Quantcast
Channel: Tech matters Archives | APNIC Blog
Browsing latest articles
Browse All 151 View Live

An introspective analysis: RPKI deployment under scrutiny

Guest Post: What challenges must RPKI overcome before achieving full global deployment?

View Article


ccTLD phishing characterization

Guest Post: A longitudinal analysis of phishing attacks observed at three ccTLDs registries that manage more than 8M active domains.

View Article

Olympeaks: The impact of the Paris 2024 Olympics on Internet traffic

Guest Post: The ‘Olympeaks Observatory’ tracked record-breaking peaks on Internet traffic during the 2024 Olympics.

View Article

A comprehensive guide to achieving ISO/IEC 27001:2022 certification

How to: A detailed step-by-step guide to ISO/IEC 27001:2022 certification.

View Article

ICYMI: Backblaze has announced support for IPv6

Interesting insight into a recent IPv6 deployment.

View Article


RPKI: Deployed is better than perfect

Guest Post: Is RPKI stable enough to meet the recent White House roadmap expectations?

View Article

Web PKI: How to protect a popular security service?

Guest Post: Lessons learned from a study on the interrelation of CAA, CT, and DANE in web PKI deployments.

View Article

[Podcast] Focusing purely on technology limits the understanding of Internet...

Nowmay Opalinski discusses the GEODE project and his analysis of Internet fragility in Pakistan.

View Article


Internet of Things BoF at APNIC 58

Guest Post: IoT Alliance, IPv6 city update, IoMT, IPv6 addresses for non-electronic items, and more from the first-ever IoT BoF at an APNIC conference.

View Article


SMTP downgrade attacks and MTA-STS

Guest Post: Auditing prominent mail providers to discover how they handle email encryption and show how MTA-STS can help improve email security.

View Article

The size of the packet

How big should a packet be?

View Article

APNIC registry API now available

The new APNIC registry API supports the retrieval of delegation information, as well as the management of whois records, RDNS records, ROAs, and route objects.

View Article

Powering the future of data centres — Co-Packaged Optics

Guest Post: The advantages and challenges of CPOs.

View Article


How to inspect TLS encrypted traffic

Guest Post: Three methods to decrypt TLS traffic, how each works, and when to use them.

View Article

Highlights of AINTEC 2024

Measuring GenAI usage patterns, dynamic fixed-point values in eBPF, improving TCP/IP performance and more from AINTEC 2024.

View Article


Empowering remote agricultural communities in Lao PDR through IoT technology

Guest Post: Developing affordable IoT technology to provide reliable, relevant agricultural data and forecasting information for remote farmers.

View Article

[Podcast] The back of the class: Looking at 240/4 reachability

Geoff Huston discusses measuring the routability of 240.0.0.0/4 class-E addresses.

View Article


The strange cases of consumer-grade routers on puny power supplies

Guest Post: Investigating the least likely suspect in router configuration.

View Article

The IPv6 transition

How much longer is this transition to IPv6 going to take and does it even matter?

View Article

A free and open source IPv6 textbook

A free, comprehensive, continuously revised, and open source resource on IPv6.

View Article

Serial BGP hijackers: A reproducibility study and assessment of current dynamics

Guest Post: Profiling serial hijackers with less data than previous efforts while achieving similar accuracy.

View Article


Apply now for an APRICOT 2025 Fellowship

APRICOT is offering a limited number of fellowships in the lead up to APRICOT 2025. Apply now!

View Article


The realities of building an IPv6-only city

Guest Post: Practical lessons learned from deploying city-wide greenfield IPv6-only.

View Article

The Starlink vs cable conundrum in the Pacific

Guest Post: Could Starlink availability discourage undersea cable development for small island economies?

View Article

[Podcast] A student-led IPv6 deployment at NITK Karnataka

Two newcomers share their multi-year IPv6 deployment project and their experience with the IETF process.

View Article


Ethernet at NANOG 92

Towards 800Ge and Ultra Ethernet for AI.

View Article

Using honeybuckets to characterize cloud storage scanning in the wild

Guest Post: Researchers investigate the methods and frequency with which attackers target poorly secured cloud storage buckets.

View Article

Comparing Carrier Ethernet transport technologies

Guest Post: How to evaluate the pros and cons of Carrier Ethernet transport technology and choose the right solution.

View Article

Towards a collaborative future with NOG networks

Insights from Maldives IGF 2024 and the potential of MVNOG.

View Article



The rise of packet rate attacks: When core routers turn evil

Guest Post: Fresh insights into the growing threat of high packet rate attacks.

View Article
Browsing latest articles
Browse All 151 View Live