Powering the future of data centres
Guest Post: How Linear-Drive Pluggable Optics (LPO) and Linear Receiver Optics (LRO) can reduce power consumption in optical transceivers.
View ArticleAn introspective analysis: RPKI deployment under scrutiny
Guest Post: What challenges must RPKI overcome before achieving full global deployment?
View ArticleccTLD phishing characterization
Guest Post: A longitudinal analysis of phishing attacks observed at three ccTLDs registries that manage more than 8M active domains.
View ArticleOlympeaks: The impact of the Paris 2024 Olympics on Internet traffic
Guest Post: The ‘Olympeaks Observatory’ tracked record-breaking peaks on Internet traffic during the 2024 Olympics.
View ArticleA comprehensive guide to achieving ISO/IEC 27001:2022 certification
How to: A detailed step-by-step guide to ISO/IEC 27001:2022 certification.
View ArticleICYMI: Backblaze has announced support for IPv6
Interesting insight into a recent IPv6 deployment.
View ArticleRPKI: Deployed is better than perfect
Guest Post: Is RPKI stable enough to meet the recent White House roadmap expectations?
View ArticleWeb PKI: How to protect a popular security service?
Guest Post: Lessons learned from a study on the interrelation of CAA, CT, and DANE in web PKI deployments.
View Article[Podcast] Focusing purely on technology limits the understanding of Internet...
Nowmay Opalinski discusses the GEODE project and his analysis of Internet fragility in Pakistan.
View ArticleInternet of Things BoF at APNIC 58
Guest Post: IoT Alliance, IPv6 city update, IoMT, IPv6 addresses for non-electronic items, and more from the first-ever IoT BoF at an APNIC conference.
View ArticleSMTP downgrade attacks and MTA-STS
Guest Post: Auditing prominent mail providers to discover how they handle email encryption and show how MTA-STS can help improve email security.
View ArticleAPNIC registry API now available
The new APNIC registry API supports the retrieval of delegation information, as well as the management of whois records, RDNS records, ROAs, and route objects.
View ArticlePowering the future of data centres — Co-Packaged Optics
Guest Post: The advantages and challenges of CPOs.
View ArticleHow to inspect TLS encrypted traffic
Guest Post: Three methods to decrypt TLS traffic, how each works, and when to use them.
View ArticleHighlights of AINTEC 2024
Measuring GenAI usage patterns, dynamic fixed-point values in eBPF, improving TCP/IP performance and more from AINTEC 2024.
View ArticleEmpowering remote agricultural communities in Lao PDR through IoT technology
Guest Post: Developing affordable IoT technology to provide reliable, relevant agricultural data and forecasting information for remote farmers.
View Article[Podcast] The back of the class: Looking at 240/4 reachability
Geoff Huston discusses measuring the routability of 240.0.0.0/4 class-E addresses.
View ArticleThe strange cases of consumer-grade routers on puny power supplies
Guest Post: Investigating the least likely suspect in router configuration.
View ArticleThe IPv6 transition
How much longer is this transition to IPv6 going to take and does it even matter?
View Article