions that make up the Nordic Region as the next in our series of RIPE NCC Internet Country Reports.

Article tags:

37 You have liked this article 0 times.
0
Top 3 Types of IP Address Abuse That Threaten IPv4 Resource Holders

Top 3 Types of IP Address Abuse That Threaten IPv4 Resource Holders

Vincentas Grinius

7 min read

Since the exhaustion of the IPv4 address pool, companies across the globe heavily rely on IPv4 transfer and lease markets. Unfortunately, transferred IP address blocks are far more likely to be blocklisted due to IP address abuse. But while abuse negatively affects IP address reputation, the risks …

Article tags:

27 You have liked this article 0 times.
0
CAPIF 1 - Peering and Interconnection in Central Asia

CAPIF 1 - Peering and Interconnection in Central Asia

Vahan Hovsepyan

5 min read

Central Asia is a landlocked region that could one day become a centre of interconnection for other regions and countries, including China, Iran, Russia, and the Caucasus. But to get there, networks in the region will need to cross a number of hurdles. CAPIF 1 will bring together local communities …

Article tags:

59 You have liked this article 0 times.
0
A Role for ISACs in Software Supply Chain Assurance

A Role for ISACs in Software Supply Chain Assurance

Kathleen Moriarty

8 min read

In the context of efforts to reduce the attack surface of applications, systems, and networks, developing approaches for assessing software security continues to be an important endeavour. In this article, Kathleen Moriarty maps out different models for software assurance and asks what a role Infor…

Article tags:

16 You have liked this article 0 times.
0
A Brief History of Network Time

A Brief History of Network Time

Robert Allen

8 min read

In this post we will look at how network time works today and the technology that keeps it accurate and secure. Most of the digital tools that society relies on–across sectors such as finance, telecommunication, security and energy–only work with precise and reliable time synchronisation. But what …

Article tags:

33 You have liked this article 0 times.
0
IPv6 On by Default

IPv6 On by Default

Jan Zorz

6 min read

At RIPE 85 we'll hold the final instalment in a series of panel discussions that have brought together the people who made the IPv6 World Events happen a decade ago. Read on to find out what the next big push for global IPv6 adoption might look like.

Article tags:

33 You have liked this article 0 times.
1

Showing 879 article(s)