Banner image

Technology and Innovation

All articles

CE_country_report_cover

RIPE NCC Internet Country Report: Central Europe

Author image
Suzanne Taylor

3 min read

We take a comprehensive look at four countries in Central Europe as the next in our series of RIPE NCC Internet Country Reports.

Article tags:

51 Likes are disabled for this article.
0
quantum_fud

Separating FUD from Practical for Post-Quantum Cryptography

Author image
Kathleen Moriarty

6 min read

A practical approach to avoid falling into fear, uncertainty, and doubt (FUD) around post-quantum cryptography breaks down into three steps. Find out more in this guest post from Kathleen Moriarty, CTO of the Center for Internet Security.

Article tags:

10 Likes are disabled for this article.
0
cloud_strategy

RIPE NCC Cloud Strategy Framework (v2)

Author image
Felipe Victolla Silveira

6 min read

Our cloud strategy framework provides the principles and requirements for the cloud architecture of the RIPE NCC services. To determine these requirements, it uses the service criticality framework, more specifically its availability component rating.

Article tags:

14 Likes are disabled for this article.
0
climate_cost

The Climate Cost of the AI Revolution

Author image
Wim Vanderbauwhede

13 min read

ChatGPT and other AI applications such as Midjourney have pushed "Artificial Intelligence" high on the hype cycle. In this article, I want to focus specifically on the energy cost of training and using applications like ChatGPT, what their widespread adoption could mean for global CO₂ emissions, an…

Article tags:

31 Likes are disabled for this article.
0
txt-records

The Joy of TXT

Author image
Peter Lowe

10 min read

TXT records are perhaps the most flexible type of DNS records available - but have you ever wondered how they’re really used? To see if we can answer this, the TXT records of 1 million domains are examined to see if there’s any rhyme or reason as to how people employ this quirky, open-ended record …

Article tags:

44 Likes are disabled for this article.
3
source

SAV: Why Is Source Address Validation Still a Problem?

Author image
Qasim Lone

13 min read

Despite being a known vulnerability for at least 25 years, source IP address spoofing remains a popular attack method for redirection, amplification and anonymity. Preventing these attacks requires that operators implement Source Address Validation (SAV) to ensure their networks filter packets with…

Article tags:

34 Likes are disabled for this article.
3
IMG20220428093143

The Human Factor in the Geopolitics of the Internet

Author image
LOUIS PETINIAUD

20 min read

The Internet is a network of networks administered, controlled and shaped by humans. As such, it is as much affected by power relationships across the public and private actors as it, in turn, affects them. In this article, the team from GEODE explores the complex relations between the technical an…

Article tags:

42 Likes are disabled for this article.
0
digital_reds

Intercept and Inject: DNS Response Manipulation in the Wild

Author image
Yevheniya Nosyk

6 min read

In November 2021, Internet users from Mexico lost access to whatsapp.net and facebook.com. By the time the event was reported, the underlying problem had already gone unnoticed for quite some time. Here, we present key takeaways from our analysis of the event - carried out with RIPE Atlas - and we …

Article tags:

40 Likes are disabled for this article.
0
pulse_research_fellowship

Apply Now for Inaugural Pulse Research Fellowship

2 min read

Are you interested in Internet measurements and research and have a project or tool in mind that contributes to upholding an open, globally-connected, secure, and trustworthy Internet? The Internet Society invites you to apply for the Pulse Research Fellowship.

Article tags:

9 Likes are disabled for this article.
0
sankey

Plug and Plot: Reusable Visualisations for AS-Hegemony Data

11 min read

This article presents a set of open-source tools - “reusable visualisations” - that extend the AS hegemony visualisations provided by the Internet Health Report. Users can directly use the online tools or embed the IHR data on their own posts, webpages, or Observable HQ notebooks.

Article tags:

36 Likes are disabled for this article.
0

Showing 214 article(s)

Previous
1 ... 4 5 6 7 8 ... 22
Next